Browse communities
Browse communities
Presenting a webinar?

A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection

Michael Suby, VP, Analyst Frost & Sullivan, Ty Smith, Doris, Inc, and Patrick Kennedy, VP Webroot
This eSeminar goes beyond concepts and looks at the performance and effectiveness of cloud-based endpoint security in the real world. Join a panel of experts as they discuss the critical aspects to consider in the evaluation and deployment of next-generation threat protection.
 
Frost & Sullivan’s Stratecast analyst, Michael Suby, will present new research on how cloud-based endpoint security solutions overcome many of the pain points caused by the aging signature-based model. Ty Smith, IT manager of offshore engineering firm Doris, Inc., will then walk you through deploying a solution that not only improved both security and user productivity but also saved hundreds of IT hours. He will also describe the evaluation criteria his team used for replacing Doris’ traditional endpoint security product, which was difficult to manage, kept employees from their work during long scans, and left infections undetected.
Sep 6 2012
64 mins
A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection
Cloud Endpoint Security
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (110)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • Using Machine-Readable Threat Intelligence to Block Unknown Threats Apr 23 2015 5:00 pm UTC 60 mins
    Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas
    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an organization recognize these threats more quickly as they emerge? How does the organization ensure that information about the latest threats is available to drive fast response at the points of vulnerability? In this program, Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas discuss how integrating machine-readable threat intelligence into your security infrastructure can help your organization block active attacks, and even predict where future attacks are likely to come from.
  • Webroot’s 2014 Threat Brief Apr 16 2015 5:00 pm UTC 45 mins
    Grayson Milbourne, Security Intelligence Director
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
  • How to Avoid Social Engineering Attacks Recorded: Mar 25 2015 39 mins
    Tyler Moffitt, Senior Threat Research Analyst, Webroot
    You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.
  • Webroot SecureAnywhere® Business – Endpoint Protection Recorded: Feb 17 2015 48 mins
    Bob Rowell, Director, Systems Engineers
    With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection has now become ineffective due to the sheer volume, quality, and complexity of malware. New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
    Please join us for a live demonstration of Webroot SecureAnywhere® Business – Endpoint Protection.
  • A Brief History of Malware Recorded: Jan 19 2015 48 mins
    Grayson Milbourne, Director of Security Intelligence, Webroot
    There was more Malware in 2014 than all Malware measured since 1984! Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites, or from bots that reside on the own corporate network. In this special webcast the presenter will take a step back and review the history of malware, its purpose then, and its purpose now.
  • A Smarter Solution to Malware Prevention Recorded: Dec 16 2014 49 mins
    George Anderson, Director Product Marketing, Webroot
    Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions.

    This webinar will look at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
  • 2014 - The Perfect Malware Storm Recorded: Nov 19 2014 38 mins
    George Anderson, Director, Product Marketing,Webroot
    In 2014 we’ve already seen about 35% of the new malware ever seen!
    In this webinar you’ll learn what has created this perfect storm of new malware?
    What sort of malware it is? What it’s doing? And where Webroot believe this is going in the next 12 months into 2015.They say knowledge is power this webinar will give you the understanding to go with it and help you defend your organization.
  • Evolution of Encrypting Ransomware Recorded: Oct 23 2014 48 mins
    Tyler Moffitt-Senior Threat Research Analyst, Webroot
    Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

    The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.
  • Protecting Against Advanced Malware Recorded: Sep 10 2014 36 mins
    Tyler Moffitt Senior Threat Research Analyst, Webroot
    Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. It can operate for days, weeks, or years, collecting financial and intellectual property information, while traditional antivirus technology is virtually powerless to defend against it. In this presentation, we will examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve.
  • Increase ROI & Bandwidth with Full Endpoint Coverage Recorded: Aug 28 2014 34 mins
    Bob Rowell, Director, Systems Engineers
    Do you currently deploy separate solutions for antimalware and antivirus protection? Wouldn’t it be nice if you only had to deploy and manage one solution to handle all your endpoint security needs? When you’re stuck managing multiple solutions, you also have to deal with the additional hassles of higher costs, poor productivity, reduced availability and uptime.

    Join us as we address the challenges and frustrations admins typically face, and demonstrate how next generation cloud-based security can offer a simpler, more effective solution to managed endpoint protection.
  • An Alternative to Traditional Endpoint Security: A Truly Cloud-based Solution Recorded: Jul 22 2014 42 mins
    Bob Rowell, Director, Systems Engineers
    These days, the majority of the computing world is talking about “the cloud”. Almost every company has catchy advertising taglines to sell the wonders of cloud-based services; but many providers sell services with limited cloud capability as cloud solutions. Some endpoint security providers offer traditional, hosted security services with web-based management consoles, but that’s not true cloud technology. Others offer partial cloud solutions that still need massive, locally installed software clients. This isn’t true cloud technology either. How many internet security providers can honestly claim to be 100% in the cloud? Furthermore, how can you differentiate between fact and fiction amidst the clamor of cloud-related marketing?

