Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.
The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
RecordedDec 4 201328 mins
Your place is confirmed, we'll send you email reminders
Abhinav Sharma and Dave Roche, Product Managers for Symantec Secure App Service
With the explosion of connected objects and mobile devices, publishing or sharing software - even internally - has become a real challenge for companies with a coding activity. In this webinar, we will explore the code signing threat landscape and share our best practice and solutions to all your code signing needs. You will learn about:
- the value of code signing today and the new code signing use cases in the world of IoT
- the risks associated with traditional code signing: key management, auditing and reporting, multitude of signing platforms and files, compliance, embedding in the development process, etc.
- the security and development costs to take into account
- how to transition from a traditional to a next generation code signing activity thanks to Cloud based signing
Akhil Verma, Product Marketing Manager at Symantec and Andy Shoemaker, Founder and CEO of NimbusDDOS
Over the last few months we have seen DDoS attacks become more ferocious and attackers more sophisticated. As DDoS threats continue to evolve, your traditional mitigation solution may not be enough to protect you.
Watch as we follow a fictitious attacker analysing a target, exploring and finding weaknesses. Experience how the attacker launches a DDoS attack with devastating effects. Learn about the advantages and limitations of various mitigation technologies, and be given a DDoS preparedness roadmap to help you navigate the DDoS landscape.
Ben Herzberg, Head of Security Response at Imperva Incapsula and Akhil Verma, Product Marketing Website Security at Symantec
The latest DDoS Threat Report from Imperva Incapsula shows that DDoS attacks continue to grow in size with a significant increase in network layer attacks. With the scale and reach of DDoS threats increasing, enterprises need to be vigilant to protect their assets and customer data. Join our webinar to learn how you can protect your enterprise from global cybersecurity threats.
At the webinar you’ll learn:
• Insights into global DDoS attack patterns
• Best cyber security practices
• How to harden your current security practices
• How to build a scalable cyber security strategy
ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt.
ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie die Entwicklung des Internet der Dinge die Grenzen der Skalierbarkeit des derzeitigen Standardalgorithmus RSA übersteigen.
Die Zuverlässigkeit und Leistung von ECC sind inzwischen klar erwiesen. Die größte Hürde für den Einsatz des Algorithmus ist mangelnde Kompatibilität mit vorhandener Technik. Deshalb hat Symantec Hybrid-SSL-Zertifikate mit ECC und RSA entwickelt. Mit diesen Zertifikaten können Sie Ihre bisherigen Infrastrukturinvestitionen weiterhin nutzen und gleichzeitig Kompatibilitätsprobleme vermeiden.
In diesem Webcast erfahren Sie,
welche Vorteile ECC in puncto Sicherheit, Zuverlässigkeit und Kapazität bietet,
wie die Zertifikatskette eines Hybrid-SSL-Zertifikats mit ECC und RSA aussieht und
wie Sie ein solches Zertifikat beantragen.
ECC is the latest encryption algorithm used for key exchange and authentication purposes in the SSL/TLS protocols.
ECC is expected to replace RSA (current standard) as the scalability of RSA has become too limited to deal with the explosion of the number of mobile devices, machine-to-machine (M2M) communications and the development of the IoT (internet of the things).
The reliability and performance of ECC no longer needs to be demonstrated. However, a significant obstacle to the adoption of ECC lies on the lack of compatibility for such algorithm. This is why we have created ECC/RSA hybrid SSL certificates, allowing you to protect your current infrastructure investment while mitigating potential compatibility issues at the same time.
Join us in this webcast and find out:
-what are the main benefits of ECC in terms of strength, reliability and capacity
-how ECC/RSA hybrid certificate chains work
-what is the enrolment process
Everything you need to know about website security and online threats
Symantec Website Security Solutions take SSL protection and trust to a whole new level. Secure your website, increase customers' confidence, and reach the full online potential of your business. You can learn about the threat landscape and Symantec product updates by subscribing to this channel.
Blazent's CEO, Charlie Piper and Dan Ortega introduce the company strategy, vision and it's value to customer's and MSP partners. Together, Charlie and Dan describe how Blazent's platform finds the the most accurate data to improve decision manking in IT and beyond.
Stu Sjouwerman, CEO of KnowBe4, has seen first-hand the devastating impact of ransomware on healthcare entities. And he knows traditional defenses aren't enough to ward off attackers. What's needed is a whole new approach to user education.
La empresa de la actualidad, a medida que adopta la transformación digital, necesita abordar una série de retos para avanzar.
En esto webinar los especialistas de CA muestran como el CA Live API Creator es una manera increíblemente rápida de crear API's.
This webinar will provide tips for successfully navigating the expanding role of the Chief Information Security Officer as an essential business leader. Explore leading practices for managing cybersecurity risk as a people, process and IT leader. Get tips for building a working relationship with other executive stakeholders in audit, compliance and enterprise risk. And hear how other CISOs are establishing more productive reporting relationships with the board of directors. Whether you’d like to expand your role as a risk and security professional, gain more executive support for key initiatives, or improve your relationship with the board, you’ll take away actionable insights to apply to your own journey as an essential business leader.
Ransomware is currently one of the most disruptive security challenges for enterprises. As it moves from an individual employee's PC to the corporate network, the impact can be significant. Despite research and analysis by security firms and analysts, most don't have a good idea of how a piece of ransomware actually operates, i.e. what is affected and when, what signals to look for, etc. Exabeam researchers have detonated nearly 100 strains of ransomware in the labs and produced a detailed analysis of how a ransomware attack actually unfolds, and how an organization might respond to shut it down. Join Exabeam and (ISC)2 on July 21, 2016 at 1:00PM Eastern and gain a better understanding of the mechanisms of ransomware, how to detect it and shut down an attack.
Thanks to advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data, ransomware is on a tear. To protect your organization from having to pay attackers to free your data, you need to evolve beyond a layered security approach to a prevention-oriented architecture – or face threats of Jurassic proportions.
Learn more about the right architectural approach for effectively preventing ransomware infections and other sophisticated threats, even across distributed IT environments.
Many enterprise organizations are moving beyond antivirus software, adding new types of controls and monitoring tools to improve incident prevention, detection, and response on their endpoints. Unfortunately, some of these firms are doing so by adding tactical technologies that offering incremental benefits only.
So what’s needed?
A strategic approach that covers the entire ESG endpoint security continuum from threat prevention to incident response. A truly comprehensive solution will also include advanced endpoint security controls that reduce the attack surface and tight integration with network security, SIEM, and threat intelligence to improve threat detection and response processes.
Join ESG senior principal analyst Jon Oltsik, Intel Security, and Bufferzone on a webinar on July 21 at 10am PT/1pm ET to learn more about next-generation endpoint security requirements and strategies.
Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
Cybersecurity Webcast co-hosted by SANS and Palo Alto Networks
In financial institutions, investments in cybersecurity may occur in fits and starts due to actual incidents, media coverage, or perceived risk. This presents challenges in maintaining a consistent security posture, especially as the threats and the attack surfaces evolve continuously.
In this webcast you will learn about the value of constant monitoring and awareness of your network traffic, the role and relevance of anomalies, and the benefits of an overall security architecture for financial institutions.