Hi [[ session.user.profile.firstName ]]

Closing the Backdoor with Endpoint Security

Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

In this webcast you’ll learn:

•The current threat landscape
•What backdoors are
•How to stop backdoors like Calisto
•How to roll back the damage of an attack like ransomware
Recorded Oct 22 2018 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
Presentation preview: Closing the Backdoor with Endpoint Security
  • Channel
  • Channel profile
  • Endpoints are primary attack targets. Close the Backdoor with Endpoint Security Jul 24 2019 6:00 pm UTC 62 mins
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • How K-12 Districts Use Wireless Security to Protect Students, Faculty and Staff Jul 23 2019 6:00 pm UTC 39 mins
    Holly Davis, CEO, Komplement
    Safeguarding K-12 networks is a delicate yet critical undertaking. Connectivity is critical. Student safety is paramount. Yet access to budgets, staff and resources is limited. This unique webinar brings together a panel of experts from security, networking and education to outline how districts can expand wireless security to the edge — even without firewalls. The must-attend session will explore:

    •Emerging threats to both network safety, insider threats and student privacy
    •Seamless ways to monitor and manage access to dangerous content
    •How to simplify wireless deployment, management and analytics
    •Methods to enhance campus-wide WiFi performance, coverage and capacity
    •Opportunities to leverage the federal E-rate program to help eligible districts simultaneously stretch budgets, improve security and protect students
  • The Critical Role of Endpoint Detection and Response Recorded: Jun 26 2019 49 mins
    Brook Chelmo, SonicWall & Michael Osterman, Osterman Research
    Join SonicWall and Osterman Research, for a discussion about Endpoint Detection and Response (EDR). We will share the Osterman Research’s findings into what are the top three Endpoint Detection and Reponse (EDR) priorities, as well as top concerns with deploying advanced endpoint anti-malware solutions.

    You will also learn about:
    •Average company threat statisics
    •Various EDR capabilities
    •How modern anti-malware solutions mitigate and remediate attacks
    •How to deploy advanced anti-malware solutions behind and away from perimeter defenses
  • Building a Layered Security Solution Recorded: Jun 19 2019 61 mins
    Rob Krug, Solution Architect, SonicWall
    Are persistent cyberattacks already lurking in your network?

    To prevent these modern, never-stopping attacks, organizations require a layered security solution that systematically leverage overlapping layers of protection, detection and inspection.
    SonicWall solution architect Rob Krug explains how this end-to-end approach can protect your organization.

    Register now to learn how to:

    •Stop everything from ransomware to encrypted attacks
    •Add overlapping layers to your security strategy
    •Bolster security across your networks and endpoints
    •Protect your business, and your budget
  • How K-12 Districts Use Wireless Security to Protect Students, Faculty and Staff Recorded: Jun 6 2019 40 mins
    Holly Davis, CEO, Komplement
    Safeguarding K-12 networks is a delicate yet critical undertaking. Connectivity is critical. Student safety is paramount. Yet access to budgets, staff and resources is limited. This unique webinar brings together a panel of experts from security, networking and education to outline how districts can expand wireless security to the edge — even without firewalls. The must-attend session will explore:

    •Emerging threats to both network safety, insider threats and student privacy
    •Seamless ways to monitor and manage access to dangerous content
    •How to simplify wireless deployment, management and analytics
    •Methods to enhance campus-wide WiFi performance, coverage and capacity
    •Opportunities to leverage the federal E-rate program to help eligible districts simultaneously stretch budgets, improve security and protect students
  • Secure WiFi Management Revolutionized in the Cloud Recorded: May 22 2019 53 mins
    Srudi Dineshan, Product Marketing Manager
    Leverage the ultimate flexibility and reliability of the cloud to simplify WiFi planning, management and network optimization. Join us to understand the capabilities of the all-new SonicWall secure wireless solution, including WiFi Cloud Manager and SonicWave access points. Register today to:

    •Deploy powerful wireless network security — with or without a firewall
    •Learn how to simplify management with single-pane-of-glass visibility
    •Explore the benefits of Zero-Touch Deployment
    •Enhance WiFi user experiences
    •Reduce CapEx with limited-time WiFi promotion
  • Can You Spot and Stop Cryptojacking Before it Causes Damage? Recorded: May 14 2019 61 mins
    Brook Chelmo and Migo Kedem; passionate security experts from SonicWall and SentinelOne.
    Join SonicWall and SentinelOne security experts for this live webinar. We will cover the modern threat landscape based on SonicWall’s 2019 Threat Report and discuss the impact that cryptojacking makes on your organization.

