A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection

Michael Suby, VP, Analyst Frost & Sullivan, Ty Smith, Doris, Inc, and Patrick Kennedy, VP Webroot
This eSeminar goes beyond concepts and looks at the performance and effectiveness of cloud-based endpoint security in the real world. Join a panel of experts as they discuss the critical aspects to consider in the evaluation and deployment of next-generation threat protection.
 
Frost & Sullivan’s Stratecast analyst, Michael Suby, will present new research on how cloud-based endpoint security solutions overcome many of the pain points caused by the aging signature-based model. Ty Smith, IT manager of offshore engineering firm Doris, Inc., will then walk you through deploying a solution that not only improved both security and user productivity but also saved hundreds of IT hours. He will also describe the evaluation criteria his team used for replacing Doris’ traditional endpoint security product, which was difficult to manage, kept employees from their work during long scans, and left infections undetected.
Sep 6 2012
64 mins
A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection
Cloud Endpoint Security
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5244)
  • Upcoming (125)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Webroot SecureAnywhere® Business – Endpoint Protection Recorded: Feb 17 2015 48 mins
    With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection has now become ineffective due to the sheer volume, quality, and complexity of malware. New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
    Please join us for a live demonstration of Webroot SecureAnywhere® Business – Endpoint Protection.
  • A Brief History of Malware Recorded: Jan 19 2015 48 mins
    There was more Malware in 2014 than all Malware measured since 1984! Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites, or from bots that reside on the own corporate network. In this special webcast the presenter will take a step back and review the history of malware, its purpose then, and its purpose now.
  • A Smarter Solution to Malware Prevention Recorded: Dec 16 2014 49 mins
    Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions.

    This webinar will look at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
  • 2014 - The Perfect Malware Storm Recorded: Nov 19 2014 38 mins
    In 2014 we’ve already seen about 35% of the new malware ever seen!
    In this webinar you’ll learn what has created this perfect storm of new malware?
    What sort of malware it is? What it’s doing? And where Webroot believe this is going in the next 12 months into 2015.They say knowledge is power this webinar will give you the understanding to go with it and help you defend your organization.
  • Evolution of Encrypting Ransomware Recorded: Oct 23 2014 48 mins
    Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

    The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.
  • Protecting Against Advanced Malware Recorded: Sep 10 2014 36 mins
    Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. It can operate for days, weeks, or years, collecting financial and intellectual property information, while traditional antivirus technology is virtually powerless to defend against it. In this presentation, we will examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve.
  • Increase ROI & Bandwidth with Full Endpoint Coverage Recorded: Aug 28 2014 34 mins
    Do you currently deploy separate solutions for antimalware and antivirus protection? Wouldn’t it be nice if you only had to deploy and manage one solution to handle all your endpoint security needs? When you’re stuck managing multiple solutions, you also have to deal with the additional hassles of higher costs, poor productivity, reduced availability and uptime.

    Join us as we address the challenges and frustrations admins typically face, and demonstrate how next generation cloud-based security can offer a simpler, more effective solution to managed endpoint protection.
  • An Alternative to Traditional Endpoint Security: A Truly Cloud-based Solution Recorded: Jul 22 2014 42 mins
    These days, the majority of the computing world is talking about “the cloud”. Almost every company has catchy advertising taglines to sell the wonders of cloud-based services; but many providers sell services with limited cloud capability as cloud solutions. Some endpoint security providers offer traditional, hosted security services with web-based management consoles, but that’s not true cloud technology. Others offer partial cloud solutions that still need massive, locally installed software clients. This isn’t true cloud technology either. How many internet security providers can honestly claim to be 100% in the cloud? Furthermore, how can you differentiate between fact and fiction amidst the clamor of cloud-related marketing?

    Join us as we address the confusion and misdirection, and show how truly cloud-based security can offer a better solution to managed endpoint protection.
  • AV isn't Dead. It's Evolving. Recorded: Jun 26 2014 36 mins
    Traditional signature AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks, and micro variant financial threats are just some of the examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. To keep up with modern malware, the methods for discovering and addressing new threats needs to change. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Security in the Face of Compromise Recorded: May 20 2014 38 mins
    Endpoint security has come a long way from traditional definition based solutions. So has technology which aims to prevent compromise of an infected system. Join this webinar to see live demos of Web-injection attacks, keyloggers and custom malware and see how the next generation of endpoint technology is able to prevent compromise, even when the host system is infected.
  • Modern Malware and the need for Remediation Innovation Recorded: Apr 23 2014 34 mins
    Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Avoid AV Storms Recorded: Mar 19 2014 46 mins
    Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
  • The State of Mobile Security Recorded: Feb 20 2014 49 mins
    This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
  • CryptoLocker: Your Money or Your Life Recorded: Jan 21 2014 45 mins
    As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage is irreparable. This presentation will cover how threats like CryptoLocker get around traditional security measures, why they are so dangerous, and the Webroot solution.
  • Stopping the Scam – Techniques for Defending Against Today’s Social Engineering Recorded: Dec 12 2013 34 mins
    Are humans the weakest part of the security chain? This presentation looks at the most common social engineering attacks in use today and how they manipulate people to divulge personal and confidential information. These effective schemes are common across social networking sites such as Facebook, Twitter and LinkedIn. With Phishing attacks increasing over 60% in 2012, the presentation will explore why this form of attack is often the first step in exploiting an individual or corporation, and recommend techniques to avoid these scams.
  • Panel: Mobile Application: Converging Business Priorities And Security Recorded: Nov 14 2013 59 mins
    Abstract: Every business is now an internet company relying either internally for administration and processes or externally for sales and customer service on applications hosted on their servers or living in the cloud. This panel will focus on discussing how leading organizations have utilized apps to form their business models, grow revenue and support their clients while adhering to the compliance and security standards that reduce risk and allow their companies to thrive.

