Join SonicWall and Forrester Research Director, Robert Whiteley to learn how 2010 will usher in a new wave of investment in mobility technologies among savvy enterprises. Robert Whiteley will discuss findings from Forrester’s extensive studies into the work habits and mobility needs of information workers, task workers and a growing class of workers – the “mobile wannabe” – who, together, are making up a larger and larger portion of your workforce.
This session will explore:
• Who are the mobile workers of today and what does the mobile workforce of the future hold in store for IT?
• What tools, in terms of networks, devices and applications, matter to these workers
• What steps can IT take today to engender and secure an environment of mobility – and therefore productivity – for these workers?
About Rob Whiteley
Robert serves Infrastructure & Operations professionals. Prior to joining the Infrastructure & Operations team, Robert was a research director on the security and risk team. He led Forrester's research efforts on IT security frameworks; governance, risk, and compliance (GRC); identity and access management (IAM); application security; data security; and IT infrastructure security. He also provided Forrester's coverage of specific security topics that includes network access control (NAC), network segmentation, and branch office security.
About Chris Witeck:
As a Director of the Product Management Team at SonicWALL, Chris Witeck drives the development road map for the all SonicWALL SSL VPN products and services. His responsibilities include defining product requirements, establishing relationships with key customers to drive those requirements, and helping to define strategic marketing partnerships.
RecordedApr 1 201062 mins
Your place is confirmed, we'll send you email reminders
Scott Grebe, Cybersecurity Product Marketing Manager
As the use of cybertechnology grows, organizations and their security solutions are increasingly caught in the crosshairs of a growing global cybercriminal industry. No longer is it enough to simply detect network breaches. You need to prevent cyberthreats such as ransomware, IoT DDoS attacks and encrypted malware. Learn more about these threats and why it’s time to add new cyberdefenses to your business security arsenal.
With the growth of ransomware families by 600% in 2016, there is no slowdown in sight for one of the worst malware variants in history.
SonicWall’s security researcher and advocate, Brook Chelmo, will talk about the impact of ransomware as well as other advanced persistent threats such as zero-day attacks. SonicWall has the expertise and resources to help you stay ahead of developing threats.
Learn how to:
•Stay safe from ransomware and other advanced attacks
•Practice good security hygiene
•Use trusted automated tools to protect your network and endpoints
Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.
This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
Learn how this comprehensive, flexible and scalable solution can:
•Scan a broad range of email attachment types to detect advanced threats
•Analyze them in a multi-engine sandbox
•Block them prior to a security verdict
•Rapidly deploy remediation signatures
Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.
Some report highlights:
•Ransomware changes in 2016 and the effects on malicious email and exploit kits
•The growth and challenges of SSL
•How Internet of Things devices were exploited and different security steps some organizations are taking in response
•Developments in Android security
•Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
Not every organization has the in-house resources needed to support IT security. Outsource your network security with SonicWall Security-as-a-Service (SECaaS). This flexible, affordable subscription-based service lets you detect and block a wide range of advanced and emerging threats, including intrusions, viruses, spyware, worms, Trojans, key loggers, rootkits, botnets and “zero-day” malware.
Join this webcast to find out how the SonicWall SECaaS subscription-based service provides organizations of every size with the ability to:you can benefit from:
•Meet all network security needs
•Reduce management time
•Eliminate upfront capital investment
•Utilize subscription pricing for a predictable operating expense model
•Gain valuable network reporting and expert insight
•Have a network security professional manage it all
Modern threats take advantage of all areas of your network to cause maximum harm. Once inside your environment, they propagate freely within your network, as well as transmit information into and out of your network. In order to stop advanced attacks, networks need to be divided into security segments to contain and mitigate threat propagation.
Join this upcoming webcast and discover proven best practices for implementing network security segments as an effective defense against advanced threats.
• Monitor all – including encrypted – communications traversing the network for malicious activity or content.
• Inspect traffic not just from the internet, but also from devices that connect behind traditional security checkpoints.
• Prioritize critical infrastructure communications to ensure successful business operations.
• And much more...
Online shopping will rise sharply to an unprecedented level this coming holiday season. The conversation for consumers and retailers now focus on cyber safety and privacy for all. What actions must you take immediately to elevate your security posture?
In this webinar, you’ll hear from our SonicWall security expert on the best ways to securing your retail business and safeguard your customer privacy information while also meeting the latest PCI standards.
Rasomware is spreading at record pace in 2016 as cybercriminals are actively using it to hold businesses, institutions and even individuals hostage. If you’ve been following the news, you’re probably aware that authorities and security experts are calling this the new crisis in cybercrime today. Research has shown that businesses with more than 100 employees make up 60 per cent of all ransomware attacks and those with more than 1,000 employees are targeted 25 per cent of the time.