    In this webcast you’ll learn:
    •The impact that Cryptojacking makes and how it fits into the current threat landscape
    •How to tell if you have an infection
    •How to stop it from the perimeter to the endpoint
    •How modern endpoints mitigate and remediate attacks
  • The State of Cyber Arms Race: Unmasking the Threats Coming in 2019 Recorded: Apr 17 2019 41 mins
    John Gordineer, Director, Product Marketing, SonicWall
    The cyber arms race does not discriminate or differentiate. If a network, identity, device or data are of value, cybercriminals will identify, target and ruthlessly attack. To promote global awareness and facilitate important dialogues, SonicWall remains steadfast in its commitment to research, analyze and share threat intelligence.
    Join SonicWall security experts as we share findings, intelligence, analysis and research from the 2019 SonicWall Cyber Threat Report.
    This exclusive session will help you improve your security preparations and posture going forward.
  • Securing Office 365 & G Suite against phishing, compromised accounts & data loss Recorded: Apr 10 2019 57 mins
    Ganesh Umapathy, Product Marketing Manager, SonicWall
    Many organizations are adopting cloud platforms such as Office 365 or G Suite. These offer a broad range of productivity tools beyond just email, so email security point solutions alone cannot protect the entire platform from targeted attacks.

    Hear from our SonicWall expert to learn:
    •The key capabilities needed to protect cloud office platforms
    •How SonicWall Cloud App Security can help you protect email, data and user credentials for Office 365, G Suite and other SaaS apps
  • Securing your SaaS landscape Recorded: Apr 3 2019 55 mins
    Ganesh Umapathy - SonicWall Product Marketing Manager & Michael Osterman, President, Osterman Research
    The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations.

    Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware, email fraud

    We will cover the following:
    •Major concerns and issues with SaaS adoption
    •What to look for in a CASB solution
    •Overview of SonicWall Cloud App Security
  • Can you stop these two endpoint threat vectors? Recorded: Feb 27 2019 62 mins
    Brook Chelmo, Sr. Product Marketing Manager, SonicWall | Migo Kedem, Senior Director of Products & Marketing, SentinelOne
    Join us for an informative webcast between SonicWall and SentinelOne, two pioneers in the network and endpoint security space. They will give a live demonstration of two different attack vectors in action to demonstrate the abilities of modern endpoint security solutions.

    In this webcast you’ll learn:

    • How to stop threats that travel through the network without a file
    • How to cut out a common attack method that takes advantage of the good Samaritan in your office
    • Best practices for network security hygene to sanitize traffic before it gets to the endpoint
  • Cyber Risk Management & Response with Single-Pane-of-Glass Visualization Recorded: Feb 13 2019 49 mins
    Ken Dang, Sr. Product Marketing Manager
    You are deeply concerned with the constant risks of your organization becoming a victim of a security breach. You are also aware that without real-time visibility and knowledge into everything that goes on in your security environment, you face hidden dangers of the unknown that at times, have led to bad outcomes. These risks might be a result of unpatched network and application vulnerabilities, unauthorized intrusions, risky user activities and SaaS applications, and/or malicious malware attacks that could spread ransomware across the organization.

    Successful attacks can halt an entire organization’s momentum, as stakeholders divert their focus from key business priorities to damage control. The inability to uncover and respond to these risks hampers an organization’s ability to protect sensitive information, meet compliance and maintain normal service operations.

    This webcast will discuss how SonicWall’s Risk Meters, Analytics and Cloud Apps Security services give you a direct line of sight into the threat intelligence of your network environment in real time.

    In this webcast, you will discover how to:

    • Get single-pane visibility and knowledge of your network security environment
    • Gain deeper knowledge and understanding of potential and real threats though risk meters
    • Respond to risks with greater precision and speed using extensive analytics
  • Strengthen your security posture with SonicWall virtual firewalls Recorded: Jan 23 2019 45 mins
    Srudi Dineshan, Product Marketing Manager & Mallikharjun Vatti, Sr. Product Manager, SonicWall
    With cloud adoption growing each day, next-generation firewall capabilities are essential to protect workloads in the cloud from advanced threats via automated real-time detection and protection

    Join our product team, to learn more about how SonicWall Network Security virtual (NSv) firewall series can help strengthen the security posture of your hybrid and multi-cloud environments.
  • Wireless Best Practices for Your Retail Needs Recorded: Nov 27 2018 59 mins
    Srudi Dineshan, Product Marketing Manager
    One of the major challenges for retailers is ensuring Payment Card Industry (PCI) compliance and the need to secure customer data. Poorly managed wireless networks are one of the common PCI mistakes. This webinar will walk through some of the wireless best practices to ensure your data remains secure and compliant.

    This webinar will cover the wireless threats faced by retailers and how you can apply best practices to:

    • Protect your retail business in the evolving cyber threat space
    • Secure wireless connectivity
    • Stop known and unknown threats
    • Ensure that your customers and employees are connected securely
  • How to make your move to the cloud faster and safer Recorded: Nov 5 2018 60 mins
    Srudi Dineshan, Product Marketing Manager & Suroop Chandran, Senior Product Manager, SonicWall
    Are you looking to migrate to the cloud? How confident are you that your cloud infrastructure and business applications are secure?