    Join us as we address the confusion and misdirection, and show how truly cloud-based security can offer a better solution to managed endpoint protection.
  • AV isn't Dead. It's Evolving. Recorded: Jun 26 2014 36 mins
    Tyler Moffitt Threat Research Analyst, Webroot
    Traditional signature AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks, and micro variant financial threats are just some of the examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. To keep up with modern malware, the methods for discovering and addressing new threats needs to change. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Security in the Face of Compromise Recorded: May 20 2014 38 mins
    Grayson Milbourne, Director of Security Intelligence
    Endpoint security has come a long way from traditional definition based solutions. So has technology which aims to prevent compromise of an infected system. Join this webinar to see live demos of Web-injection attacks, keyloggers and custom malware and see how the next generation of endpoint technology is able to prevent compromise, even when the host system is infected.
  • Modern Malware and the need for Remediation Innovation Recorded: Apr 23 2014 34 mins
    Tyler Moffitt Threat Research Analyst, Webroot
    Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Avoid AV Storms Recorded: Mar 19 2014 46 mins
    Grayson Milbourne Security Intelligence Director, Webroot
    Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
  • The State of Mobile Security Recorded: Feb 20 2014 49 mins
    Grayson Milbourne Security Intelligence Director, Webroot
    This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
  • CryptoLocker: Your Money or Your Life Recorded: Jan 21 2014 45 mins
    Andrew Bagnato, Sr. Systems Engineer, Webroot
    As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage is irreparable. This presentation will cover how threats like CryptoLocker get around traditional security measures, why they are so dangerous, and the Webroot solution.
  • Stopping the Scam – Techniques for Defending Against Today’s Social Engineering Recorded: Dec 12 2013 34 mins
    Dan Gadd, Technical Sales Engineer, Webroot
    Are humans the weakest part of the security chain? This presentation looks at the most common social engineering attacks in use today and how they manipulate people to divulge personal and confidential information. These effective schemes are common across social networking sites such as Facebook, Twitter and LinkedIn. With Phishing attacks increasing over 60% in 2012, the presentation will explore why this form of attack is often the first step in exploiting an individual or corporation, and recommend techniques to avoid these scams.
  • Panel: Mobile Application: Converging Business Priorities And Security Recorded: Nov 14 2013 59 mins
    Jarad Carleton, Frost&Sullivan; Chad Bacher, Webroot; Andrew Hoog, viaForensics; Jeff McGrath, Good; Kevin McNamee, Kindsight
    Abstract: Every business is now an internet company relying either internally for administration and processes or externally for sales and customer service on applications hosted on their servers or living in the cloud. This panel will focus on discussing how leading organizations have utilized apps to form their business models, grow revenue and support their clients while adhering to the compliance and security standards that reduce risk and allow their companies to thrive.

    Panel:

    Moderator: Jarad Carleton, Principal Consultant, ICT Practice

    Chad Bacher, CTO, Webroot

    Andrew Hoog, CEO, ViaForensics

    Jeff McGrath, Senior Director of Product Marketing, Good Technology

    Kevin McNamee, Director Kindsight Security Labs at Alcatel-Lucent
  • The Global Rise of Android and Mobile Malware Explained Recorded: Nov 12 2013 48 mins
    Grayson Milbourne Security Intelligence Director, Webroot
    Android achieved 79.3% smartphone operating system market share in 2Q13, according to IDC’s latest report, with the popular Samsung Galaxy S 4 moving around 20 million devices in 60 days or approximately 228 per minute. With the rise in the popularity of the Android platform, this has peaked interest with cybercriminals looking for weaknesses to exploit to maximize gain. This presentation will look at the rise of Android and delve into the world of rapidly growing mobile malware.
The fastest, easiest-to-manage solutions for Endpoint & Web Security
Webroot is committed to taking the misery out of Internet security for consumers and businesses worldwide. Webroot products consistently receive top review ratings by respected third parties and have been adopted by millions globally. With a wide range of online security products for home and office, Webroot protects corporate networks and allows consumers to download music, store digital files, bank, shop, surf and search – safely. Founded in 1997, the company provides best-of-breed security solutions that protect personal information and corporate assets from online and internal threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection
  • Live at: Sep 6 2012 5:00 pm
  • Presented by: Michael Suby, VP, Analyst Frost & Sullivan, Ty Smith, Doris, Inc, and Patrick Kennedy, VP Webroot
  • From:
Your email has been sent.
or close
You must be logged in to email this