From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats

Grayson Milbourne, Director of Global Threat Research, Webroot
You’ve heard about how today’s online threats have become too sophisticated for “traditional” threat detection.  These new malware attacks are far too frequent, benign-looking until activated, and designed to bypass traditional signatures and the guesswork of heuristics.
 
So, by the time the threat is identified and your security technology is updated, it’s too late—the damage has been done.  You are also up against transient Web-based threats that appear for only hours or days.  Blacklisting becomes obsolete the moment it is deployed. And relying on whitelisting can be too restrictive.  So what are your options?
 
Cloud-based prevention collectively leverages the intelligence seen from each individual endpoint; examines the actions of individual files, IP or URLs; assesses the risks; and then takes action.  And cloud-based intelligence means you’re not relying on the current threat protection on other endpoints. Prevention is now always up-to-date and all users are instantly protected as soon as new threats appear.  This collective prevention minimizes IT workload by eliminating the need to worry about definition updates, or whether your remote workers’ protection is up-to-date.
 
Cloud-based Webroot threat prevention technologies—that power our award-winning endpoint security products—are changing the game back in favor of the ‘good guys.’ Attend this session and find out more about what’s behind the first true innovation for endpoint protection in 20 years.
Sep 5 2012
39 mins
From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5260)
  • Upcoming (140)
  • Date
  • Rating
  • Views
  • Join Tom Kellerman, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who need to develop and implement a comprehensive cyber security strategy. Tom will highlight critical information including 2015 cyber threat trends and how risk management strategies have changed.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
    • And more...
  • A new category of threat is emerging – a threat designed to evade traditional signature-based technologies such as Anti-Virus and Intrusion Detection. Attempting to meet the challenge is a new class of technology, “Advanced Malware Protection” or “AMP,” which is an industry term for technology designed to continuously monitor for, offload and detonate files in a sandbox - safely away from the main environment - to observe and detect malicious objects.

    If a security device produces an alert in the forest, who’s there to hear it?

    The challenge is these next generation advanced malware detection solutions produce so much detail about the suspicious activity that most organizations do not have the resources to thoroughly investigate/analyze. The best technology means nothing if you don’t have the right expertise to react to the alert, quickly decipher complex reports, investigate the threat, and determine the right response. And meanwhile, the threat actors aren’t standing still – they’re developing measures to circumvent controls in some traditional sandbox environments.

    You will learn:
    1.How the threat is evolving and how actors are employing evasive practices to overcome traditional and even some more sophisticated security defenses
    2.Why next generation sandboxing and full-system emulation are the keys to combatting evasive malware threats
    3.The expertise needed to accurately identify and diagnose the threat once the alert is received
    4.How to ensure your organization has the ability to respond effectively to the incident and close all the backdoors a threat actor may have opened
  • 2014 could have easily been called, “The year of the biggest security breaches since the beginning of forever.” But given current security practices and technologies, many of the breaches could have been prevented. So why weren’t they?

    Many of the affected companies fell into a very common trap, thinking that if a company goes to the trouble to be legally compliant then it will be effectively “secure.” Unfortunately, as with many kinds of regulations, legal compliance really represents the absolute least amount of effort required. If companies want to give themselves the best chance to avoid the very severe consequences that come with a major breach, there are five practices they need to put in place now.

    Join Adrian Sanabria, Senior Security Analyst at 451 Research, and Amrit Williams, CTO of CloudPassage, on this webinar to learn
    · Possible gaps left by the compliance-first approach to security
    · How to limit vulnerabilities across traditional, virtual and cloud infrastructures
    · Five best practices to avoid a major security breach in 2015
  • The bring-your-own-device (BYOD) movement has been a huge boon for businesses that put a premium on productivity. File sync and share solutions have emerged to help employees work from anywhere, at any time, on any device. In this BrightTALK exclusive, eFolder explores the top seven features that business should consider when adopting a file sync and share solution. Learn what is required for a file sync and share solution to improve collaboration, maximize productivity, and ensure security.
  • Join Tom Kellermann, Chief Cyber Security Officer for Trend Micro, in an informative webinar specifically tailored for corporate executives and directors who are ready to take the reins of a real and effective plan to secure their organization, their data, and their careers against targeted attacks.

