Is Your Firewall ICSA Labs Certified and Evaluated?
Firewall vendors often make claims about their Next-Generation Firewall’s capabilities. To judge the true potential of a Next-Gen Firewall, however, you need independent testing.
Join Brian Monkman of ICSA Labs and Daniel Ayoub of Dell SonicWALL for this interactive web seminar, and learn why third-party validation—such as the rigorous testing methodology deployed by ICSA Labs—is crucial when evaluating a Next-Generation Firewalls.
RecordedAug 7 201261 mins
Your place is confirmed, we'll send you email reminders
Scott Grebe, Cybersecurity Product Marketing Manager
As the use of cybertechnology grows, organizations and their security solutions are increasingly caught in the crosshairs of a growing global cybercriminal industry. No longer is it enough to simply detect network breaches. You need to prevent cyberthreats such as ransomware, IoT DDoS attacks and encrypted malware. Learn more about these threats and why it’s time to add new cyberdefenses to your business security arsenal.
With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.
SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.
Learn how to:
•Stay safe from ransomware and other advanced attacks
•Practice good security hygiene
•Use trusted automated tools to protect your network and endpoints
Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.
This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
Learn how this comprehensive, flexible and scalable solution can:
•Scan a broad range of email attachment types to detect advanced threats
•Analyze them in a multi-engine sandbox
•Block them prior to a security verdict
•Rapidly deploy remediation signatures
Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.
Some report highlights:
•Ransomware changes in 2016 and the effects on malicious email and exploit kits
•The growth and challenges of SSL
•How Internet of Things devices were exploited and different security steps some organizations are taking in response
•Developments in Android security
•Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:
•Meet all network security needs
•Reduce management time
•Eliminate upfront capital investment
•Utilize subscription pricing for a predictable operating expense model
•Gain valuable network reporting and expert insight
•Have a network security professional manage it all
Modern threats take advantage of all areas of your network to cause maximum harm. Once inside your environment, they propagate freely within your network, as well as transmit information into and out of your network. In order to stop advanced attacks, networks need to be divided into security segments to contain and mitigate threat propagation.
Join this upcoming webcast and discover proven best practices for implementing network security segments as an effective defense against advanced threats.
• Monitor all – including encrypted – communications traversing the network for malicious activity or content.
• Inspect traffic not just from the internet, but also from devices that connect behind traditional security checkpoints.
• Prioritize critical infrastructure communications to ensure successful business operations.
• And much more...
Online shopping will rise sharply to an unprecedented level this coming holiday season. The conversation for consumers and retailers now focus on cyber safety and privacy for all. What actions must you take immediately to elevate your security posture?
In this webinar, you’ll hear from our SonicWall security expert on the best ways to securing your retail business and safeguard your customer privacy information while also meeting the latest PCI standards.
Rasomware is spreading at record pace in 2016 as cybercriminals are actively using it to hold businesses, institutions and even individuals hostage. If you’ve been following the news, you’re probably aware that authorities and security experts are calling this the new crisis in cybercrime today. Research has shown that businesses with more than 100 employees make up 60 per cent of all ransomware attacks and those with more than 1,000 employees are targeted 25 per cent of the time.
Attend our live webcast to learn effective ways to prevent and stop this dangerous and potentially costly threat.
This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.
Rob will discuss the following:
• Threat landscape 2016 recap
• Fortifying the network
• Security craftsmanship
• Implementing the solution
Educational institutions, businesses and government agencies assume substantial risks when they provide employees or students Internet-capable computers, even when the devices are behind a firewall.
Uncontrolled web access can result in non-productive web surfing, creating tremendous losses in productivity, not to mention the potential for legal liability.
SonicWALL Content Filtering Service (CFS) 4.0 brings you enhanced granular web filtering controls at the policy level along with better policy management. In this webcast led by SonicWALL experts, you will take a deep dive into the new CFS 4.0 features.
• CFS 4.0 powerful new web filtering controls helps school districts and other organizations protect users
• A host of new features delivers enhanced categorized control over your environments
• The upgraded Content Filtering Client (CFC) extends protection and productivity to users outside the firewall
• CFC ensures policy compliance, regardless of where the connection is established
It seems like everything is getting connected to the internet. But, these connections mean more doorways to protect.
Indeed, the Internet of Things (IoT) carries great potential – but also significant risks. You need to understand this landscape before you can securely, successfully move into this space.
