From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats

Grayson Milbourne, Director of Global Threat Research, Webroot
You’ve heard about how today’s online threats have become too sophisticated for “traditional” threat detection.  These new malware attacks are far too frequent, benign-looking until activated, and designed to bypass traditional signatures and the guesswork of heuristics.
 
So, by the time the threat is identified and your security technology is updated, it’s too late—the damage has been done.  You are also up against transient Web-based threats that appear for only hours or days.  Blacklisting becomes obsolete the moment it is deployed. And relying on whitelisting can be too restrictive.  So what are your options?
 
Cloud-based prevention collectively leverages the intelligence seen from each individual endpoint; examines the actions of individual files, IP or URLs; assesses the risks; and then takes action.  And cloud-based intelligence means you’re not relying on the current threat protection on other endpoints. Prevention is now always up-to-date and all users are instantly protected as soon as new threats appear.  This collective prevention minimizes IT workload by eliminating the need to worry about definition updates, or whether your remote workers’ protection is up-to-date.
 
Cloud-based Webroot threat prevention technologies—that power our award-winning endpoint security products—are changing the game back in favor of the ‘good guys.’ Attend this session and find out more about what’s behind the first true innovation for endpoint protection in 20 years.
Sep 5 2012
39 mins
From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4498)
  • Upcoming (164)
  • Date
  • Rating
  • Views
  • Join backup and recovery experts to find out how to build your backup and recovery requirements checklist. By the end of this session, you’ll learn how you can:

    -Cut storage requirements by up to 80%
    -Save on storage costs and performance hits to your network.
    -Leverage near-instant recovery technology for protected virtual machines or servers.
    -Automate application-aware backups and testing for data corruption.
  • Join backup and recovery experts to find out how to build your backup and recovery requirements checklist. By the end of this session, you’ll learn how you can:

    -Cut storage requirements by up to 80%
    -Save on storage costs and performance hits to your network.
    -Leverage near-instant recovery technology for protected virtual machines or servers.
    -Automate application-aware backups and testing for data corruption.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • Today’s security event monitoring and correlation tools are under enormous pressure. Security Analysts are inundated with data, but rather than being given insight, it is more difficult than ever to sort through and locate the real events that need attention. The next generation of security tools purports to process much larger and a greater variety of data sets, run deep-dive analytics in real-time, and rely more on intelligence than attack signatures. But what does this actually mean?

    How do I collect the right data?
    What kinds of new detections can I do?
    How do I get enough context to overcome false positives?
    How do I automate more of my security intelligence, or the intelligence of others?
    What should I look for in a solution?
    How is this different from my SIEM, IDS/IDS, and Advance Malware Detection products?

    These, and other questions, will be addressed to shed light on what has quickly become a market space of tremendous promise, but currently shrouded in confusion.
  • Today’s security event monitoring and correlation tools are under enormous pressure. Security Analysts are inundated with data, but rather than being given insight, it is more difficult than ever to sort through and locate the real events that need attention. The next generation of security tools purports to process much larger and a greater variety of data sets, run deep-dive analytics in real-time, and rely more on intelligence than attack signatures. But what does this actually mean?

    How do I collect the right data?
    What kinds of new detections can I do?
    How do I get enough context to overcome false positives?
    How do I automate more of my security intelligence, or the intelligence of others?
    What should I look for in a solution?
    How is this different from my SIEM, IDS/IDS, and Advance Malware Detection products?

    These, and other questions, will be addressed to shed light on what has quickly become a market space of tremendous promise, but currently shrouded in confusion.
  • This Analyst Briefing will cover key findings from Frost & Sullivan’s suite of video technology research for 2013, as well as the Digital Media research team’s impressions and conclusions from the 2014 National Association of Broadcasters (NAB) Show, taking place April 5-10, 2014 in Las Vegas.

    Reasons to Attend:

    •Understand key technical trends in content delivery and monetization, and their impact on video encoding/transcoding offerings
    •Gain insight into worldwide market growth opportunities
    •Receive highlights related to the competitive landscape
    •Identify customer perceptions and requirements when choosing vendors and solutions
  • Today’s IT professionals need security firewalls that do more than just packet filtering and stateful inspection. It’s critical that network pros redefine which metrics will actually ensure their security solutions will not be a performance bottleneck. This webinar digs into today’s firewall solutions, exploring their capabilities and providing pointers for selecting the solution that best meets IT security and performance requirements.