    During this live webinar, you’ll learn:
    • How to identify, classify, and protect your valuable data assets
    • How to assess your organization’s vulnerability to attack
    • How to measure and mitigate cyber risks cost-effectively
  • The Internet of Things (the new buzzword for the tech industry) is increasing the connectedness of people and things on a scale that was once beyond imagination. Connected devices outnumber the world's population by 1.5 to 1.It is expected to eventually touch some 200 billion cars, appliances, machinery and devices globally, handling things like remote operation, monitoring and interaction among Internet-connected products.

    In combination with the fact that there are almost as many cell-phone subscriptions (6.8 billion) as there are people on this earth (seven billion), we have all the ingredients for a Perfect Cyber Storm.

    Join me for an informal discussion of the challenges for our profession, and some possible solutions.
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources.

    In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.

    In this practical session, Joe will cover:
    - How to work around the limitations of a small (or one person) team
    - Tips for establishing a daily routine
    - Strategies to effectively prioritize daily tasks
    - Benefits of threat intelligence sharing
    - Critical investigation & response steps when the inevitable incident occurs
  • Cutting down on the time taken to complete complex document review cycles allows the modern lawyer to operate at the pace required by their industry.

    Join our webinar to learn top tips for shortening these review cycles without losing document integrity and risking corruption. We’ll also cover what technologies are available to provide a quick and accurate way to improve document review efficiency.
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • Channel
  • Channel profile
  • How to Avoid Social Engineering Attacks Mar 25 2015 5:00 pm UTC 45 mins
    You only have two lines of defense when it comes to blocking threats. Beyond relying on your security solution for protection the only safeguard is you and your decisions. Malware authors aren't too concerned about what your AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Their focus now is social engineering. You'd be surprised what the average user, and even the experienced user might fall for when it's presented in a professional fashion. We'll talk about tactics involved with phishing attachments, Fake AVs, PUAs, Cold Calls, and Encrypting Ransomware. This Webinar will go into detail on the different types of social engineering used in each of these threats to turn you into a reliable clicker.
  • Webroot SecureAnywhere® Business – Endpoint Protection Recorded: Feb 17 2015 48 mins
    With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection has now become ineffective due to the sheer volume, quality, and complexity of malware. New threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
    Please join us for a live demonstration of Webroot SecureAnywhere® Business – Endpoint Protection.
  • A Brief History of Malware Recorded: Jan 19 2015 48 mins
    There was more Malware in 2014 than all Malware measured since 1984! Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites, or from bots that reside on the own corporate network. In this special webcast the presenter will take a step back and review the history of malware, its purpose then, and its purpose now.
  • A Smarter Solution to Malware Prevention Recorded: Dec 16 2014 49 mins
    Traditional endpoint security has failed to keep up with today’s threats and is exposing organizations to unacceptable levels of risk. It’s time for smarter, next-generation malware prevention to replace or supplement traditional defenses. New approaches to malware can wrest back control and give security administrators greater visibility and control over their endpoints at a lower cost than traditional solutions.

    This webinar will look at the endpoint threats organizations are facing, the means to combat those threats, and why next-generation, cloud-driven protection offers the smartest way to prevent endpoint malware infections.
  • 2014 - The Perfect Malware Storm Recorded: Nov 19 2014 38 mins
    In 2014 we’ve already seen about 35% of the new malware ever seen!
    In this webinar you’ll learn what has created this perfect storm of new malware?
    What sort of malware it is? What it’s doing? And where Webroot believe this is going in the next 12 months into 2015.They say knowledge is power this webinar will give you the understanding to go with it and help you defend your organization.
  • Evolution of Encrypting Ransomware Recorded: Oct 23 2014 48 mins
    Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV.

