Browse communities
Browse communities
Presenting a webinar?

From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats

Grayson Milbourne, Director of Global Threat Research, Webroot
You’ve heard about how today’s online threats have become too sophisticated for “traditional” threat detection.  These new malware attacks are far too frequent, benign-looking until activated, and designed to bypass traditional signatures and the guesswork of heuristics.
 
So, by the time the threat is identified and your security technology is updated, it’s too late—the damage has been done.  You are also up against transient Web-based threats that appear for only hours or days.  Blacklisting becomes obsolete the moment it is deployed. And relying on whitelisting can be too restrictive.  So what are your options?
 
Cloud-based prevention collectively leverages the intelligence seen from each individual endpoint; examines the actions of individual files, IP or URLs; assesses the risks; and then takes action.  And cloud-based intelligence means you’re not relying on the current threat protection on other endpoints. Prevention is now always up-to-date and all users are instantly protected as soon as new threats appear.  This collective prevention minimizes IT workload by eliminating the need to worry about definition updates, or whether your remote workers’ protection is up-to-date.
 
Cloud-based Webroot threat prevention technologies—that power our award-winning endpoint security products—are changing the game back in favor of the ‘good guys.’ Attend this session and find out more about what’s behind the first true innovation for endpoint protection in 20 years.
Sep 5 2012
39 mins
From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5452)
  • Upcoming (144)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Using Machine-Readable Threat Intelligence to Block Unknown Threats Recorded: Apr 23 2015 51 mins
    Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas
    Enterprises continue to struggle with network breaches, data theft, and other incidents, despite deploying layers of security technologies across their IT environments. One reason for these successful attacks is that many of the threats have never been seen before, and go undetected by traditional security technology. So how can an organization recognize these threats more quickly as they emerge? How does the organization ensure that information about the latest threats is available to drive fast response at the points of vulnerability? In this program, Gartner Research Director Craig Lawson and Webroot Chief Technology Officer Hal Lonas discuss how integrating machine-readable threat intelligence into your security infrastructure can help your organization block active attacks, and even predict where future attacks are likely to come from.
  • Webroot’s 2014 Threat Brief Preview Recorded: Apr 16 2015 38 mins
    Grayson Milbourne, Security Intelligence Director
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2014. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of IP addresses associated with malicious activity, details on the reputation of URLs by category and location, phishing detection statistics, insights into file reputation and encounter rates with malware and PUAs and information on mobile app security for Android devices. All data presented comes from Webroot’s Intelligence Network and was observed during 2014.
  • How to Avoid Social Engineering Attacks Recorded: Mar 25 2015 39 mins
    Tyler Moffitt, Senior Threat Research Analyst, Webroot
    You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.
  • Webroot SecureAnywhere® Business – Endpoint Protection Recorded: Feb 17 2015 48 mins
    Bob Rowell, Director, Systems Engineers
    With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection has now become ineffective due to the sheer volume, quality, and complexity of malware. New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
    Please join us for a live demonstration of Webroot SecureAnywhere® Business – Endpoint Protection.
  • A Brief History of Malware Recorded: Jan 19 2015 48 mins
    Grayson Milbourne, Director of Security Intelligence, Webroot
    There was more Malware in 2014 than all Malware measured since 1984! Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites, or from bots that reside on the own corporate network. In this special webcast the presenter will take a step back and review the history of malware, its purpose then, and its purpose now.
  • A Smarter Solution to Malware Prevention Recorded: Dec 16 2014 49 mins
    George Anderson, Director Product Marketing, Webroot
    Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions.

    This webinar will look at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
  • 2014 - The Perfect Malware Storm Recorded: Nov 19 2014 38 mins
    George Anderson, Director, Product Marketing,Webroot
    In 2014 we’ve already seen about 35% of the new malware ever seen!
    In this webinar you’ll learn what has created this perfect storm of new malware?
    What sort of malware it is? What it’s doing? And where Webroot believe this is going in the next 12 months into 2015.They say knowledge is power this webinar will give you the understanding to go with it and help you defend your organization.
  • Evolution of Encrypting Ransomware Recorded: Oct 23 2014 48 mins
    Tyler Moffitt-Senior Threat Research Analyst, Webroot
    Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

    The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.
  • Protecting Against Advanced Malware Recorded: Sep 10 2014 36 mins
    Tyler Moffitt Senior Threat Research Analyst, Webroot
    Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. It can operate for days, weeks, or years, collecting financial and intellectual property information, while traditional antivirus technology is virtually powerless to defend against it. In this presentation, we will examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve.
  • Increase ROI & Bandwidth with Full Endpoint Coverage Recorded: Aug 28 2014 34 mins
    Bob Rowell, Director, Systems Engineers
    Do you currently deploy separate solutions for antimalware and antivirus protection? Wouldn’t it be nice if you only had to deploy and manage one solution to handle all your endpoint security needs? When you’re stuck managing multiple solutions, you also have to deal with the additional hassles of higher costs, poor productivity, reduced availability and uptime.

