Introducing SonicWALL Next-Gen Backup & Recovery CDP Version 6.0
Join us for this 60-minute session, and discover how the new, sophisticated global policy-base control backup and recovery techniques introduced in SonicWALL next-generation Continuous Data Protection (CDP) Version 6.0 provide a more intelligent and systematic data protection strategy for small and mid-size organizations that are struggling with the reliability and uncertainty of their backup and recovery results. In this presentation, we will discuss many of the new key features in Version 6.0, and how it solves the increasing need to reduce costs associated with backup and recovery, while complying with even the most stringent data recovery objectives and disaster protection. Register now for this webcast to learn more.
RecordedMar 16 201164 mins
Your place is confirmed, we'll send you email reminders
Ganesh Umapathy, Product Marketing Manager | Michael Osterman, President, Osterman research
Today, Email is the most common attack vector used by cyber criminals. Join us for this special webinar with guest speaker Michael Osterman to discuss the recently published research on the current state of email threats, best practices you can implement to protect against them, and how SonicWall provides automated threat detection and protection capabilties to stop these threats.
1.Understand the current threats landscape
2.Know the best practices to mitigate today’s threats
3.Gain insights into how SonicWall stops advanced threats
Join SonicWall experts for an exclusive webinar, “Identify and Stop Malware in the Quickest and Most Accurate Way Possible.” We will discuss how SonicWall Real-Time Deep Memory Inspection (RTDMI™) technology enables SonicWall Capture Advanced Threat Protection (ATP) to:
•Catch more malware faster than behavior-based sandboxing methods, with a lower false positive rate
•Block sophisticated attacks by unpacking compressed code in memory in a secure sandbox environment
•Stop threats embedded in Microsoft Office and Adobe PDF files
Encrypted traffic is a key battleground for today’s security-conscious organizations. But how and where to fight is not always clear or easy to execute. Join SonicWall for a “fireside chat” to gain a clear understanding of how to establish a security model that can decrypt and inspect encrypted traffic without degrading performance or damage trust.
Register now for this informal Q&A session that will provide a platform to answer your most pressing questions regarding encrypted attacks and how to responsibly and efficiently decrypt SSL and TLS traffic. This session will:
• Outline the benefits of inspecting SSL/TLS traffic
• Explain how to block encrypted malware downloads, including ransomware and zero-day cyberattacks
• Demonstrate how to set up a typical next-generation firewall with DPI-SSL capabilities
• Customize inclusion and exclusion lists for compliance or legal requirements
• Operate a required system digital certificate store
Over the past few years, hackers are increasingly choosing to utilize fileless malware as a highly effective alternative to malware attached to files. See how you can use modern technology to monitor the behavior of a system for malicious abnormalities and rollback systems to a previous uninfected state.
Join SonicWall & SentinelOne experts to learn how to stay safe from advanced threats like fileless malware.
1.Learn how the threat landscape has changed in the past three years.
2.Learn what fileless malware is and how to stop it.
3.Discover the difference behavior-based security makes.
Examining 2017 to prepare for what's coming in 2018
The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.
Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.
Ganesh Umapathy & Keith Johnson, SonicWall Security Experts
Organizations are increasingly adopting Office 365 as part of the “move to the cloud” endeavor. Many organizations are also evaluating a cloud-based email security solution to close security gaps and mitigate risks from migration to the cloud.
Join this webinar for a live demo on how SonicWall’s Email Security solution secures Office 365. Learn more about:
•What to consider while securing your Office 365 email service
•How SonicWall Email Security offers superior, advanced threat protection, data loss prevention and email continuity for Office 365
Managing certificate deployment and certificate pinning are among the top challenges when implementing deep inspection of SSL and TLS certificates on a next-generation firewall.
Join us for a technical deep-dive webcast and demo to learn best practices to a successful SonicWall Deep Packet Inspection of SSL (DPI-SSL) service implementation. This in-depth session will:
• Help size the firewall accurately for DPI-SSL service
• Provide multiple methods for certificate deployment
• Offer guidance for certificate-pinning
• Educate users on the OS certificate store
• Explain how to establish trust with devices in BYOD environments
In 2016, the SonicWall Capture Threat Network observed 60 million unique malware samples, 7.9 billion malware attack attempts, 638 million ransomware attacks and showed that 62% of SonicWall customer internet sessions were encrypted using SSL/TLS.
The SonicWall Capture Labs Threat Research Team:
•Gathers, analyzes, and vets cross-vector threat information from more than one million sensors around the world,
• Performs rigorous testing and evaluation,
• Establishes reputation scores for email senders and content
• Identifies new threats in real-time.
