Hi [[ session.user.profile.firstName ]]

Under the hood: Malware research and protection

As malware variants evolve and employ more sophisticated, evasive tactics, traditional security measures are no longer effective. With input from millions of shared touch points, the Dell™ Global Response Intelligent Defense (GRID) Network™ helps to identify new and emerging threats before they reach your organization.

You’ll learn:
•The steps required for continuous threat protection
•Why it’s important to collaborate with security organizations and vendors
•How threat data is cross-pollinated between Dell solutions
Recorded Jan 17 2013 24 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Crutchlow, Sr. Product Manager
Presentation preview: Under the hood: Malware research and protection

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Don’t Just Be a Security Monitor. Prevent Breaches Before They Strike. Recorded: Apr 19 2017 49 mins
    Scott Grebe, Cybersecurity Product Marketing Manager
    As the use of cybertechnology grows, organizations and their security solutions are increasingly caught in the crosshairs of a growing global cybercriminal industry. No longer is it enough to simply detect network breaches. You need to prevent cyberthreats such as ransomware, IoT DDoS attacks and encrypted malware. Learn more about these threats and why it’s time to add new cyberdefenses to your business security arsenal.
  • Stopping the World’s Worst Ransomware Recorded: Mar 22 2017 53 mins
    Brook Chelmo
    Leverage a multi-layer threat elimination technology and a multi-engine sandbox to keep your organization from the world’s worst ransomware.

    •Learn about advanced threats and how they enter an organization
    •Learn how to keep your environments safe from ransomware
  • How to Prevent Ransomware Infections Recorded: Mar 1 2017 48 mins
    Brook Chelmo
    With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.

    SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.

    Learn how to:
    •Stay safe from ransomware and other advanced attacks
    •Practice good security hygiene
    •Use trusted automated tools to protect your network and endpoints
  • How safe are your email-based communications? Recorded: Feb 23 2017 35 mins
    Gus Maldonado
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Recorded: Feb 21 2017 64 mins
    Ken Dang
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • No IT security staff? No problem. Learn how to outsource your network security Recorded: Dec 7 2016 38 mins
    Dan Sell
    Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
    Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:

    •Meet all network security needs
    •Reduce management time
    •Eliminate upfront capital investment
    •Utilize subscription pricing for a predictable operating expense model
    •Gain valuable network reporting and expert insight
    •Have a network security professional manage it all
  • Attack vectors, have you been targeted? Recorded: Nov 17 2016 44 mins
    Rob Krug
    Modern threats take advantage of all areas of your network to cause maximum harm. Once inside your environment, they propagate freely within your network, as well as transmit information into and out of your network. In order to stop advanced attacks, networks need to be divided into security segments to contain and mitigate threat propagation.

    Join this upcoming webcast and discover proven best practices for implementing network security segments as an effective defense against advanced threats.
    • Monitor all – including encrypted – communications traversing the network for malicious activity or content.
    • Inspect traffic not just from the internet, but also from devices that connect behind traditional security checkpoints.
    • Prioritize critical infrastructure communications to ensure successful business operations.
    • And much more...
  • Keeping your retail network secure and compliant with SonicWall Solutions Recorded: Nov 14 2016 64 mins
    Bobby Cornwell
    Online shopping will rise sharply to an unprecedented level this coming holiday season. The conversation for consumers and retailers now focus on cyber safety and privacy for all. What actions must you take immediately to elevate your security posture?

    In this webinar, you’ll hear from our SonicWall security expert on the best ways to securing your retail business and safeguard your customer privacy information while also meeting the latest PCI standards.
  • Anti-ransomware - Fight back with adaptive network security Recorded: Nov 9 2016 63 mins
    Ken Dang
    Rasomware is spreading at record pace in 2016 as cybercriminals are actively using it to hold businesses, institutions and even individuals hostage. If you’ve been following the news, you’re probably aware that authorities and security experts are calling this the new crisis in cybercrime today. Research has shown that businesses with more than 100 employees make up 60 per cent of all ransomware attacks and those with more than 1,000 employees are targeted 25 per cent of the time.