    The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing money mules.
  • Protecting Against Advanced Malware Recorded: Sep 10 2014 36 mins
    Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. It can operate for days, weeks, or years, collecting financial and intellectual property information, while traditional antivirus technology is virtually powerless to defend against it. In this presentation, we will examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve.
  • Increase ROI & Bandwidth with Full Endpoint Coverage Recorded: Aug 28 2014 34 mins
    Do you currently deploy separate solutions for antimalware and antivirus protection? Wouldn’t it be nice if you only had to deploy and manage one solution to handle all your endpoint security needs? When you’re stuck managing multiple solutions, you also have to deal with the additional hassles of higher costs, poor productivity, reduced availability and uptime.

    Join us as we address the challenges and frustrations admins typically face, and demonstrate how next generation cloud-based security can offer a simpler, more effective solution to managed endpoint protection.
  • An Alternative to Traditional Endpoint Security: A Truly Cloud-based Solution Recorded: Jul 22 2014 42 mins
    These days, the majority of the computing world is talking about “the cloud”. Almost every company has catchy advertising taglines to sell the wonders of cloud-based services; but many providers sell services with limited cloud capability as cloud solutions. Some endpoint security providers offer traditional, hosted security services with web-based management consoles, but that’s not true cloud technology. Others offer partial cloud solutions that still need massive, locally installed software clients. This isn’t true cloud technology either. How many internet security providers can honestly claim to be 100% in the cloud? Furthermore, how can you differentiate between fact and fiction amidst the clamor of cloud-related marketing?

    Join us as we address the confusion and misdirection, and show how truly cloud-based security can offer a better solution to managed endpoint protection.
  • AV isn't Dead. It's Evolving. Recorded: Jun 26 2014 36 mins
    Traditional signature AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks, and micro variant financial threats are just some of the examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. To keep up with modern malware, the methods for discovering and addressing new threats needs to change. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Security in the Face of Compromise Recorded: May 20 2014 38 mins
    Endpoint security has come a long way from traditional definition based solutions. So has technology which aims to prevent compromise of an infected system. Join this webinar to see live demos of Web-injection attacks, keyloggers and custom malware and see how the next generation of endpoint technology is able to prevent compromise, even when the host system is infected.
  • Modern Malware and the need for Remediation Innovation Recorded: Apr 23 2014 34 mins
    Malware today is very different from just a few years ago. Traditional AV technology is no longer able to consistently and fully remediate or defend against today’s most advanced threats. New and emerging threats such as ransomware, social engineering driven attacks and micro variant financial threats are just some examples of difficult to remediate infections. This presentation will take a look at the malware landscape and explain why these tactics are so effective against traditional AV technology. We will examine three specific families of infections and highlight their tactics to evade detection and what issues occur with remediation. Lastly, we will talk about Webroot’s innovation and how our SecureAnywhere AV solution is capable of defending against, and remediating today’s most advanced threats.
  • Avoid AV Storms Recorded: Mar 19 2014 46 mins
    Most companies deploy virtual environments in order to get the most out of their hardware (maximize utilization). Traditional security was designed to be deployed in a one-to-one fashion, relying heavily on existing computing resources (CPU, RAM, Storage) and often taking full advantage of all resources available. In virtual environments with multiple machines and signature based protection, when a scan runs or signatures are updated (typically daily) and simultaneously, it has the potential to consume all resources available, creating what is called an AV storm. This presentation will explore the modern VM security landscape and the introduction of Agentless Security and associated efficacy.
  • The State of Mobile Security Recorded: Feb 20 2014 49 mins
    This presentation will take a deeper look at the Webroot® Mobile Data Report, released January 2014, and dive into the interesting details including which app categories are most often associated with malicious apps, which malicious apps were most often detected and which families showed the strongest growth. Additionally, the use of device level security features, such as lost device protection, will be evaluated. In addition to analysis of the report’s data, key mobile security events from 2013 will be discussed and analyzed to expose their real impacts to businesses and users alike. Lastly, taking what was learned in 2013, the presentation will leave you with a number of mobile security predictions for the year to come along with mobile security policy suggestions to ensure you’re prepared.
  • CryptoLocker: Your Money or Your Life Recorded: Jan 21 2014 45 mins
    As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage is irreparable. This presentation will cover how threats like CryptoLocker get around traditional security measures, why they are so dangerous, and the Webroot solution.
  • Stopping the Scam – Techniques for Defending Against Today’s Social Engineering Recorded: Dec 12 2013 34 mins
    Are humans the weakest part of the security chain? This presentation looks at the most common social engineering attacks in use today and how they manipulate people to divulge personal and confidential information. These effective schemes are common across social networking sites such as Facebook, Twitter and LinkedIn. With Phishing attacks increasing over 60% in 2012, the presentation will explore why this form of attack is often the first step in exploiting an individual or corporation, and recommend techniques to avoid these scams.
  • Panel: Mobile Application: Converging Business Priorities And Security Recorded: Nov 14 2013 59 mins
    Abstract: Every business is now an internet company relying either internally for administration and processes or externally for sales and customer service on applications hosted on their servers or living in the cloud. This panel will focus on discussing how leading organizations have utilized apps to form their business models, grow revenue and support their clients while adhering to the compliance and security standards that reduce risk and allow their companies to thrive.