Get the most up-to-date protection against new attacks with real-time information from SonicWall Capture Labs.
Scott Grebe - SonicWall Security Product Marketing Manager
Webinar: Are You Ready to Do Some Holiday Shopping? The Hackers are Waiting.
Holiday shopping is back. From Black Friday, Small Business Saturday and Cyber Monday through the end of the year, your employees will shop online in the office. Are you prepared?
Learn more about the issues you’re up against during the entire holiday shopping season and how to keep your network secure from cyber criminals, keep your employees focused and ensure that internet bandwidth is reserved for essential activities.
Join this webinar to learn:
•How online shopping during the holidays impacts employee productivity, bandwidth consumption and network security
•About the threats that cyber criminals are using to attack your organization
•What you can do to protect your data and your network from attack during and after the online buying season
When a small business is hit with a critical cyber-attack, one in six have to stop business for more than 25 hours. The National Cyber Security Alliance reports that 60 percent of small companies are unable to stay in business six months after a cyberattack.
Join SonicWall for this live webinar as we outline how one small business owner fought back, and established a smart, cost-effective security strategy for her company.
Find out how SonicWall can help:
•Protect your business against both known and unknown cyber threats
•Bolster your security posture in cost-effective manner
•Safeguard sensitive information and data
•Ensure your business remains operational
•Add peace of mind
Email continues to be vital to business. However, as the volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks.
Spammers falsify email sender addresses to fool recipients and inflict damage to unknowing, legitimate brands. Organizations can benefit from replacing legacy solutions with SonicWall’s easy-to-use, affordable hosted email security solution that defends against the dynamic, evolving email threat landscape.
In this webinar, gain insights on:
•Avoiding phishing and fraud
•How SonicWall hosted email security enhances MS Office 365
•Other benefits of a hosted email security solution
Learn how to stop the latest global ransomware attack.
On Oct. 24, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day.
No matter the size of your organization, you could become the target of a Ransomware attack. View this on-demand webinar to learn how you can protect your business from ransomware like Bad Rabbit.
You’ll also learn:
•How Bad Rabbit infects organizations
•Tools needed to stop the ransomware
•How SonicWall Capture ATP customers were automatically protected
•Ransomware best practices for any organization
With the rise in cyber attacks hiding inside encrypted traffic, it is imperative to establish a security model that can decrypt and inspect encrypted traffic without degrading performance.
Join us for a technical deep-dive webcast and demo to explore how to properly safeguard your networks from encrypted threats via the SonicWall Deep Packet Inspection of SSL traffic (DPI-SSL) service. Learn how to:
• Set up a typical firewall
• Gain visibility into SSL/TLS encrypted traffic
• Block encrypted malware downloads
• Customize inclusion and exclusion lists for compliance or legal requirements
Last year SonicWall detected and stopped over 7.2 billion malware attacks and saw a 167X rise in ransomware. Of the 61percent of organizations affected by this form of malware, one in six had to shut down operations for more than 25 hours. With less than 50 percent of organizations getting their data back, even after paying the ransom, many go out of business as a result.
Join SonicWall for this live webinar as we outline cybersecurity best practices and the benefits of the SonicWall Capture Advanced Threat Protection (ATP) service.
SonicWall Exec. Director, Product Management, Dmitriy Ayrapetov explains how you can maximize zero-day threat protection with SonicWall Capture ATP, a cloud-based multi-engine solution.
Hackers have expanded their craft to use SSL traffic as a means to obfuscate their attacks and rasomware download. Using Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, attackers now cipher malicious payloads and command and control communication to evade your cyber defense.
Attend this live webcast to:
•Have an understanding of how adversaries are using encryption against us.
•Be aware of the common attacks that leverage SSL/TLS traffic to evade detection
•Be prepare for the key challenges when inspecting SSL Traffic
What we see is that the cyber arms race continues to evolve. If I were to boil this down to its essence, cyber criminals are combining exploits and attacks in creative ways that are not necessarily brand new, but can be tweaked and combined in new ways to create very effective attacks. Like mixing cocktails, the ingredients are all well known, but the exact mix is completely new.
Join our webcast to learn how SonicWall can help you protect your organization against modern malware attacks
Email-based communications are a fundamental cornerstone for effective business. That’s why email is a popular vector for sabotage across your network and a launch pad for malware – including ransomware and zero-day threats.
This webcast discusses the current threat landscape and customer pain points, and examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
SonicWall has been fighting the cyber-criminal industry for over 25 years, defending small, medium-size businesses and enterprises worldwide. Our combination of products and partners has enabled a real-time cyber defense solution tuned to the specific needs of more than 500,000 businesses in over 150 countries, so you can do more business with less fear.