    What You Will Learn
    Why packet filtering and IPS aren’t the only performance metrics that matter
    The performance impact of running multiple security services
    How to select in-line security products that meet today’s multi-function security needs
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • Channel
  • Channel profile
Up Down
  • Modern Malware and the need for Remediation Innovation Apr 23 2014 5:00 pm UTC 45 mins
    Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Avoid AV Storms Recorded: Mar 19 2014 46 mins
    Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
  • The State of Mobile Security Recorded: Feb 20 2014 49 mins
    This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
  • CryptoLocker: Your Money or Your Life Recorded: Jan 21 2014 45 mins
    As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage is irreparable. This presentation will cover how threats like CryptoLocker get around traditional security measures, why they are so dangerous, and the Webroot solution.
  • Stopping the Scam – Techniques for Defending Against Today’s Social Engineering Recorded: Dec 12 2013 34 mins
    Are humans the weakest part of the security chain? This presentation looks at the most common social engineering attacks in use today and how they manipulate people to divulge personal and confidential information. These effective schemes are common across social networking sites such as Facebook, Twitter and LinkedIn. With Phishing attacks increasing over 60% in 2012, the presentation will explore why this form of attack is often the first step in exploiting an individual or corporation, and recommend techniques to avoid these scams.
  • Panel: Mobile Application: Converging Business Priorities And Security Recorded: Nov 14 2013 59 mins
    Abstract: Every business is now an internet company relying either internally for administration and processes or externally for sales and customer service on applications hosted on their servers or living in the cloud. This panel will focus on discussing how leading organizations have utilized apps to form their business models, grow revenue and support their clients while adhering to the compliance and security standards that reduce risk and allow their companies to thrive.

    Panel:

    Moderator: Jarad Carleton, Principal Consultant, ICT Practice

    Chad Bacher, CTO, Webroot

    Andrew Hoog, CEO, ViaForensics

    Jeff McGrath, Senior Director of Product Marketing, Good Technology

    Kevin McNamee, Director Kindsight Security Labs at Alcatel-Lucent
  • The Global Rise of Android and Mobile Malware Explained Recorded: Nov 12 2013 48 mins
    Android achieved 79.3% smartphone operating system market share in 2Q13, according to IDC’s latest report, with the popular Samsung Galaxy S 4 moving around 20 million devices in 60 days or approximately 228 per minute. With the rise in the popularity of the Android platform, this has peaked interest with cybercriminals looking for weaknesses to exploit to maximize gain. This presentation will look at the rise of Android and delve into the world of rapidly growing mobile malware.
  • Then and Now – Securing the 3 Most Common Threat Vectors Recorded: Oct 22 2013 45 mins
    Signature based antivirus is failing. Due to the sheer volume of malware, traditional endpoint solutions are getting bigger, clogging down systems and are ultimately ineffective against today’s threats. This presentation focuses on the three vectors of vulnerability that companies must diligently secure: Traditional Endpoints, Mobile Endpoints, and Web access. These are the arenas in which malware authors look to expose and attack, stealing personal information, monetary assets and other intellectual property. We will demonstrate how Webroot's common underlying technology platform, the Webroot Intelligence Network, which leverages cloud collective intelligence can make real-time behavioral determinations and deliver real-time protection with unprecedented speed and accuracy.
  • Cloud Security Intelligence vs. First Generation Detection and Remediation Recorded: Sep 19 2013 46 mins
    The presentation will review the threat landscape and why traditional AV has become a burden to organizations and failed to deliver adequate protection. It will cover the power of user sourced, big data analytics and the processing power of cloud, to deliver efficient and effective protection. It will also cover how this highly differentiated approach to endpoint protection, is the future for securing multiple and varying devices, in an industry dominated by me-too solutions.
  • Enhancing MDM's to Protect User Privacy through App Reputation Recorded: Jul 17 2013 47 mins
    Today’s MDM solutions are effective at lost device and malicious app protection, ensuring passwords are used and separating and securing both personal and corporate information on the same device – but what about protecting against apps with shady privacy practices? For instance, apps whose developers monetize through imbedded advertising engines which pay based on the amount of user data collected. Or, apps which insecurely store, access and/or transmit user data. How can IT admins protect against the choices users are making when installing 3rd party apps? From a security perspective, this area needs to be addressed before corporate and personal data is compromised. As a result, a mobile application reputation service for Android and iOS platforms is required to specifically address the issues of shady apps. By analyzing dozens of key metrics, app reputation analysis greatly assists in the decision making process when it comes to a user installing a new app. By being able to immediately alert the user to the potential security risks, or poor security practices, it provides an informed opportunity for them to compare the app against other similar, yet more secure, apps.
  • Security In a BYOD World Recorded: Feb 6 2013 39 mins
    BYOD is a reality and businesses need to build a security plan to protect their data. Guest analyst, Forrester's Dr. Chenxi Wang, discusses BYOD trends, challenges and recommendations based on her research. Darren Niller will share how Webroot has provided a single solution that allows IT to securely manage all endpoints- PC, Servers and Mobile devices.
  • Smartphones, tablets and the need for security exigency Recorded: Dec 19 2012 75 mins
    Smartphones and tablet Computers are both pervasive and ubiquitous – they are also intrinsically unsafe data communication devices, especially if their owner jailbreaks, roots or similarly unlocks them.
    But how do you secure their usage – both at home, in the field and the workplace?