    Join us as we address the challenges and frustrations admins typically face, and demonstrate how next generation cloud-based security can offer a simpler, more effective solution to managed endpoint protection.
  • An Alternative to Traditional Endpoint Security: A Truly Cloud-based Solution Recorded: Jul 22 2014 42 mins
    Bob Rowell, Director, Systems Engineers
    These days, the majority of the computing world is talking about “the cloud”. Almost every company has catchy advertising taglines to sell the wonders of cloud-based services; but many providers sell services with limited cloud capability as cloud solutions. Some endpoint security providers offer traditional, hosted security services with web-based management consoles, but that’s not true cloud technology. Others offer partial cloud solutions that still need massive, locally installed software clients. This isn’t true cloud technology either. How many internet security providers can honestly claim to be 100% in the cloud? Furthermore, how can you differentiate between fact and fiction amidst the clamor of cloud-related marketing?

    Join us as we address the confusion and misdirection, and show how truly cloud-based security can offer a better solution to managed endpoint protection.
  • AV isn't Dead. It's Evolving. Recorded: Jun 26 2014 36 mins
    Tyler Moffitt Threat Research Analyst, Webroot
    Traditional signature AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks, and micro variant financial threats are just some of the examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. To keep up with modern malware, the methods for discovering and addressing new threats needs to change. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Security in the Face of Compromise Recorded: May 20 2014 38 mins
    Grayson Milbourne, Director of Security Intelligence
    Endpoint security has come a long way from traditional definition based solutions. So has technology which aims to prevent compromise of an infected system. Join this webinar to see live demos of Web-injection attacks, keyloggers and custom malware and see how the next generation of endpoint technology is able to prevent compromise, even when the host system is infected.
  • Modern Malware and the need for Remediation Innovation Recorded: Apr 23 2014 34 mins
    Tyler Moffitt Threat Research Analyst, Webroot
    Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Avoid AV Storms Recorded: Mar 19 2014 46 mins
    Grayson Milbourne Security Intelligence Director, Webroot
    Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
  • The State of Mobile Security Recorded: Feb 20 2014 49 mins
    Grayson Milbourne Security Intelligence Director, Webroot
    This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
  • CryptoLocker: Your Money or Your Life Recorded: Jan 21 2014 45 mins
    Andrew Bagnato, Sr. Systems Engineer, Webroot
    As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage is irreparable. This presentation will cover how threats like CryptoLocker get around traditional security measures, why they are so dangerous, and the Webroot solution.
  • Stopping the Scam – Techniques for Defending Against Today’s Social Engineering Recorded: Dec 12 2013 34 mins
    Dan Gadd, Technical Sales Engineer, Webroot
    Are humans the weakest part of the security chain? This presentation looks at the most common social engineering attacks in use today and how they manipulate people to divulge personal and confidential information. These effective schemes are common across social networking sites such as Facebook, Twitter and LinkedIn. With Phishing attacks increasing over 60% in 2012, the presentation will explore why this form of attack is often the first step in exploiting an individual or corporation, and recommend techniques to avoid these scams.
  • Panel: Mobile Application: Converging Business Priorities And Security Recorded: Nov 14 2013 59 mins
    Jarad Carleton, Frost&Sullivan; Chad Bacher, Webroot; Andrew Hoog, viaForensics; Jeff McGrath, Good; Kevin McNamee, Kindsight
    Abstract: Every business is now an internet company relying either internally for administration and processes or externally for sales and customer service on applications hosted on their servers or living in the cloud. This panel will focus on discussing how leading organizations have utilized apps to form their business models, grow revenue and support their clients while adhering to the compliance and security standards that reduce risk and allow their companies to thrive.

    Panel:

    Moderator: Jarad Carleton, Principal Consultant, ICT Practice

    Chad Bacher, CTO, Webroot

    Andrew Hoog, CEO, ViaForensics

    Jeff McGrath, Senior Director of Product Marketing, Good Technology

    Kevin McNamee, Director Kindsight Security Labs at Alcatel-Lucent
  • The Global Rise of Android and Mobile Malware Explained Recorded: Nov 12 2013 48 mins
    Grayson Milbourne Security Intelligence Director, Webroot
    Android achieved 79.3% smartphone operating system market share in 2Q13, according to IDC’s latest report, with the popular Samsung Galaxy S 4 moving around 20 million devices in 60 days or approximately 228 per minute. With the rise in the popularity of the Android platform, this has peaked interest with cybercriminals looking for weaknesses to exploit to maximize gain. This presentation will look at the rise of Android and delve into the world of rapidly growing mobile malware.
The fastest, easiest-to-manage solutions for Endpoint & Web Security
Webroot is committed to taking the misery out of Internet security for consumers and businesses worldwide. Webroot products consistently receive top review ratings by respected third parties and have been adopted by millions globally. With a wide range of online security products for home and office, Webroot protects corporate networks and allows consumers to download music, store digital files, bank, shop, surf and search – safely. Founded in 1997, the company provides best-of-breed security solutions that protect personal information and corporate assets from online and internal threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats
  • Live at: Sep 5 2012 3:00 pm
  • Presented by: Grayson Milbourne, Director of Global Threat Research, Webroot
  • From:
Your email has been sent.
or close
You must be logged in to email this