Securing your IT Infrastructure: It’s a Jungle Out There
The data on computer systems are an enterprise’s single most valuable resource. Data loss can be very costly, particularly for organizations in the small and medium business market where the difference between survival and closure can be razor thin. A network without proper security is an invitation to economic ruination, public humiliation, customer loss of trust and in some cases legal action.
In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet based and cyber attacks. The basic methodology of each threat and how to mount effective counter measures, will be examined and reviewed.
RecordedJul 30 201345 mins
Your place is confirmed, we'll send you email reminders
Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant and Joshua Daggs, Sales engineer
The World Wide Web is wasteland brimming with uncontrolled threats and dangers to IT security. Network and IT managers can prevent those threats from causing damage by preventing employees from accessing malicious sites in the first place. Deploying web filtering and enforcing an Internet access policy is the way forward.
This webcast discusses the dangers of the wild wild web, and explains how common sense and an Internet policy, backed up by an automated web security management tool such as GFI WebMonitor®, can help your business to make the most of what the Internet has to offer, yet without the dangers.
Sara Foley, Product Manager, GFI WirelessSentry and Joe Kern, Global Product Management, GFI Software
This product introduction will highlight the exciting features of the latest addition to the GFI Software™ family of products – GFI WirelessSentry™ (we call it GFI WiSe™ for short).
GFI WiSe provides IT administrators greater freedom and flexibility to monitor, manage and secure their wireless networks. By attending this training session you’ll learn how GFI WiSe will help improve wireless network deployments.
GFI WiSe enables you to:
• Monitor wireless activity and bandwidth utilization
• Manage your existing hardware without purchasing new access points
• Secure your users and protect business intelligence from wireless threats
Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
Zero day threats, undiscovered vulnerabilities, data leakage and intrusions are all terms no network manager ever wants to hear, especially when those intrusions are caused by faulty software or bugs. Join this webcast to find out how automation of patching can make these worries all things of the past.
Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
While many have come to appreciate the power of modern search engines, such as Google or Bing, there is a threat presented by unfettered searching - one that can compromise security, violate policies and confound compliance requirements.
Dealing with that threat has become a major chore for today's network security personnel, nevertheless, many of the tools on the market leave much to be desired.
Join this informative webcast and learn about that threat and how to deal with it.
Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant and Joshua Daggs, Sales engineer
As the types and methods of security solutions become more diverse the challenge to manage the network security infrastructure has grown exponentially. This webcast will look at the key challenges and offer solutions to some of the most pressing issues confronting network security professionals.
During this webcast we will cover vulnerability assessment, threat detection and network auditing. Additionally our presenter will examine patch management, compliance, inventory assessment and effective control of BYOD (Bring Your Own Device) threats to your security and how to use these techniques to assure your data is as safe as possible.
Frank J. Ohlhorst, Author, Analyst, Journalist and IT Consultant
The role of an IT administrator does not end when the network is set up and the necessary security measures are in place. The ongoing health and security of the network is also dependent on the business satisfying a number of laws and regulations which the IT administrator must be aware of. Furthermore, the admin must also monitor the network continuously for faults as well as suspicious/malicious activity.
In this webcast we will show you how to use log data analysis and other techniques to proactively address hardware faults, malicious intrusions and other unwelcomed issues in real time. As a result, you can avoid having to react after the incident has occurred when, often, the damage has already been done.
The data on computer systems are an enterprise’s single most valuable resource. Data loss can be very costly, particularly for organizations in the small and medium business market where the difference between survival and closure can be razor thin. A network without proper security is an invitation to economic ruination, public humiliation, customer loss of trust and in some cases legal action.
In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet based and cyber attacks. The basic methodology of each threat and how to mount effective counter measures, will be examined and reviewed.
Monthly webcasts on monitoring, managing & keeping a secure network
Tune in to our live and recorded webcasts to discover how GFI’s solutions help you secure, monitor and manage your network while enhancing productivity. These solutions consist of: