A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection
This eSeminar goes beyond concepts and looks at the performance and effectiveness of cloud-based endpoint security in the real world. Join a panel of experts as they discuss the critical aspects to consider in the evaluation and deployment of next-generation threat protection.
Frost & Sullivan’s Stratecast analyst, Michael Suby, will present new research on how cloud-based endpoint security solutions overcome many of the pain points caused by the aging signature-based model. Ty Smith, IT manager of offshore engineering firm Doris, Inc., will then walk you through deploying a solution that not only improved both security and user productivity but also saved hundreds of IT hours. He will also describe the evaluation criteria his team used for replacing Doris’ traditional endpoint security product, which was difficult to manage, kept employees from their work during long scans, and left infections undetected.
RecordedSep 6 201264 mins
Your place is confirmed, we'll send you email reminders
Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.
At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
According to the latest annual Webroot Threat Brief, 97% of malware is unique to a specific endpoint, rendering static, signature-database security virtually useless. In fact, many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information. With the rising popularity of polymorphism and other trends, it is more crucial than ever that organizations strengthen their security postures with next-generation endpoint protection and real-time, highly accurate threat intelligence. Join this webinar for an in-depth discussion of the most recent quarter’s malware stats and trends, and how businesses can leverage this data to keep themselves, their users, and their customers safe from advanced attacks.
Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms.
Attendees will leave this presentation with:
• An overview of the common threats and methods used to perform attacks.
• A summary of the impact such threats bring to both users and businesses.
• A better understanding of the challenges and benefits of deploying a cloud-based security solution.
Tyler Moffitt, Sr Threat Research Analyst at Webroot, Inc.
Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. In this presentation, we examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve. Malware authors aren't too concerned about what your traditional AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Either through social engineering or advanced evasive tactics, traditional antivirus technology is fighting an uphill battle to defend against it. Learn about highlights and revelations from Blackhat 2015; specifically about the 1.4 million Chrysler vehicle hack, how windows software update services can be hacked, the future of biometrics, and the progress encrypting ransomware. We also will talk about updates on law enforcement's attempts to catch cybercriminals. We will also discuss the startling trends we've seen from phishing attacks and mobile malware and what it means for an end user.
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
2015 was yet another record setting year in the world of Internet security. More malware, malicious apps, websites, IP’s and phishing sites were discovered than in any previous year. At the same time, attacks on businesses and individuals continue to increase at an alarming rate.
This presentation will look at data from Webroot’s 2016 Threat Brief and examine threat trends and draw comparisons to data from Webroot’s 2015 Threat Brief. Most notable is the near complete utilization of polymorphic distribution models for malware whereby over 97% of infections today are intentionally unique for each infected system. Attend to learn about the impacts of this strategy as well as many other aspects of the constantly evolving threat landscape.
Andrew Bagnato, LabTech Technical Account Manager at Webroot, Inc.
Today’s MSPs face a world full of malware, and not many options when it comes to productive and profitable endpoint security. Join us as we dive into the wants, needs and challenges of MSPs, and how Webroot SecureAnywhere Business Endpoint Protection uses a smarter approach to address these pain points. During this webinar you will learn how endpoint security can be profitable for MSPs with the following features:
•Real time threat intelligence
•Detection with a 99.7%+ efficacy
•Multi-tenant cloud based management console
George Anderson, Director Product Marketing and Tyler Moffitt, Senior Threat Research Analyst
Due to the ever-changing nature of the Crypto* family and other ransomware, the sad truth is that no vendor can guarantee 100% protection. But, between advanced defenses with heuristic detection and a solid cybersecurity best practices strategy, it is possible to protect your business and data from these insidious threats.
This webinar will examine:
» How ransomware is developed, and who the newest players are
» Why ransomware is so good at getting around the usual defenses
» Your best chance at beating the threat (and minimizing the impact in the case that you don’t)
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
While many are familiar with the more mainstream security conferences, such as RSA, BlackHat and Virus Bulletin, AVAR is an international conference put on by the Association of Anti-Virus Asia Researchers, meeting for the 18th year, which focuses on the specific topic of malware research and analysis.
This presentation will review the content delivered at this conference and highlight the challenges and successes researchers have faced over the past year when analyzing malware to secure our online future.
Tyler Moffitt, Webroot Senior Threat Research Analyst
2015 has been a huge year for malware. Learn about highlights and revelations from Black Hat 2015, specifically how the windows software update services can be hacked, the future of biometrics, and the progress of scams and other victim-initiated payments like ransomware.
We will also discuss the spikes we've seen from phishing attacks this year and what it means for an end user.
George J. Anderson, Product Marketing Director at Webroot Inc.
Web security is back on the IT Security agenda in a big way. With breaches caused by web usage at an all-time high security professionals are realizing that relying solely on endpoint security to protect their users is downright negligent.