    Attend our live webcast to learn effective ways to prevent and stop this dangerous and potentially costly threat.
  • The Dark Side of HTTPS Recorded: Oct 19 2016 61 mins
    Ken Dang
    As SSL/TLS use surges, hackers are hiding in plain sight. Don’t let your outmoded security system leave you vulnerable to under-the-radar hacks.

    Register for the webcast and learn how to:
    •Prevent SSL-encrypted attacks
    •Implement a network-based model for scaling Next Generation Firewalls
    •Solve performance challenges of SSL inspection
  • HackerCraft - Avoid the Breach Recorded: Sep 12 2016 41 mins
    Rob Krug, Systems Engineer
    This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.

    Rob will discuss the following:
    • Threat landscape 2016 recap
    • Fortifying the network
    • Security craftsmanship
    • Implementing the solution
  • Provide Stronger Web Filtering Controls for Your Organization Recorded: Sep 7 2016 59 mins
    Brook Chelmo
    Educational institutions, businesses and government agencies assume substantial risks when they provide employees or students Internet-capable computers, even when the devices are behind a firewall.

    Uncontrolled web access can result in non-productive web surfing, creating tremendous losses in productivity, not to mention the potential for legal liability.

    SonicWALL Content Filtering Service (CFS) 4.0 brings you enhanced granular web filtering controls at the policy level along with better policy management. In this webcast led by SonicWALL experts, you will take a deep dive into the new CFS 4.0 features.

    Learn how:
    • CFS 4.0 powerful new web filtering controls helps school districts and other organizations protect users
    • A host of new features delivers enhanced categorized control over your environments
    • The upgraded Content Filtering Client (CFC) extends protection and productivity to users outside the firewall
    • CFC ensures policy compliance, regardless of where the connection is established
  • SonicWALL Capture Recorded: Sep 7 2016 1 min
    animated video
    Introducing SonicWALL Capture
  • Learn how three network-threat-analysis engines keep your network safer Recorded: Sep 6 2016 1 min
    Video
    Learn how you can stay ahead of today's ever-changing threat landscape with SonicWALL Capture
  • Die wichtigsten Trends in der IT-Sicherheit 2014 Recorded: Mar 27 2014 56 mins
    Sven Janssen Dell SonicWALL Country Manager - Deutschland
    das Jahr 2014 bringt viele neue Herausforderungen für IT-Netzwerke. Nicht nur die Anzahl an Benutzern und Endpunktgeräten steigt konstant, auch die möglichen Einfallstore für immer raffiniertere Bedrohungen nehmen zu. Kleine wie große Unternehmen tun gut daran, sich auf dieses neue Szenario vorzubereiten.
    Melden Sie sich für das Webinar „Die wichtigsten Trends in der IT-Sicherheit 2014“ an und erfahren Sie, was diese Entwicklung für Sie bedeutet und was Sie tun können, um den neuen Bedrohungen immer einen Schritt voraus zu sein.
    Erfahren Sie:
    •Wie gefährlich die neue Generation von Exploits ist und mit welchen Angriffsarten Sie rechnen müssen
    •Welche Strategien Botnet-Betreiber heute einsetzen, um Rechner unerkannt unter ihre Kontrolle zu bringen
    •Welche Organisationen und Plattformen speziell im Fadenkreuz von Ransomware stehen
    •Warum NFC-Funktionen ein ideales Einfallstor für neue Exploits sind
    •Warum herkömmliche Sicherheitslösungen keinen Schutz mehr vor neuen, komplexen Bedrohungen bieten
  • Top trends driving IT security in 2014 Recorded: Mar 26 2014 51 mins
    Florian Malecki – EMEA Product & Solution Marketing Director
    IT networks are staged for massive changes in 2014. With users and endpoint devices proliferating and with threats to systems and data becoming more sophisticated and pervasive, organizations of all sizes must be prepared for what lies ahead.
    Register to attend the “Top Trends Driving IT Security in 2014” webinar to find out what these trends mean for your IT network, and what you can do to stay ahead of the game.
    You’ll learn:
    •What kinds of attacks to expect from a new generation of exploits
    •How botnet operators now cloak their command and control operations
    •What types of organizations and platforms will be targeted by ransomware
    •Why Near Field Communication capabilities open the door to new exploits
    •Why traditional security is no longer effective against new, sophisticated threats
  • Simplify Secure Email Exchange with Dell SonicWALL Email Security release 8.0 Recorded: Mar 25 2014 46 mins
    Swarup Selvaraman - Product Manager at Dell SonicWALL
    Dell SonicWALL Email Security provides superior protection from threats and compliance violations. Multiple proven, patented threat detection techniques deliver real-time protection from spam, phishing attacks and viruses. Compliance scanning and management prevent confidential data leaks and regulatory violations.

