InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Windows Legacy Systems - Don't Be Caught Unprotected

Presented by

Adam Gordon, vCISO & Microsoft SME

About this talk

Microsoft recently announced the end of life (EOL) for Windows 7, 8, 8.1, 2008 R2, and their embedded variants. Windows 2012 is slated for EOL in October 2023. EOL versions account for 13 percent of global Windows desktops, I.e., hundreds of millions of endpoints run vulnerable operating systems. Well-loved Windows 7 leads the way at nearly 10 percent, with estimates that over 150 million endpoints still run the unsupported operating system. Join Microsoft expert Adam Gordon from ITProTV for a deep dive into how legacy systems impact organizations, and how to improve their security. We will cover: * The security risks of running legacy systems * Which is a greater legacy challenge—endpoints or servers * Why it’s so difficult to migrate legacy endpoints to modern operating systems * Why traditional EPP and EDR tools struggle to protect legacy systems * Practical recommendations for improving legacy systems’ security posture
Morphisec

Morphisec

2043 subscribers30 talks
Stop Undetectable Attacks
Morphisec offers prevention-first cybersecurity from endpoint to the cloud. Morphisec provides real-time risk visibility and secures device memory at runtime to stop the most damaging, undetectable attacks. This includes ransomware, supply chain attacks, fileless attacks, zero-days, and other advanced, stealthy, evasive attacks. Morphisec's Automated Moving Target Defense (AMTD) technology provides a lightweight, Defense-in-Depth security layer to augment solutions like NGAV, EPP, and EDR/XDR and close their runtime memory security gap against undetectable cyberattacks.
Related topics