A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
RecordedAug 21 201949 mins
Your place is confirmed, we'll send you email reminders
You probably know there are attackers willing to pay for access to your inbox. But did you know there are groups so sure they can gain access to your accounts that they offer a money-back guarantee?
Join SonicWall’s Ken Dang as he explores the sophisticated tools one advanced persistent threat organization uses to exploit vulnerabilities and bypass Microsoft Security — and reveal what it takes to keep them out of your inbox.
The boundaries of your organization are borderless and expand to limitless endpoints and networks.
Join us to get an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, encrypting your endpoints, and spreading to other drives and segments of your network.
Join SonicWall security expert Brook Chelmo for an update on one of last year’s most popular cybersecurity stories, as he recaps his ongoing conversations with a Russian ransomware cell and details how it’s grown. You’ll get an inside look at the human side of a modern ransomware cell, as well as advice on how to stop them from infiltrating your organization and bringing your operations to a standstill.
A new “business normal” has arrived for each and every enterprise, organization, business and government agency. In this new reality, everyone is mobile, everyone is remote and everyone is less secure.
Join SonicWall expert Brook Chelmo as he discusses how executives, decision-makers and administrators can finally bridge the cybersecurity business gap, mitigating the escalating risk from boundless points of exposure — all with less cost and human intervention than conventional security.
Organizations face tough choices when evaluating security vendor claims about their next-generation firewall (NGFW) offerings.
Join SonicWall security experts to learn how the NetSecOPEN’s “Benchmarking Methodology for Network Security Device Performance” can help you choose the ideal firewall to meet and exceed your business cybersecurity objectives.
Protect your Remote and Work-from-Home Employees during the COVID-19 Outbreak
Join SonicWall security experts as we explore the challenges you need to address to stay safe — and operational — during the coronavirus outbreak.
Register now to gain actionable best practices to:
•Expand your remote workforce securely
•Defend against fear-based cyberattacks
•Establish a true remote office for employees
•Gain additional operational benefits
•Learn how to apply learnings to critical business continuity and disaster recovery plans
Join SonicWall security experts as we share findings, intelligence, analysis and research from the 2020 SonicWall Cyber Threat Report. This exclusive session will help you better understand how cybercriminals think —and be fully prepared for what they’ll do next.
Amit Bareket (Perimeter 81) and Jayant Thakre (SonicWall)
Introduced by Gartner in 2019, Secure Access Service Edge (SASE) is a cloud architecture model that combines different functions of network and security solutions into a unified cloud security platform to be delivered as a service — without any or minimal hardware involved. This joint session between SonicWall and Perimeter 81 will explain why the SASE model was created, the challenges it's fixing and how the movement is redefining a future of network security without traditional perimeters.
Join us to learn how you can reduce WiFi Radio Frequency (RF) challenges and provide easy guest onboarding in your environment.
SonicWall WiFi Cloud Manager is equipped to resolve these challenges and more. Learn how to:
•Captivate guests via Captive Portal
•Enhance performance with new RF features
•Improve wireless security
Join SonicWall security expert Brook Chelmo as he gives you an inside look into the human-side of a modern ransomware cell, their advice on how to stop them from infiltrating your organization, encrypting your endpoints, and spreading to other drives and segments of your network.
Is your business deploying more and more SaaS applications? Although SaaS applications empower businesses with agility and enhanced productivity, the increased agility isn’t without risks. SaaS apps need to be adopted in a secure, responsible manner.
Join SonicWall security expert Shannon Emmons for an exclusive webinar to learn about:
•Key security risks to address when adopting SaaS applications
•Where proper SaaS security should be applied
•Best practices and guidance for implementing SaaS security solutions
Ken Dang, Product Makreting & John Padilla, IT Director, SonicWall
Shadow IT practices give rise to security risks such as account compromise, malware propagation, data loss and non-compliance.