    Join SonicWall experts to learn how to protect your public and private cloud infrastructure from advanced threats. This webinar will include:
    -How to leverage next-gen security for public and private cloud infrastructure and business applications
    -How to gain complete visibility into virtual environment for threat prevention
    -What’s new with NSv and WAF
  • Closing the Backdoor with Endpoint Security Recorded: Oct 22 2018 63 mins
    Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
    Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

    This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

    In this webcast you’ll learn:

    •The current threat landscape
    •What backdoors are
    •How to stop backdoors like Calisto
    •How to roll back the damage of an attack like ransomware
  • Visibility, Knowledge and Control of Your Security Ecosystem is Power Recorded: Oct 15 2018 60 mins
    Ken Dang, Sr. Product Marketing Manager
    Managing security and responding to cyber events are major operational challenges. Moreover, insufficient visibility and knowledge of these risks within your network fabric compound the problem. This makes it extremely difficult to detect unsafe network and user activities, and calibrate security policies at the speed and accuracy you need to maintain a robust security posture.

    Making matters worse, you are burdened with operating complex and fragmented security silos. Administrations are cumbersome and labor-intensive. Processes are uncorroborated and non-compliant. This level of technology fragmentation and operation disarray demands an integrated approach for security, management, analytics and real-time threat intelligence.

    Join this webinar to explore how to establish a holistic, connected approach to security orchestration. Learn to take smarter security policy and control actions toward a sharper, safer and compliant network environment. You’ll discover how to:

    • Achieve single sign-on (SSO) access to provision and manage network, endpoint and cloud security services
    • Govern entire security operations and services from one simple, common cloud interface
    • Gain single-pane visibility and situational awareness of the network security
    • Get error-free policy management
    • Deploy and provision firewalls remotely using the cloud
  • How to Secure Mailboxes when Moving to G Suite Recorded: Oct 10 2018 60 mins
    Ganesh Umapathy, PMM & Ed Gradek Email Security Solutions, Architect, SonicWall
    Organizations are increasingly adopting cloud email services such as Gmail, included in G Suite, as part of their cloud strategy.

    Many organizations are also evaluating cloud-based email security solutions to close security gaps and mitigate risks that arise from the migration between on-premise and cloud email services.

    Join this webinar for a live demo and learn how to effectively defend your G Suite with:

    •Superior advanced threat protection against email fraud, business email compromise (BEC) and targeted phishing attacks
    •Data loss prevention (DLP)
    •Email continuity
  • Retail Organizations, PCI Compliance, Security & You Recorded: Oct 1 2018 46 mins
    Brook Chelmo, Sr. Product Marketing Manager for SonicWall
    Accepting payment cards is a given for retailers and hospitality businesses. That means complying with the Payment Card Industry Data Security Standard (PCI).

    High-profile security breaches have become the norm along with laws mandating public disclosure in the event of one happening. Attackers, laws and compliance standards create a stressful environment for anyone who wants to do business with credit cards.

    This webcast will cover the threat landscape and discuss how attackers are trying to get the PII data that you hold. Learn how to better protect against advanced cyberattacks and customized malware from the perimeter to the endpoint.

    In this webcast you’ll learn how to:
    • Protect your retail business in the current threat landscape
    • Stop threats at the perimeter
    • Knock out phishing attacks
    • What steps to take to become PCI compliant
    • Discover and stop unknown forms of cyberattacks
  • Next Generation Firewall (NGFW) 8.0 Group Test Results – SonicWall Recorded: Sep 12 2018 51 mins
    Mike Spanbauer, Vice President, Research Strategy NSS Labs & Lawrence Pingree, Vice President, Product Management, SonicWall
    Firewall technology is one of the largest and most mature security markets, and the next generation firewall (NGFW) is a prime example of how cybersecurity controls continue to evolve in the face of a constantly changing attack surface. These network security products combine firewall capabilities with intrusion prevention system (IPS) functionality, application control, user awareness, and the capability to integrate threat intelligence feeds.

    NSS Labs recently announced the results of our Next Generation Firewall (NGFW) 8.0 Group Test. In this year’s test, products from 10 of the industry’s leading NGFW vendors were examined for security effectiveness, performance, and total cost of ownership (TCO). In this eighth iteration of the NGFW test, evasion testing was expanded to include resiliency against modified exploits, and the test also included secure sockets layer (SSL)/transport layer security (TLS) testing.

    Tune into this webinar to learn how SonicWall performed in NSS Labs' NGFW 8.0 Group Test.
SonicWall
This channel is designed to meet the informational needs of SonicWall customers to ensure you can optimize your investments in our solutions across the board, including; Next-Generation Firewalls, Secure Mobile Access, Email Security and Data Protection.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Closing the Backdoor with Endpoint Security
  • Live at: Oct 22 2018 3:00 pm
  • Presented by: Brook Chelmo, Senior Product Marketing Manager, SonicWall Migo Kedem, Senior Director of Products & Marketing SentinelOne
  • From:
Your email has been sent.
or close