    New with release 8.0, an integrated email encryption cloud service ensures mobile-ready secure email exchange. Also, advanced email anti-spoofing and anti-phishing protection is now available with support for SPF, DKIM and DMARC email authentication capability
  • Visualizing and Quantifying Cybersecurity Threats through Firewall Reporting Recorded: Mar 24 2014 49 mins
    Wilson Lee
    Every day, terabytes of big data traverse your firewall. How do you know it is doing its job intercepting viruses, spyware, intrusions, attacks, and filtering nefarious websites and web applications?

    Make your security policies more effective with firewall reporting. Learn how you can:

    • Benefit from ways other companies use firewall reporting to be more
    secure
    • Make sense of the cyber-threats attacking your company with
    firewall analytics
    • Analyze who has been doing what, where, when, and how on your
    firewall
    • Easily create customized firewall reports with intuitive analytics tools
  • Definition of an Effective Intrusion Prevention System Recorded: Mar 18 2014 40 mins
    Mike Spanbauer, Managing Director of Research for NSS Labs, Daniel Ayoub, IPS Product Manager for Dell
    Cybercriminals often try to circumvent intrusion prevention systems by obfuscating advanced attacks using complex algorithms designed to evade detection. A tightly integrated intrusion prevention system with sophisticated anti-evasion capabilities with full stack inspection of inbound and outbound application traffic is required to defeat these threats.
    Register for this webinar with NSS Labs, the trusted authority in independent product testing, and Dell™ to learn about the requirements for an effective intrusion prevention system. Their findings are based on the NSS Labs 2013 Intrusion Prevention System (IPS) Security Value Map, which maps vendors based on security effectiveness and value (cost per protected Mbps) of tested product configurations. In addition, Dell will summarize key results from the Dell SonicWALL™ SuperMassive™ E10800 IPS Product Analysis Report.

    Join us to explore:
    •NSS Labs Intrusion Prevention System testing methodology
    •Security effectiveness, performance, and total cost of ownership
    •Dell SonicWALL SuperMassive E10800 IPS Product Analysis Report results
  • 2014 Top IT Security Trends Recorded: Mar 12 2014 37 mins
    Florian Malecki, EMEA Product & Solution Marketing Director, Dell Software – Security
    IT networks are staged for massive changes in 2014. With users and endpoint devices proliferating and with threats to systems and data becoming more sophisticated and pervasive, organizations of all sizes must be prepared for what lies ahead.
     
    Attend our  “Top Trends Driving IT Security in 2014” webinar to find out what these trends mean for your IT network, and what you can do to stay ahead of the game.
     
    You’ll learn:
    •What kinds of attacks to expect from a new generation of exploits
    •How botnet operators now cloak their command and control operations
    •What types of organizations and platforms will be targeted by ransomware
    •Why Near Field Communication capabilities open the door to new exploits
    Why traditional security is no longer effective against new, sophisticated threats
Dynamic Security for the Global Network
SonicWall provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the SonicWALL Global Response Intelligent Defense (GRID) Network, the SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Under the hood: Malware research and protection
  • Live at: Jan 17 2013 4:30 pm
  • Presented by: Eric Crutchlow, Sr. Product Manager
  • From:
Your email has been sent.
or close