Browse communities
Browse communities
Presenting a webinar?

World-Class Malware Defense: Using the Cloud to Secure Your Business

Phil Owens, Senior Sales Engineer, GFI Software
Phil Owens, Senior Sales Engineer, GFI Software
Oct 17 2012
24 mins
World-Class Malware Defense: Using the Cloud to Secure Your Business
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Insights From CyberEdge’s 2015 Cyberthreat Defense Report Recorded: Mar 27 2015 44 mins
    Steve, CEO, CyberEdge Group
    CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • Attack Intelligence: The More You Know, The Less Damage They Can Do Recorded: Feb 26 2015 48 mins
    Charles Kolodgy, Research VP, IDC for Security Products; Tom McHale, Director of Product Management, ThreatTrack Security
    Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Protect Your Organization from Spam and Malware with VIPRE for Exchange Recorded: Nov 6 2014 45 mins
    Jerry Smith, Sales Engineer, ThreatTrack Security
    The biggest security vulnerability within any organization is their employees, and they are more often targeted through email than any other threat vector. VIPRE Email Security for Exchange makes life easy for IT admins while delivering comprehensive email security. Protect your enterprise with a solution that can manage all your messaging security needs with unparalleled flexibility and reliability, and at the same time consolidate anti-spam, anti-phishing, antivirus, attachment filtering, malware protection and disclaimers all in one solution.

    Attend the webinar to learn about this easy to manage, all-in-one integrated and 100% policy based email security product.
  • VIPRE Email Security for Exchange 4.0 Partner Training Recorded: Nov 5 2014 44 mins
    Jerry Smith, Sales Engineer, ThreatTrack Security
    ThreatTrack Security will be launching it’s latest version of VIPRE Email Security for Exchange on November 6 and hosting an exclusive webinar to our valued resellers on November 5.

    VIPRE for Exchange makes life easy for IT admins while delivering comprehensive email security. Ensure your customers are well protected with a solution that can manage all messaging security needs. VIPRE for Exchange provides extra protection through:

    •Anti-spam, antivirus, anti-phishing, anti-spyware, and malware protections
    •Multiple scanning engines
    •Powerful policy-based SMART attachment filtering
    •Dedicated PDF and image-spam engine
    •Message disclaimers

    Register Now to be the first to learn about these updates.
  • Automating Attack Classification and Threat Remediation to Reduce Risk Recorded: Sep 24 2014 31 mins
    Eric Hay, Senior Systems Engineer, ThreatTrack Security
    Automation is the key to Advanced Threat Protection. This emerging best practice is empowering organizations, especially those with limited IT/IR resources and insufficient in-house cybersecurity expertise, to cut through the noise and confusion of constant alerts enabling them to prioritize threats based on immediate risk.

    Taking it a step further, automated advanced threat remediation can save organizations tens of thousands of dollars a year lost to wiping, re-imaging and replacing infected endpoints.

    Learn how to bolster and streamline your cyber defenses with Automated Attack Classification and Threat Remediation.
  • Advice for CISOs Taking a Seat at the Leadership Table Recorded: Aug 26 2014 49 mins
    Stuart Itkin, Chief Marketing Officer, ThreatTrack Security; Al Seifert, CEO, MSB Cybersecurity
    ThreatTrack Security research underscores that CISOs and other information security leaders are often misunderstood and under-appreciated by their C-level peers. We believe that CISOs – properly empowered within an organization – are absolutely vital to an effective cyber defense.

    Join ThreatTrack Security and MSB Cybersecurity on Tuesday, August 26 at 2:00 p.m. ET as we share our findings and provide expert advice on what it takes build your reputation and stature within the C-suite.

    Key findings include:

    · 74% of top executives do not believe CISOs deserve a seat at the senior leadership table

    · Nearly half (44%) of top executives view the primary role of the CISO as a scapegoat for data breaches

    · Less than half (46%) of respondents believe CISOs should be responsible for cybersecurity purchasing decisions

    · 68% of top executives do not agree that CISOs have broad awareness of organizational objectives and business needs
  • ThreatSecure: Revolutionizing Advanced Threat Defense Recorded: Jul 24 2014 46 mins
    Eric Hay - Sr. Systems Engineer, ThreatTrack Security
    ThreatSecure is a revolutionary cybersecurity solution that will change how enterprises defend themselves against advanced threats.