Register today for this revealing webcast to learn:
•How the IoT emerged – and where it’s going
•How existing vulnerabilities can be exploited
•What new vulnerabilities might emerge
•How you can protect your organization – starting today
•How to embrace the power of the IoT
We’ll also look at how the Dell Security portfolio can help you embrace the power of the Internet of Things – safely.
Ken Dang, Dell senior product marketing manager, and Jason Tolu, Dell senior product marketing manager
Your network is under attack on multiple fronts. Join us to discover how to get comprehensive endpoint-to-perimeter security without degrading performance or productivity.
Join this webinar to learn:
•Insights on the latest emerging threats
•Best practices for securing and managing your endpoints and perimeter
•Real-world approaches from actual implementations
Any of the growing number of devices accessing your network can open the door to advanced persistent threats (APTs), cybercriminal activity, spam and malware. What’s more, the majority of web sites distributing malware today are legitimate sites with outdated system patches that been compromised by hackers.
A comprehensive security strategy must include a multi-prong approach: limiting exposure of endpoints to outside threats and limiting the exposure to data loss at the endpoints themselves, thorough automated patching and security scanning and configuration enforcement.
Swarup Selvaraman, Senior Manager, Product Management at Dell SonicWALL
How are you certain that emails sent from your domain are legitimate? Do you know who is sending emails on behalf of your domain, and how many of those emails are sent daily? You need to be prepared, before your email gets blacklisted.
Attend this webcast to learn about the Domain-based Message Authentication, Reporting & Conformance (DMARC) standards. Find out:
•Why DMARC is so important to your email security
•How to use DMARC reports to ensure better email deliverability
•How to implement DMARC into your infrastructure in five easy steps
By implementing DMARC for authentication, spoofed email can be readily identified and rejected by email receivers protecting your company brand. Fortunately, Dell SonicWALL Email Security 8.0 is the first email security product to offer comprehensive DMARC support.
How can you support the need for workers to use different mobile devices and applications for better productivity while maintaining your security? Rigid guidelines or processes often lead to users finding work-arounds to avoid these measures.
Attend this timely webcast on how to solve this and other common mobility challenges. You’ll learn how to:
•Protect business/personal applications and data on traditional and emerging mobile devices in the multi-platform, BYOD world
•Extend business application/data protection end-to-end with application-level VPN
•Manage, monitor and stop hidden mobile threats
•Enable BYOD users to make secure business phone calls
From new ways of designing and manufacturing products or delivering services, to enhancing business processes and revolutionising the way we learn, work, communicate and play, technology is becoming more embedded in all aspects of our business and personal lives.
Despite the complex infrastructure and designs on which this has been built, familiarity often breeds a sense of complacency where things are just expected to work flawlessly.
As the third platform gathers momentum, the interplay between the four elements - mobile, cloud, social, big data - will bring additional security challenges – for example, mobile/cloud developments, social/big data developments, etc. – new security challenges will emerge as the elements realign in new ways.
There is no doubt that the IT landscape is undergoing fundamental changes. The third platform (mobile, cloud, social, big data) will bring a far more interconnected world; people, data and applications will be more than ever connected through the four elements. Security challenges will be at the forefront of these changes – exciting times are ahead. Those entrusted with security responsibilities are going to be challenged like never before. And security innovation will be rewarded enormously for those with courage and foresight, through the opportunities that are emerging. Lets take a look at how security is bought and managed so that change can be delivered with confidence.
Angelo Rodriguez, Dell, Sales Engineering Director and Dan Cole, Dell, Product Line Manager
Today’s ideal data center should be agile, scalable, manageable, flexible, cost-effective and – most importantly – secure against today’s prolific threat environment.
Enterprises, carriers and ISPs require network security solutions that can meet massive data and capacity demands. This means the network security layer must also be highly extensible to support the largest data center bandwidth consumptions. Adding additional security compute resources should ideally be a matter of easily adding more firewall to your system at the best price to performance ratio and TCO.
Join our discussion as we cover how to scale a Next Generation Firewall (NGFW) and:
•Gain network simplicity, n-1 resiliency and superior security efficacy
•Go beyond 100Gbps of deep packet inspection (DPI) at near-zero latency
•Get the best price to performance ratio and lowest TCO
SonicWall provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the SonicWALL Global Response Intelligent Defense (GRID) Network, the SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.