Hi [[ session.user.profile.firstName ]]

1-2-2 Interview - Guardicore, Cybertech Tel Aviv 2020

Guardicore, Cybertech Tel Aviv 2020
1-2-2 Interview - Sharon Besser, VP Business Development & Shay Nehmad, Tech Lead and Open Source Software Developer
Recorded Feb 4 2020 10 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sharon Besser, VP Business Development & Shay Nehmad, Tech Lead and Open Source Software Developer
Presentation preview: 1-2-2 Interview - Guardicore, Cybertech Tel Aviv 2020

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The VDI Security Paradox: Reducing Risk, Maintaining Business Continuity & ROI Recorded: Jun 30 2020 62 mins
    Tom Fenton, Andrew Homer, Daniel Petrillo
    With more people working from home than ever before, virtual desktop infrastructures have arisen as a fast and cost-effective method to ensure that remote workers can access the applications they need from wherever they are. However, balancing cost-effectiveness and security can be difficult when most AV and EDR tools consume too many resources and drastically reduce endpoint density.

    In this session, you'll learn:

    - How to reduce risk in your VDI environment despite the fact that instances are already tight on resources and traditional security tools require heavy agents that drastically reduce endpoint density
    - How to monitor your VDI resource usage to ensure that parameters remain within tolerable limits even when security tools are protecting against advanced threats
    - A live demonstration of how various security tools impact CPU, memory, and network usage in real-time
    - A live demonstration of how Moving Target Defense can prevent the most advanced attacks without requiring the network for updates or impacting CPU or memory

    For additional VDI-tailored resources, visit our website: https://www.morphisec.com/products/virtual-desktop-infrastructure
  • The Third Annual Study on the State of Endpoint Security Risk Recorded: May 12 2020 63 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute and Andrew Homer VP of Business Development form Morphisec
    Join Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute and Morphisec's VP of Business Development, Andrew Homer in a discussion of the Third Annual Study on the State of Endpoint Security and Risk that includes responses from 671 security professionals. During this webinar you'll learn:

    - What is revealed by the results of this new survey.
    - How these results compare to previous studies.
    - The ramifications of these emerging trends.
    - How to mitigate the risk associated with these trends.
  • How to Ensure Security and Productivity for Employees Working Remotely Recorded: Apr 17 2020 59 mins
    John Pescatore, Daniel Petrillo, Andrew Homer
    The COVID-19 pandemic has caused many businesses to shift their workforce to remote workstations for the first time. Others must rapidly expand their remote worker count and levels of access. Overall, security teams need to be proactive in improving remote employee security without impacting productivity.

    During this webinar, John Pescatore of SANS discusses the challenges of dealing with the increased attack surface of laptops and other devices that are no longer on corporate networks as well as the remote work being done on employees' home computers. We also analyze the security implications of the proliferation of collaboration applications like Zoom, Microsoft Teams, and GoToMeeting.
  • 1-2-2 Interview - Guardicore, Cybertech Tel Aviv 2020 Recorded: Feb 4 2020 10 mins
    Sharon Besser, VP Business Development & Shay Nehmad, Tech Lead and Open Source Software Developer
    Guardicore, Cybertech Tel Aviv 2020
    1-2-2 Interview - Sharon Besser, VP Business Development & Shay Nehmad, Tech Lead and Open Source Software Developer
  • A Proactive Prevention Strategy to Reduce Risk Recorded: Jan 17 2020 40 mins
    Andrew Homer, VP Business Development
    Despite the increased security investments and proliferation of new infosec tools, the damage caused by cyber breaches continues to worsen. Meanwhile, the adversary plays by their own rules and evade detection by studying a static environment. They’ve had the luxury to decide when, where and how to attack, while organizations continue to remain in a reactionary defensive state.

    This session looks at the most common methods used to bypass detection. It will also discuss how to combat against the adversary advantage with simple proactive approaches to prevention. Finally, it presents recommendations to reduce risk, including a look at innovative technologies with Moving Target Defense to prevent advanced threats fileless attacks and zero days.
  • Microsoft and Morphisec: How to Prevent and Expose Unknown Threats Recorded: Nov 19 2019 46 mins
    Netta Schmeidler, VP Product Management, Morphisec and Efrat Kliger, Senior Program Manager, Microsoft
    Unknown threats exist in enterprise environments that are both predictable to the adversary and opaque to the defender. This is because the adversary can study their target to develop new techniques, then execute them undetected. History has shown that successful attacks rely on these adversarial advantages to bypass traditional defenses.

    Join our experts to learn how to leverage a combination of complete endpoint visibility from Microsoft Defender ATP and Moving Target Defense from Morphisec to deprive the adversary of their advantages so you can expose and prevent unknown threats.

    Attend this webinar to learn:

    - How threat actors leverage unknown techniques to achieve their goals without detection
    - The implications of defending predictable environments with limited visibility
    - How Morphisec and Microsoft Defender ATP deprive the adversary of the ability to act invisibly in a predictable environment
    - A roadmap to enable your company to prevent and expose unknown threats
  • Bulletproof Windows 10 Security Made Simple—Morphisec version 3.5 Recorded: Nov 12 2019 48 mins
    Andrew Homer, VP Business Development
    Morphisec Threat Prevention, together with Windows Defender AV, provides the strongest, broadest endpoint protection strategy to best protect your endpoints from the most malicious attacks, such as advanced in-memory threats, fileless attacks, zero-days and evasive malware. Replace Legacy AV with bulletproof security at lowest cost. See in action with live demo.
  • Rethinking Cybersecurity in Healthcare Recorded: Apr 2 2019 57 mins
    Skip Rollins, CIO, Freeman Health
    Healthcare organizations are attacked at more than double the average rate of other industries. Even the most stringent compliance with HIPAA does not mean sensitive health data is actually secure.

    While HIPAA security audit findings help healthcare companies build a solid initial cyber framework, security teams need to consider more innovative technology, and ultimately a new approach that transforms defenders into dynamic, resilient protectors of the business.

    In this webinar, Freeman Health CIO Skip Rollins discusses healthcare cyberthreat trends and concerns, the market’s general failure to address them, and how Morphisec’s Moving Target Defense is changing that. He offers practical advice for meeting healthcare’s unique cybersecurity challenges without adding to the burden of already overtaxed security personnel.
Morphisec: Built to prevent the most dangerous cyberattacks
Morphisec Endpoint Threat Prevention kills the most advanced threats and zero-days immediately when they first appear, with zero latency. Based on Moving Target Defense technology Morphisec turns the tables against the adversary with an offensive approach to critical in-memory protection across a wide coverage of advanced threats including APTs, zero-days, ransomware, evasive fileless attacks and web-borne exploits.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 1-2-2 Interview - Guardicore, Cybertech Tel Aviv 2020
  • Live at: Feb 4 2020 4:15 pm
  • Presented by: Sharon Besser, VP Business Development & Shay Nehmad, Tech Lead and Open Source Software Developer
  • From:
Your email has been sent.
or close