Attend our live webcast to learn effective ways to prevent and stop this dangerous and potentially costly threat.
This presentation will provide an in-depth analysis of the latest trends, tactics, and news of the cyber threat landscape as seen from the eyes of a practicing security engineer. Once you have seen what the bad guys have been up to today, you will be exposed to a crash course of security policy management and network security architecture design that will help avoid the breach of tomorrow.
Rob will discuss the following:
• Threat landscape 2016 recap
• Fortifying the network
• Security craftsmanship
• Implementing the solution
Educational institutions, businesses and government agencies assume substantial risks when they provide employees or students Internet-capable computers, even when the devices are behind a firewall.
Uncontrolled web access can result in non-productive web surfing, creating tremendous losses in productivity, not to mention the potential for legal liability.
SonicWALL Content Filtering Service (CFS) 4.0 brings you enhanced granular web filtering controls at the policy level along with better policy management. In this webcast led by SonicWALL experts, you will take a deep dive into the new CFS 4.0 features.
• CFS 4.0 powerful new web filtering controls helps school districts and other organizations protect users
• A host of new features delivers enhanced categorized control over your environments
• The upgraded Content Filtering Client (CFC) extends protection and productivity to users outside the firewall
• CFC ensures policy compliance, regardless of where the connection is established
Jane Wasson, Senior Product Marketing Manager, Dell Security
Mobile workers are demanding access to more resources from more devices, placing a growing strain on legacy access and security infrastructure. Join this webinar to learn what your network needs to be ready for looming challenges in mobile access and security. Discover:
• Why explosive mobile growth requires you to modernize access infrastructure
• How you can enable access for more devices, to more resource, more securely
• How to provide comprehensive, end-to-end data protection and security for your mobile deployment
Florian Malecki, International Director of Product Marketing
Triple-A ratings are normally associated with chief financial officers keeping a tab on John Moody’s bond credit rating. But, in the technology world, how can a chief information officer or IT decision maker rate the efficiency of an IT security implementation?
A comprehensive security approach should encompass three factors. It should be adaptive to threats, business requirements and the ever-evolving use of the internet within the corporate network, have adapted to meet the specific requirements of an organization and have been adopted fully by end users.
These factors can be summarized as a “Triple-A” security approach. If you achieve this, you can strengthen your overall security posture.
Attend our webcast to see how your organization can have the best security possible, and use IT security to drive innovation – instead of blocking it.
Scott Grebe, Product Marketing Manager, Wireless Security
High-speed 802.11ac wireless has arrived, with up to 3X the speed of older standards. And while high-speed WiFi is vital to the productivity and success of today’s organizations, you need make sure it is secure against emerging threats.
Attend this webcast to learn:
• The benefits of the 802.11ac wireless standard
• Why your wireless network security needs to be as strong as your wired network
• What you need to consider when choosing a wireless security solution
These are trying times for IT professional. Each and every day you face the risk of your network being hacked by the newest zero-day threat. Not long ago, it was the Venom and the TV5 Monde breach, as well as Shellshock a few months ago. And, while you’re still working to defend your infrastructure from these two critical threats, the cybercriminal community is working just as hard trying to exploit the weaknesses of your network. So how well are you prepared for the next attack?
A comprehensive security approach should encompass three factors. It should be adaptive to threats, business requirements and the ever-evolving use of the internet within the corporate network, have adapted to meet the specific requirements of an organization and have been adopted fully by end users. These factors can be summarized as a “Triple-A” security approach.
Attend this webinar to see how you can take advantage of this “triple A security approach” as well as modern-day network security tools and services to achieve ongoing protection against new threats as they occur and use IT security to drive innovation – not blocking it.
Ken Dang, Product Marketing Manager, Dell Security
2014 was a year pack with hacker attacks on payment card infrastructures but we’re not out of the woods yet. Dell’s threat research team have regularly observed new active pieces of advanced Point-of-Sales (POS) malware in 2015. Why so many retailers still soft targets? For cyber criminals, retail is where the money is. The possibility of spiriting away and selling thousands or millions of credit card details and chunks of consumer information is powerful incentive.
Ken Dang, Product Marketing Manager, Dell Security
It’s clear that cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks. In this Dell Security Annual Threat webcast, we’ll present the most common attacks Dell SonicWALL observed in 2014 and the ways we expect emergent threats to affect small and medium businesses, as well as large enterprises, throughout 2015. Our goal is not to frighten, but to inform and provide organizations of all sizes with practical advice that will help them adjust their practices to more effectively prepare for and prevent attacks, even from threat sources that have yet to emerge.
SonicWall provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the SonicWALL Global Response Intelligent Defense (GRID) Network, the SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.