This presentation explores why with this reappraisal is happening and why so many companies are opting for SaaS cloud-based Secure Web Gateway solutions. It also looks at how Webroot, using its BrightCloud Threat Intelligence platform, have completely updated their existing cloud-based web security service to provide a new logical first line of security defense for web users.
1.Why web security should be the primary user security defense layer?
2.The advantages of cloud-based web security over traditional on-premise solutions.
3.The benefits your organization will see as a result of cloud-based web security.
David Dufour | Senior Director of Security Architecture
Traditional cybersecurity approaches aren’t effective in the world of IoT with the vast disparity in device capabilities, resource constraints and architectural designs. This diversity has created an environment where attacking the IoT infrastructure of an organization will become more common place. This presentation will discuss what can be done in the near term to help protect against attacks on the varying device types and their ecosystems.
Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
This year’s BlackHat conference was the largest ever in both attendance and vulnerabilities disclosed. From the Fiat Chrysler recall of 1.4 million vehicles due to a remote hacking security gap, to the nearly billion Android devices that needed updating against an MMS flaw in the Stagefright engine, the issues facing our digital world are only becoming more severe. This presentation will review the hottest discussion topics from BlackHat, as well as provide updates and insights on the current threat landscape and the security issues the future may hold.
Rick Holland - Principal Analyst, Forrester Research and David Dufour - Sr. Director of Security Architecture, Webroot
In 2014, Forrester Research saw a significant shift in customers’ awareness of cybersecurity risks. In response, Forrester has developed strategic and tactical recommendations for enterprise security programs in a March 2015 report entitled “Twelve Recommendations For Your Security Program In 2015.” In this webcast, guest speaker Rick Holland from Forrester and Webroot’s David Dufour will review and discuss those recommendations, with a particular focus on the use of big data and threat intelligence, and the impact of IoT.
David Dufour, Senior Director of Security Architecture, Webroot
This presentation will provide an overview of contextualization and how contextualized data can be used to prevent both known and unknown threats. It will dive deep into the technologies used in the collation and analysis process across both single and multiple threat types. It will conclude with real world use cases where contextualized data can help identified and prevent threats.
Tyler Moffitt and Cameron Palan, Senior Threat Research Analysts at Webroot
With the mobile platform now outpacing desktop users it's important to be informed on what type of threats utilize the smartphone as a vector of attack. This presentation will look at the mobile threat landscape at a glance with statistics over the past couple years as well as its growth to what it is today. We'll also take a few specific threats and take an in-depth look to show the differences compared to PC that have been developed to take advantage of the Android.
Steve Piper, CEO, CyberEdge and Hal Lonas, CTO, Webroot
This presentation provides key findings from the 2015 Cyberthreat Defense Report from the analyst firm CyberEdge. Based on a survey of IT security decision makers and practitioners across North America and Europe, the report examines the current and planned deployment of security measures, including the use of threat intelligence. It also provides developers of IT security technologies and products with answers they need to better align their solutions with the concerns and requirements of end users.
David Dufour, Senior Director of Security Architecture, Webroot
With the rapidly accelerating nature of attacks on network infrastructure and software systems approaches such as static block lists, manual policy configurations and other current prevention techniques have become outdated. Through the use of distributed computing, contextualization and machine learning it is possible to build tools that analyze data across multiple threat vectors allowing for the development of predictive algorithms and a greater understanding of an organizations threat landscape. We will walk through common machine learning techniques, discuss contextualization, how predictive logic works and see a demonstration of contextualized threat intelligence.
This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
Tyler Moffitt, Senior Threat Research Analyst, Webroot
You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection has now become ineffective due to the sheer volume, quality, and complexity of malware. New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
Please join us for a live demonstration of Webroot SecureAnywhere® Business – Endpoint Protection.
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and BrightCloud® Threat Intelligence Services protect tens of millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™ solutions at www.webroot.com.
The widespread adoption of DevOps and agile IT delivery systems presents new security challenges. Developers need security tools that are integrated with their build processes so they can test the integrity and security of their applications within minutes. Similarly, infosec managers need security tools that automatically discover and protect new applications as they are delivered via rapid automation and elastic processes. But traditional security tools don’t do either of these things. Thus, security is increasingly viewed as a blocker to agile software development and DevOps deployment. To solve this problem, security has to fundamentally evolve from a production-time concept to something that is much more automated and embedded into the dev-test-build cycle itself,
Attend this webinar to learn:
•Why trying to use traditional security tools in DevOps environments will slow down both developers and security operations
•Key attributes you should be thinking about to make your security plan future-proof
•Where can security automation be applied to better align security with DevOps delivery models
The Internet of Things (IoT) is already a huge deal and it's only going to get bigger
There are far more devices connected to the internet than there are people in the world and that number is projected to grow dramatically in the coming years. Whether you're an individual hobbyist or an enterprise developer, there's a great chance you'll find need for a cloud-based service to listen to the devices in your IoT solution, facilitate communication, and even communicate back to the devices telling them how to behave.
That's why there's Azure IoT. Azure IoT includes the dedicated IoT Hub service, IoT solution templates called IoT Suite, as well as many other general services for processing IoT data and turning them into real business insight. With a little time and learning, you’ll have a service designed to handle massive amounts of communication with devices, but also able to scale down to startup and even hobbyist scenarios.
Join this webcast to learn how to:
•Conceptualize why you might need a cloud-based hub solution
•Easily set up an IoT Hub in Azure
•Create simulated devices and communicate to your hub
Ransomware protection has been top of mind of many of our clients. Join our senior consultant and security expert, Artom Harchenko, for a walkthrough of how to use Microsoft security technologies to prevent a successful ransomware attack. In the case of a breach, learn about telltale signs of ransomware presence in order to protect your corporate data. Artom will be presenting a sample architecture as well as an overview of the technologies involved in ransomware protection.
With so many different cyber risk metrics being used, how can cyber insurance underwriters and risk managers know how likely a company is to experience a data breach?
Join Ira Scharf, GM of Worldwide Insurance at BitSight, and Dave Bradford President, Research and Editorial at Advisen as they discuss new correlations between BitSight Security Ratings and data breaches.
Attendees will learn:
- Why security ratings are a clear indicator of cyber risk
- How likely companies with BitSight ratings of 400 or below are to experience a data breach
- How underwriters, policyholders, and applicants can use BitSight Security Ratings to lower their cyber risk
The use of deception technologies to level the playing field against attackers sounds like a pretty compelling proposition for security teams. So why has adoption been limited to only the largest enterprises? What can security teams expect when deploying deception? What are the risks and what can be done to address them?
This presentation will provide attendees with an understanding of the challenges facing deception solutions to date, approaches for mitigating those challenges, and an introduction to vArmour’s deception solution: vArmour DSS Deception.
Data miners, the subtle thieves that tap, explore and drain an organization’s databases, perpetrate some of the hardest data breaches to detect and investigate. The data miner may be sitting in the next office next door or a thousand miles away in a hacker’s hardened den. This insidious thief may spend weeks exploring and sampling your systems for valuable data. When satisfied with the bounty, the data is exfiltrated leaving little evidence to trace. View this webinar to:
· Learn how to accurately identify and track insider threats.
· Understand how data activity monitoring can detect and stop suspicious behavior
· Reduce security alert noise and provide actionable context for security incidents
In a world where cyber threats are a constant danger, companies find themselves in an ongoing battle to keep their data safe. A plethora of risks now exist as cyber-criminals continually seek new ways to breach our borders and get their hands on our vital information.
However, did you know that 99.9% of exploits are possible because organizations don't address basic security hygiene? The fact is that a lot of industries focus on the wrong things, often using security strategies that are fundamentally flawed and ultimately do not provide the right sort of protection they need.
There are, of course, a lot of best practices out there, but how do you bring those frameworks to life within your organization?
In this webinar, we will explore some of the main threats companies face and discuss the ways in which they can address the top five security controls with confidence to ensure a better overall security posture.
Find out how to:
•Find unmanaged assets
•Assess the amount of unauthorized software running in an environment.
•Secure endpoint configurations
•Locate and address critical vulnerabilities
•Control the use of administrative privileges
As a wise person once said, a man with one watch knows what time it is, a man with two isn't so sure. Despite the myriad of tools at our disposal in the SOC, how do you accurately identify and triage security Events, escalate those that need it to the status of Incident, and mange them through remediation or response effectively? Join Intel and (ISC)2 on September 29, 2016 at 1:00PM Eastern as we bring a panel of SOC operational experts to discuss strategies and opportunities to orchestrate SOC operations for peak performance.
Traditional network performance management (NPM) was designed in the pre-cloud days of monolithic applications running in centralized data centers. But in the cloud and digital business era, applications are more distributed, and network traffic patterns are more complex and reliant on Internet transit. Cloud-friendly NPM for digital operations requires a different approach, one that can collect pervasive performance data from cloud environments, integrate unsummarized NetFlow and Internet path data, and offer Big Data insights to assure optimal user experience. Join this webinar to learn how to get this integrated insight for cloud and Internet-facing applications.
Everybody is joining the microservices bandwagon and only some enterprises truly see the benefits of adopting microservices. The real challenge is not only cultural adoption but also a question of choosing the right technical tools to enable and secure your microservices.
In this webinar we'll provide practical guidance on building and deploying a microservice architecture for speed, scale and safety.
Join this webinar to learn:
- Key considerations of enabling microservices within your enterprise
- How DevOps fits in the microservices lifecycle and how to align team culture
- How to use an API gateway for securing and governing your microservice architecture