    With this webinar we will tell you how to raise your personal and business security bar when using smart portable devices: where the danger hot spots lie, and how those dangers can be remediated
  • Security in a BYOD World Recorded: Dec 5 2012 39 mins
    BYOD is a reality and businesses need to build a security plan to protect their data. Guest analyst, Forrester's Dr. Chenxi Wang, discusses BYOD trends, challenges and recommendations based on her research. Darren Niller will share how Webroot has provided a single solution that allows IT to securely manage all endpoints- PC, Servers and Mobile devices.
  • Enter the BYOD - Assessing the Risk of Infected Smart devices at the Workplace Recorded: Sep 14 2012 43 mins
    Every day more of your users are bringing their personal ‘smart’ devices to work and connecting them to corporate resources. But what happens when one of these devices is infected with a malicious app? Join us as we discuss the various flavors of malicious apps and the impact they can have in a your IT environment. We will provide useful recommendations to IT administrators who have concerns about data leakage, phishing and other malicious activities which target these devices.
  • A Better Mousetrap: Leveraging the Cloud to Improve Endpoint Protection Recorded: Sep 6 2012 64 mins
    This eSeminar goes beyond concepts and looks at the performance and effectiveness of cloud-based endpoint security in the real world. Join a panel of experts as they discuss the critical aspects to consider in the evaluation and deployment of next-generation threat protection.
     
    Frost & Sullivan’s Stratecast analyst, Michael Suby, will present new research on how cloud-based endpoint security solutions overcome many of the pain points caused by the aging signature-based model. Ty Smith, IT manager of offshore engineering firm Doris, Inc., will then walk you through deploying a solution that not only improved both security and user productivity but also saved hundreds of IT hours. He will also describe the evaluation criteria his team used for replacing Doris’ traditional endpoint security product, which was difficult to manage, kept employees from their work during long scans, and left infections undetected.
  • From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats Recorded: Sep 5 2012 39 mins
    You’ve heard about how today’s online threats have become too sophisticated for “traditional” threat detection.  These new malware attacks are far too frequent, benign-looking until activated, and designed to bypass traditional signatures and the guesswork of heuristics.
     
    So, by the time the threat is identified and your security technology is updated, it’s too late—the damage has been done.  You are also up against transient Web-based threats that appear for only hours or days.  Blacklisting becomes obsolete the moment it is deployed. And relying on whitelisting can be too restrictive.  So what are your options?
     
    Cloud-based prevention collectively leverages the intelligence seen from each individual endpoint; examines the actions of individual files, IP or URLs; assesses the risks; and then takes action.  And cloud-based intelligence means you’re not relying on the current threat protection on other endpoints. Prevention is now always up-to-date and all users are instantly protected as soon as new threats appear.  This collective prevention minimizes IT workload by eliminating the need to worry about definition updates, or whether your remote workers’ protection is up-to-date.
     
    Cloud-based Webroot threat prevention technologies—that power our award-winning endpoint security products—are changing the game back in favor of the ‘good guys.’ Attend this session and find out more about what’s behind the first true innovation for endpoint protection in 20 years.
The fastest, easiest-to-manage solutions for Endpoint & Web Security
Webroot is committed to taking the misery out of Internet security for consumers and businesses worldwide. Webroot products consistently receive top review ratings by respected third parties and have been adopted by millions globally. With a wide range of online security products for home and office, Webroot protects corporate networks and allows consumers to download music, store digital files, bank, shop, surf and search – safely. Founded in 1997, the company provides best-of-breed security solutions that protect personal information and corporate assets from online and internal threats.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats
  • Live at: Sep 5 2012 3:00 pm
  • Presented by: Grayson Milbourne, Director of Global Threat Research, Webroot
  • From:
Your email has been sent.
or close
You must be logged in to email this