In this new SaaS-happy world, CSOs, CIOs, CISOs, administrators and IT departments struggle to maintain visibility and access control over data while enforcing strong threat protection, data loss prevention and compliance policies.
Join SonicWall for an exclusive look at the day in the life of a modern IT director and the best practices used to keep shadow IT risks in check.
Ganesh Umapathy - SonicWall Product Marketing Manager & Michael Osterman, President, Osterman Research
The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations.
Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware, email fraud
We will cover the following:
•Major concerns and issues with SaaS adoption
•What to look for in a CASB solution
•Overview of SonicWall Cloud App Security
Diana Kelley, Microsoft | Michelle Drolet, Towerwall | Peter Dougherty, MantisNet
As the average monetary cost of a malware attack continues to increase and currently costs an organization an average of $2.4 million, it is essential to be up to date on detection and prevention best practices. Join leading industry experts as they discuss the biggest security threats and how to detect and prevent them:
-New on the threat landscape
-How to deploy automated threat detection
-Breach prevention best practices
Speakers:
Diana Kelley, Cybersecurity Field CTO, Microsoft (moderator)
Michelle Drolet, CEO, Towerwall
Peter Dougherty, CISSP, CEO, MantisNet
Wireless networks a mess? Remote Wi-Fi difficult to manage? Join us for a live demo to understand how to simplify wireless installation with Zero-Touch Deployment. Reduce costs and save time spent on rolling out your solution — all while managing it all from the cloud and mobile devices
In this final episode of our E-rate video series, Holly Davis joins John Mullen, former SonicWall Software Business Development Director, to explore the following questions:
•Why SonicWall for the K-12 environment?
•What is SonicWall Capture ATP?
•Why is Capture ATP sandboxing necessary for K-12?
•What is SonicWall SECaaS?
We hope this video series has provided you with valuable direction to help you confidently approach E-rate funding.
For questions about the SonicWall solutions for K-12, and their E-rate eligibility, please contact Holly Davis, Komplement CEO and E-rate advisor to SonicWall, at holly@komplement.us.
Join malware expert Brook Chelmo to learn how to identify and stop advanced malware and other modern threats in the quickest and most accurate way possible. Reserve your spot to:
•Discover risks caused by ‘never-before-seen’ threats
•Stop threats embedded in Microsoft Office and Adobe PDF files
•Mitigate future side-channel attacks and processor vulnerabilities
•See which approaches should be leveraged to close these vulnerability gaps
Holly Davis, CEO Komplement Business Development Consulting
As we near the conclusion of the SonicWall E-rate video series, you should be gaining more familiarity with the E-rate program benefits and what’s required to submit bids to RFPs.
For questions about the SonicWall solutions for K-12, and their E-rate eligibility, please contact Holly Davis, Komplement CEO and E-rate advisor to SonicWall, at holly@komplement.us
In this fourth episode, E-rate expert Holly Davis dives further into:
Holly Davis, CEO Komplement Business Development Consulting
How to cost-effectively protect K-12 networks.
The E-rate program is critical for K12 organizations that lack the funding to procure appropriate networking and cybersecurity solutions, such as firewalls and wireless security. But understanding the program — as well as confirming your E-rate eligibility — can be daunting.
In this third episode of our E-rate series, expert Holly Davis discusses:
Watch the entire video series for valuable insights to help you confidently approach E-rate funding.
For questions about the SonicWall solutions for K-12, and their E-rate eligibility, please contact Holly Davis, Komplement CEO and E-rate advisor to SonicWall, at holly@komplement.us.
Ken Dang, Senior Product Marketing Manager, SonicWall
Complete security. One viewpoint.
A splintered security platform opens threat gaps and adds overhead costs and complexity.. See how you can unify, monitor and manage all your security ecosystem with the Capture Security Center.
SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide.
The Dangers of Siloed SecurityKen Dang, Senior Product Marketing Manager, SonicWall[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]49 mins