Beyond best practices – Lessons from the HP Cyber risk report
The complexity and difficulty of securing enterprises only grows with the passage of time. However, with the right information, organizations can significantly reduce their attack surface, substantially mitigate risks, and prevent the losses and damages associated with successful attacks. To that end, we examined the areas that significantly contributed to the growing attack surface in 2013. Come learn what those are and what – beyond standard best practices – you can do today.
RecordedMar 25 201437 mins
Your place is confirmed, we'll send you email reminders
TJ Alldridge and Satinder Khasriya, Product Marketing, Trend Micro TippingPoint
The Trend Micro TippingPoint Threat Protection System (TPS) family offers comprehensive threat protection against known and zero-day attacks. Attend this webinar to see the many ways the TPS can be used to protect your environment against the latest threats as well as the old ones too.
TJ Alldridge, Product Marketing Manager, HP TippingPoint
Advanced threats and targeted attacks are wreaking havoc in our networks and desktop machines. High-profile attacks seem to make headlines every few weeks. While no security solution is 100% effective, join us to discuss best practices that could bring your security effectiveness closer to that goal.
To protect their networks and critical data from being compromised, enterprises must be able to acquire and assess new information constantly, and take action to identify vulnerabilities, remediate and minimize the likelihood of attackers permeating through their network. HP TippingPoint Threat Protection System delivers comprehensive network security integrating vulnerability management to provide actionable threat intelligence with unparalleled visibility and analytics.
Robin Layland, Layland Consulting, Steve Povolny, TippingPoint DVLabs, Brian Foster, Damballa
Industry Analyst Robin Layland is joined by Steve Povolny of HP and Brian Foster of Damballa to focus on what you need to do to stop attacks that have made it past your perimeter defenses. We also cover mitigation needs based on your risk profile. We then review how you can spot breaches and how to easily keep your security up to date. Finally we cover what to look for in an advanced threat protection vendor.
Hussain Abduljalil, Manager Solution Architecture at Gulf Air
Since 2006, Gulf Air has used HP TippingPoint Intrusion Prevention System (IPS) to protect their network from external threats. With the passage of time the internal attack vectors were also identified as being a high-risk area. In this webinar, Hussain Abduljalil of Gulf Air explains how Gulf Air evolved their network security from an external IPS setup to a unified IPS solution providing the required levels of protection and throughput needed. And why they did it with HP TippingPoint.
Watch the webinar to learn:
• The evolution of IPS setup in Gulf Air
• How advanced malware threats (like the Conficker worm) were identified as a risk
• Why Gulf Air choose HP TippingPoint for network security
• The way forward
While anonymizers can serve a positive purpose by protecting a user’s personal information by hiding their computer’s identifying information, their use in your network environment can be dangerous. Anonymizers can evade enterprise security devices, and their misuse can make your organization susceptible to malware and unwanted intrusions. Attend this session to learn how you can detect and block elusive anonymizers from wreaking havoc on your network.
Bob Corson, Director, Solutions Marketing, TrendMicro & Patrick Hill, Sr Product Line Manager, DVLabs
Victims of targeted attacks, or advanced persistent threats (APTs), make the headlines. Attend this webinar to learn how APTs work and how to defend your business from them. Pat Hill, HP TippingPoint Product Manager, and Bob Corson, Director, Solutions Marketing, discuss the anatomy of an attack and why it's critical to detect and isolate the attack at "patient zero," the initial point of infection.
Attend this webinar to learn:
· How the bad guys evade your security
· The counter measures you need to detect and block them
· How HP TippingPoint and Trend Micro have partnered to neutralize patient zero
Bob Corson, Director, Solutions Marketing, Trend Micro & Patrick Hill, Senior Product Line Manager for HP Enterprise Security
Target, Sony, Anthem - the biggest recent breaches have taught us all big lessons. Namely, that traditional security solutions are ineffective against advanced threats. And today's targeted attacks not only can rob your organization of sensitive data, customers, reputation - they can cost senior leaders their jobs.
Register for this session to learn the 6 Keys to Success in Fighting Advanced Threats. Hear first-hand from security leaders at HP and Trend Micro how to:
- Monitor all attack phases;
- Mind security gaps;
- Defeat anti-evasion features & more.
A next-generation intrusion prevention system (IPS) shouldn't just keep your company safe, it should be quick to implement and easy to manage. HP TippingPoint is the simple, effective, and reliable solution for network security that protects you faster—when every second matters.
This video explains how TippingPoint stops threats faster. Watch it to learn:
•How HP TippingPoint provides 80% threat coverage out of the box
•How most companies install TippingPoint in less than two hours
•How TippingPoint filters key on vulnerabilities rather than exploits to keep you safer and reduce false positives
John Kindervag, Vice President and Principal Analyst, Forrester Research
Hackers don't have change management, so they can change and deploy threats faster than companies can respond to them. That's the message of Forrester Principal Analyst John Kindervag in this short but important video. He explores the impact of a changing threat environment and new zero-day threats on cyber defenses.