    Panel:

    Moderator: Jarad Carleton, Principal Consultant, ICT Practice

    Chad Bacher, CTO, Webroot

    Andrew Hoog, CEO, ViaForensics

    Jeff McGrath, Senior Director of Product Marketing, Good Technology

    Kevin McNamee, Director Kindsight Security Labs at Alcatel-Lucent
  • The Global Rise of Android and Mobile Malware Explained Recorded: Nov 12 2013 48 mins
    Android achieved 79.3% smartphone operating system market share in 2Q13, according to IDC’s latest report, with the popular Samsung Galaxy S 4 moving around 20 million devices in 60 days or approximately 228 per minute. With the rise in the popularity of the Android platform, this has peaked interest with cybercriminals looking for weaknesses to exploit to maximize gain. This presentation will look at the rise of Android and delve into the world of rapidly growing mobile malware.
  • Then and Now – Securing the 3 Most Common Threat Vectors Recorded: Oct 22 2013 45 mins
    Signature based antivirus is failing. Due to the sheer volume of malware, traditional endpoint solutions are getting bigger, clogging down systems and are ultimately ineffective against today’s threats. This presentation focuses on the three vectors of vulnerability that companies must diligently secure: Traditional Endpoints, Mobile Endpoints, and Web access. These are the arenas in which malware authors look to expose and attack, stealing personal information, monetary assets and other intellectual property. We will demonstrate how Webroot's common underlying technology platform, the Webroot Intelligence Network, which leverages cloud collective intelligence can make real-time behavioral determinations and deliver real-time protection with unprecedented speed and accuracy.
  • Cloud Security Intelligence vs. First Generation Detection and Remediation Recorded: Sep 19 2013 46 mins
    The presentation will review the threat landscape and why traditional AV has become a burden to organizations and failed to deliver adequate protection. It will cover the power of user sourced, big data analytics and the processing power of cloud, to deliver efficient and effective protection. It will also cover how this highly differentiated approach to endpoint protection, is the future for securing multiple and varying devices, in an industry dominated by me-too solutions.
The fastest, easiest-to-manage solutions for Endpoint & Web Security
Webroot is committed to taking the misery out of Internet security for consumers and businesses worldwide. Webroot products consistently receive top review ratings by respected third parties and have been adopted by millions globally. With a wide range of online security products for home and office, Webroot protects corporate networks and allows consumers to download music, store digital files, bank, shop, surf and search – safely. Founded in 1997, the company provides best-of-breed security solutions that protect personal information and corporate assets from online and internal threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: From Guessing To Knowing—How Cloud Endpoint Security Keeps You Ahead of Threats
  • Live at: Sep 5 2012 3:00 pm
  • Presented by: Grayson Milbourne, Director of Global Threat Research, Webroot
  • From:
Your email has been sent.
or close
You must be logged in to email this