    ThreatSecure can enable your organization to:
    · Detect malware others can't with industry leading behavioral analysis and machine learning algorithms that identify APTs, targeted attacks and Zero-days

    · Automate threat remediation by deploying custom remediation packages to compromised systems regardless of what endpoint security you use

    · Simplify threat protection by eliminating the noise of overwhelming alerts from disparate systems, enabling your team to quickly focus and respond to the biggest threats you face

    Join us Thursday, July 24 at 2:00 p.m. ET to discover why ThreatSecure is the solution to today's data breach epidemic.
  • Cybersecurity – A View from the Frontlines Recorded: Jun 19 2014 48 mins
    Mark Arnold, PTC; Adrian Sanabria, 451 Research; Julian Waits, ThreatTrack
    ThreatTrack Security hosts a roundtable to discuss the current state of cybersecurity. Our panel of industry insiders and security leaders will share their views on:

    · The shifting threat landscape

    · An evolving security market

    · How enterprises are responding to increasingly sophisticated threats

    Join us for an interactive discussion to make sense of today’s crowded security market and best practices that you can implement to bolster your own cybersecurity.
  • Cybersecurity Evolution: What’s Hype and What’s Not Recorded: Mar 28 2014 48 mins
    Adrian Sanabria, Senior Analyst, The 451 Group; Matt Mosley, Director of Product Management, ThreatTrack
    Using the latest research and their own best practices, ThreatTrack Security will walk you through the latest security trends and predictions for upcoming threats in 2014. We will discuss real threats and solutions and talk about what turned out to be just speculation.
  • Automate. Analyze. Act. The 3 Pillars of Advanced Malware Defense Recorded: Dec 5 2013 30 mins
    Erik Mogus, Scott Campbell and Nick Keuning, ThreatTrack Security
    More than 200,000 new malware threats emerge every day. 40% of data breaches involve malware, and 66% of data breaches take up to a year to be discovered.

    Join ThreatTrack Security for an in-depth look at how a dynamic approach to malware analysis can fundamentally transform your cyber defense. Knowing isn’t enough, threats must be eliminated. In 3 steps, we will show you how to efficiently analyze and act on those files that pose the greatest risk to your network. Finally, armed with this threat intelligence, you will be able to more effectively and efficiently remediate advanced malware like APTs and Zero-day attacks, and completely eliminate them from your network.
  • Accelerating Incident Response in the Fight Against Cybercrime Recorded: Aug 15 2013 51 mins
    Dipto Chakravarty EVP, Engineering & Products, ThreatTrack Security
    From APTs to sophisticated Zero-day attacks, time is not on your side when it comes cybersecurity. Malware writers operate at a blistering pace, and they know how to evade traditional cyber defenses. More often than not, these cybercriminals are successful at breaching networks and stealing data before they are even detected. Many enterprises have responded by establishing Incident Response Teams to uncover and combat these new cyber-attacks. However, even an army of malware analysts and reverse engineers can accomplish only so much when faced with inadequate tools and time-consuming, manual malware investigation techniques.

    Join us as we discuss how a malware analysis sandbox gives your Incident Response Team the edge it needs in the fight against cybercrime.
  • World-Class Malware Defense: Using the Cloud to Secure Your Business Recorded: Oct 17 2012 24 mins
    Phil Owens, Senior Sales Engineer, GFI Software
    Phil Owens, Senior Sales Engineer, GFI Software
  • The Layered Approach To Security: Protecting Your Network End to End Recorded: Sep 5 2012 40 mins
    Phil Owens, Senior Sales Engineer, ThreatTrack Security
    How secure is your network? Are you truly covered end to end? Today’s cybercriminals are organized and sophisticated, forcing organizations like yours to combat their attacks on multiple levels with multiple layers of security. Attend this webinar to learn the basics of layered security, why this approach is necessary and how to implement it within your organization.
Malware Protection, Analysis and Remediation
ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware designed to evade the traditional cyber-defenses deployed by enterprises and government agencies around the world. The company develops advanced cybersecurity solutions that Expose, Analyze and Eliminate the latest malicious threats, including its ThreatSecure advanced threat detection and remediation platform, ThreatAnalyzer malware behavioral analysis sandbox, ThreatIQ real-time threat intelligence service, and VIPRE business antivirus endpoint protection. Learn more at

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: World-Class Malware Defense: Using the Cloud to Secure Your Business
  • Live at: Oct 17 2012 5:00 pm
  • Presented by: Phil Owens, Senior Sales Engineer, GFI Software
  • From:
Your email has been sent.
or close
You must be logged in to email this