View it to learn:
•Why it's important for security professionals to change their mindset when dealing with the changed threat landscape
•Why conventional defenses based on exploit signatures no longer work
•Why context-aware defenses that correlate incoming attacks to outgoing data exfiltration are required for enhanced security
2014 has been an explosive year riddled with nasty security threats. Some of these you may have heard about like Heartbleed and Shellshock, but others like Sandworm, may have gone unnoticed or worse unprotected on your network. This webcast will offer an explanation of the top vulnerabilities, how they could have infected your network and security precautions to protect your organization. Don’t miss it.
As enterprise network design changes and evolves to incorporate mobile devices, BYOD and cloud solutions, the traditional network perimeter is breaking down. All this, while attacks are getting ever more sophisticated. This session will discuss the challenges facing the modern enterprise network, and show how HP TippingPoint network security products offer solutions that can help.
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
With malware and botnets wreaking havoc worldwide, stopping network infiltration and protecting confidential data is proving increasingly difficult. This session introduces you to a triple-threat triple ally against attackers: HP TippingPoint with ThreatDV. Join us and learn how HP TippingPoint and the power combo of ThreatDV, weekly Digital Vaccine package, and reputation feed help networks stay ahead of attacks by blocking infiltration, phone-home, command-and-control, and data exfiltration.
Russell Meyers, Global Product Line Manager, HP TippingPoint
Security defenses are only effective when you can easily deploy and manage them. HP TippingPoint Next-Generation Intrusion Prevention System and Next-Generation Firewall make it easy. And the TippingPoint Security Management System provides a dashboard to show you the state of your defenses and instantly see attacks that are blocked.
Every second matters. Watch this interactive demo to learn how:
· Easy it is to automatically download the latest Digital Vaccine packages to stay up-to-date with the latest security intelligence
· Simple it is to share security configurations and policies across devices
· The at-a-glance dashboard effortlessly shows your protection status
· To automatically create protection, status and network behavior reports
Joanna Burkey, HP TippingPoint DVLabs Manager & Russell Meyers, Global Product Line Manager, HP TippingPoint
Threats to the network continually evolve, which makes isolating the victimized “patient zero” machine nearly impossible. Today’s advanced threats require an advanced approach to security. This session explores how HP TippingPoint stops these attacks in their tracks by neutralizing patient zero through behavior, static, and dynamic detection. Join us to learn how this layered security approach is the most effective way to minimize the threat of network infiltration and, when it does occur, protect your infrastructure from further damage.
Russ Meyers, Global Product Line Manager for the HP TippingPoint Enterprise Security Management System
Incident response weighs heavily on the minds of security practitioners today. Prompted by the recent data breaches and attacks plaguing enterprises large and small, a new SANS survey project asked IT professionals to explain what steps they take immediately following a breach and to share how successful those steps really are.
Tune into Part 1 of the Incident Response Techniques webcast to hear highlights from the survey results and discussion concerning where we are as an industry in a typical six-step incident response process.
Delivering Integrated Advanced Threat Prevention to the Enterprise
This channel covers the latest topics in network security and vulnerability threat research from TippingPoint, DVLabs, and the Zero Day Initiative to help security professionals protect their network against known, unknown and undisclosed threats.
Is your BI platform enterprise-ready? Give your IT team a supercharge!
IT oversees, facilitates, and orchestrates all BI solutions to make sure they integrate with existing systems and maximize resources. When you choose a comprehensive, enterprise-ready BI platform, IT is empowered to leverage data more effectively for your business.
Join this webcast to learn how, with the right BI solution, IT can:
•Control and monitor access to data and assets
•Help ensure security and compliance
•Partner with the business to help drive strategic projects
This webcast is part of our Building a Data Culture Leveraging Power BI webcast series. Sign up for this session, or the entire series today!
Join us for this engaging webcast that will feature several healthcare security leaders and practitioners discussing the changing landscape of healthcare cyber security threats and HIPAA regulatory enforcement.
Specifically, the distinguished panel will focus on:
• Recent trends in healthcare cyber threats and breaches
• HHS guidance on “ransomware and medical equipment patching”
• Recent HIPAA enforcement activities by the HHS that are potentially game changing.
The panel will also discuss key mitigating steps that every healthcare organizations need to take to lessen potential breaches and escalating HIPPA enforcement sanctions.
Join us as we discuss how Trend Micro and VMware have partnered to deliver an optimized hybrid cloud security solution architected for VMware virtualized data centers, virtual desktops, and multi-cloud deployments that include AWS and Microsoft Azure.
In this webinar you will learn how to….
-Optimize data center resources with virtualization-aware security
-Deliver automated security across environments
-Manage and deploy security efficiently
-Achieve cost effective compliance
The security paradigm for nearly two decades has been to increasingly invest in technology. These solutions have not only failed to solve the problem but have made the challenge more complex. Even if true threats are detected, they are lost in a sea of alerts and lack the context to prioritize and build response. This security posture is only exacerbated by the skills deficit currently facing the industry.