    Panel:

    Moderator: Jarad Carleton, Principal Consultant, ICT Practice

    Chad Bacher, CTO, Webroot

    Andrew Hoog, CEO, ViaForensics

    Jeff McGrath, Senior Director of Product Marketing, Good Technology

    Kevin McNamee, Director Kindsight Security Labs at Alcatel-Lucent
  • The Global Rise of Android and Mobile Malware Explained Recorded: Nov 12 2013 48 mins
    Android achieved 79.3% smartphone operating system market share in 2Q13, according to IDC’s latest report, with the popular Samsung Galaxy S 4 moving around 20 million devices in 60 days or approximately 228 per minute. With the rise in the popularity of the Android platform, this has peaked interest with cybercriminals looking for weaknesses to exploit to maximize gain. This presentation will look at the rise of Android and delve into the world of rapidly growing mobile malware.
  • Then and Now – Securing the 3 Most Common Threat Vectors Recorded: Oct 22 2013 45 mins
    Signature based antivirus is failing. Due to the sheer volume of malware, traditional endpoint solutions are getting bigger, clogging down systems and are ultimately ineffective against today’s threats. This presentation focuses on the three vectors of vulnerability that companies must diligently secure: Traditional Endpoints, Mobile Endpoints, and Web access. These are the arenas in which malware authors look to expose and attack, stealing personal information, monetary assets and other intellectual property. We will demonstrate how Webroot's common underlying technology platform, the Webroot Intelligence Network, which leverages cloud collective intelligence can make real-time behavioral determinations and deliver real-time protection with unprecedented speed and accuracy.
  • Cloud Security Intelligence vs. First Generation Detection and Remediation Recorded: Sep 19 2013 46 mins
    The presentation will review the threat landscape and why traditional AV has become a burden to organizations and failed to deliver adequate protection. It will cover the power of user sourced, big data analytics and the processing power of cloud, to deliver efficient and effective protection. It will also cover how this highly differentiated approach to endpoint protection, is the future for securing multiple and varying devices, in an industry dominated by me-too solutions.
  • Enhancing MDM's to Protect User Privacy through App Reputation Recorded: Jul 17 2013 47 mins
    Today’s MDM solutions are effective at lost device and malicious app protection, ensuring passwords are used and separating and securing both personal and corporate information on the same device – but what about protecting against apps with shady privacy practices? For instance, apps whose developers monetize through imbedded advertising engines which pay based on the amount of user data collected. Or, apps which insecurely store, access and/or transmit user data. How can IT admins protect against the choices users are making when installing 3rd party apps? From a security perspective, this area needs to be addressed before corporate and personal data is compromised. As a result, a mobile application reputation service for Android and iOS platforms is required to specifically address the issues of shady apps. By analyzing dozens of key metrics, app reputation analysis greatly assists in the decision making process when it comes to a user installing a new app. By being able to immediately alert the user to the potential security risks, or poor security practices, it provides an informed opportunity for them to compare the app against other similar, yet more secure, apps.
The fastest, easiest-to-manage solutions for Endpoint & Web Security
Webroot is committed to taking the misery out of Internet security for consumers and businesses worldwide. Webroot products consistently receive top review ratings by respected third parties and have been adopted by millions globally. With a wide range of online security products for home and office, Webroot protects corporate networks and allows consumers to download music, store digital files, bank, shop, surf and search – safely. Founded in 1997, the company provides best-of-breed security solutions that protect personal information and corporate assets from online and internal threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection
  • Live at: Sep 6 2012 5:00 pm
  • Presented by: Michael Suby, VP, Analyst Frost & Sullivan, Ty Smith, Doris, Inc, and Patrick Kennedy, VP Webroot
  • From:
Your email has been sent.
or close
You must be logged in to email this