Browse communities
Browse communities
Presenting a webinar?

McAfee & Intel: The Hardware-Enhanced Security Evolution

Dan Wolff
Today's threat landscape is moving fast. Security threats are escalating at an alarming rate, with more than 70k new pieces of malware identified each day. Well-funded cybercriminals are creating sophisticated malware that are designed to circumvent current security solutions by loading before the operating system and evading traditional antimalware protection. These unknown stealthy threats are bringing risk exposure to unprecedented levels that require a new approach to security.

McAfee and Intel are taking a new approach to security. With the announcement of McAfee DeepSAFE technology, McAfee and Intel deliver a new level of hardware-enhanced security that provides unprecedented protection for a safer, more worry-free computing experience from device to the cloud, from a brand you trust. With integrated security solutions from McAfee and Intel, you can get the added layer of protection you need to prevent attacks while effectively managing security out to a network of endpoints.

Please join DynTek & McAfee for this briefing where you'll learn:
.How the McAfee DeepSAFE technology is changing the security industry;
.About available products such as McAfee Deep Defender and McAfee ePO Deep Command
.What other McAfee/Intel products you can use to help you manage your endpoint security; and
How these new security solutions can be deployed alongside of your existing security investment to further your security posture.
Jul 12 2012
29 mins
McAfee & Intel: The Hardware-Enhanced Security Evolution
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

  • Live and recorded (3357)
  • Upcoming (63)
  • Date
  • Rating
  • Views
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Web applications are a favourite target for hackers, so their safety must be a priority. Using an application firewall can enable active protection from known and zero-day threats. Join us to find out how Qualys Web Application Firewall combines scalability and simplicity delivered in the cloud to block attacks fast—without the substantial cost of traditional solutions.
  • Digital Identities have become the new perimeter in the fight against cybercriminals. Businesses need to come together to coordinate an effective defence and real time sharing of internet scale intelligence.

    * Explosive Cybercrime growth comes from criminals leveraging the internet – how can we use that same leverage to our advantage?
    * We can’t trust the endpoint and we can’t trust the user credentials – how do we operate in this new world?
    * How can real time sharing of anonymous Digital Identity behavior provide a new type of protection while offering improvements in end user experience?
  • ...contre les applications Web de manière rapide et rentable

    Les applications Web sont la cible privilégiée des pirates. Leur sécurité doit donc être une priorité. Un firewall applicatif assure une protection active contre les menaces connues et Zero Day. Rejoignez-nous afin de découvrir comment le service de firewall pour applications Web proposé par Qualys associe évolutivité et simplicité via le Cloud pour bloquer rapidement les attaques, sans les coûts importants liés aux solutions classiques.
  • Make sure that you have a full overview of the security posture of all of your IT assets. Join us to find out how Qualys helps you to scan remote complex networks—including everything and everybody from remote workers, point of sales, data centers and IAAS providers. Now you can you get a better picture of potential vulnerabilities—preventing breaches and reducing risk.
  • ...ou vos réseaux IP qui se chevauchent !

    Assurez-vous un aperçu complet de l’état de la sécurité de tous vos actifs IT. Rejoignez-nous pour savoir comment Qualys vous aide à analyser des réseaux distants complexes et notamment tous les intervenants et ressources, qu’il s’agisse de collaborateurs distants, de points de vente, de centres de données ou de fournisseurs IAAS. Vous pouvez désormais obtenir une meilleure image des vulnérabilités potentielles afin de prévenir les failles et de réduire les risques.
  • Earlier this year, Moka5 conducted a survey about how enterprises are currently using cloud-based services and how they would prefer to use them. The results are in and the findings are eye opening. Join Moka5 VP of Marketing Kris Bondi for an overview of the adoption and usage trends as well top-of-mind security concerns for IT decision makers.
  • Channel
  • Channel profile
  • McAfee & Intel: The Hardware-Enhanced Security Evolution Recorded: Jul 12 2012 29 mins
    Dan Wolff
    Today's threat landscape is moving fast. Security threats are escalating at an alarming rate, with more than 70k new pieces of malware identified each day. Well-funded cybercriminals are creating sophisticated malware that are designed to circumvent current security solutions by loading before the operating system and evading traditional antimalware protection. These unknown stealthy threats are bringing risk exposure to unprecedented levels that require a new approach to security.

    McAfee and Intel are taking a new approach to security. With the announcement of McAfee DeepSAFE technology, McAfee and Intel deliver a new level of hardware-enhanced security that provides unprecedented protection for a safer, more worry-free computing experience from device to the cloud, from a brand you trust. With integrated security solutions from McAfee and Intel, you can get the added layer of protection you need to prevent attacks while effectively managing security out to a network of endpoints.

    Please join DynTek & McAfee for this briefing where you'll learn:
    .How the McAfee DeepSAFE technology is changing the security industry;
    .About available products such as McAfee Deep Defender and McAfee ePO Deep Command
    .What other McAfee/Intel products you can use to help you manage your endpoint security; and
    How these new security solutions can be deployed alongside of your existing security investment to further your security posture.
DYNAMIC TECHNOLOGY SOLUTIONS
From virtualization and cloud computing to unified communications and collaboration, DynTek provides professional technology solutions across the three core areas of your technical environment: Infrastructure/Data Center, Application Platforms and End Point Computing.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: McAfee & Intel: The Hardware-Enhanced Security Evolution
  • Live at: Jul 12 2012 4:00 pm
  • Presented by: Dan Wolff
  • From:
Your email has been sent.
or close
You must be logged in to email this