In this webinar, we look at the emergence of a new security-as-a-service paradigm and the capabilities required to help organizations reduce risk and time to protection. The discussion will cover how the cost, specialization and complexity of cyber defense have positioned security to follow other markets in adopting an “as-a-service” paradigm.
We will also address the capabilities that define an ideal security-as-a-service partner such as:
•the availability of security expertise
•a broad intelligence capability and
•flexible deployment options
Not only does this approach improve a security posture and reduce risk but it does so with a lower total cost of ownership (TCO). Register today to learn more about this emerging security-as-a-service model.
l est temps de protéger vos utilisateurs contre les menaces qui contournent facilement les antivirus.
Assistez à notre webinar en direct sur la sécurité des terminaux
•Les coûts cachés d'un antivirus classique pour votre entreprise
•Comment déterminer la véritable valeur d'une solution de sécurité des terminaux
•Les cinq fonctions indispensables à la protection de vos utilisateurs, systèmes et terminaux
•Comment Traps v3.4 prévient les failles de sécurité dans votre entreprise sans antivirus classique
Wie können Sie angesichts des neuen Grads an Ausgereiftheit und Bedrohung, den Ransomware im vergangenen Jahr erreicht hat, sicher sein, dass Ihre Infrastruktur davor geschützt und Ihr Unternehmen ausreichend vorbereitet ist, um einen Angriff zu bewältigen?
Sicherheitsverantwortliche haben heute mit diesen Problemen zu kämpfen:
•Nicht genügend umsetzbare Threat Intelligence, um verstehen zu können, welche Akteure und Kampagnen eine Bedrohung für ihre Unternehmen darstellen.
•Zu wenig geschulte Sicherheitsanalysten, die die zunehmende Zahl von Bedrohungen identifizieren können, die in ihre Unternehmen eindringen. Beispielsweise konnte der Einsatz von Crypto-Ransomware als Angriffstool im Jahr 2015 eine weitere Zunahme verzeichnen, und zwar um 35 %. Dennoch brauchen Unternehmen, in denen ein Angriff stattfindet, in der Regel mehr als 200 Tage, um sich dessen bewusst zu werden.
•Zu wenig spezialisiertes Know-how hinsichtlich der Methoden, die erforderlich sind, um auf Bedrohungen zu reagieren und diese unschädlich zu machen, nachdem sie in ihrer IT-Umgebung Fuß gefasst haben.
Die Taktiken von Ransomware-Gangs werden immer ausgefeilter und Unternehmen müssen sich der Gefahr, die sie darstellen, vollständig bewusst sein. Nehmen Sie an einem Webinar von Symantec teil, in dem ein konkreter Ransomware-Angriff behandelt wird. Sie erfahren, was geschehen ist und welche Maßnahmen das betroffene Unternehmen ergriffen hat, um die Bedrohung zu beseitigen.
Ransomware and business email compromise (BEC) scams have dominated the security threat landscape for the first half of 2016, truly making it the Year of Online Extortion. This webinar is designed to discuss these and other prominent threat trends we are currently seeing, as well as to give organizations possible security strategies and solutions that they can use to better defend their assets and data.
Ransomware continues to evolve. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.
Take this opportunity to learn directly about what can happen in a ransomware attack based on real-life events. Symantec’s Cyber Security Services experts will lead the discussion and will help you to understand how you can improve your line of defense against ransomware and minimise the loss of key data, money and intellectual property from your organisation.
Traditional antivirus (AV) is not the solution to breach prevention on the endpoint – it is the problem. At best, traditional AV gives organizations a false sense of security.
To prevent security breaches, you must protect yourself not only from known and unknown cyberthreats but also from the failures of traditional antivirus solutions deployed in your environment.
In this webinar, you will learn:
· How to determine the true value of your endpoint security solutions
· What hidden costs traditional AV imposes on your organization
· Which five capabilities are critical to effective endpoint protection
· How the new Traps v3.4 prevents security breaches in your organization
Gérer le nombre croissant des vulnérabilités est devenu un véritable challenge pour les entreprises.
Cependant, 97 % des attaques exploitent uniquement 10% des vulnérabilités connues.
De toute évidence, il est devenu impératif d'arrêter de jouer aux devinettes et d’identifier les vulnérabilités les plus menaçantes de façon effective afin d’y remédier rapidement.
ThreatPROTECT, dernière solution Qualys, corrèle en temps réel les données de vulnérabilités avec de multiples flux de menaces connues.
Les résultats sont fournis sous forme de tableaux de bord faciles à appréhender et offrent ainsi une vision claire des vulnérabilités à traiter en priorité.
L’objectif de ce webcast est de vous présenter en 3 points les usages et avantages de ThreatPROTECT.
* Identifiez vos assets les plus importants
* Détectez rapidement les vulnérabilités critiques via la corrélation en temps réel avec les menaces actives.
* Priorisez les remédiations et intervenez sur les vulnérabilités à traiter sans tarder