Alert Logic
Attend this webinar to learn about new capabilities that Alert Logic has added that extends attack surface coverage for Endpoint, Multi-Cloud, and Dark Web. Get broader detection and response for less effort and lower cost with no SIEM required.
Watch Now
Aqua
Kubernetes is fundamentally a complex system with lots of different potential attack vectors aimed at data theft, currency mining and other threats. Liz Rice, a renowned technology evangelist, will take us through an overview of the current state of security-related features in Kubernetes, and offer directional starting points on how to secure Kubernetes components and the applications that run on top of these Kubernetes components. Brice Fernandes, software engineer and entrepreneur at Weaveworks, will then demonstrate how you can build a secure and reliable Kubernetes deployment pipeline with GitOps best practices, separating the responsibility between packaging software and releasing it to a production environment.
Watch Now
Zimperium
Mobile operating systems (OSs) are fundamentally different from other endpoint OSs. Simply porting a security solution developed for a different platform over to mobile is inadequate and can leave your enterprise vulnerable. Effective enterprise mobile security requires a purpose-built solution that: Can protect mobile devices against known and unknown threats. Operates effectively even when an attacker controls the network.
Watch Now
Mimecast
Your organization likely has extensive security protections for your inbound email from the Internet. However, as much as two-thirds of many organizations’ total email traffic is generated internally by users. And, of course, attackers know this. Are you inspecting your internal email with the same diligence as your inbound email? What about the emails being sent out to your partners, suppliers, and customers? Attend this webinar to take a step inside your organization’s entire email traffic to learn about: The latest techniques that attackers are using to target your users. How attacks are spread both internally and externally. Advanced security and automation to defend your organization from compromised users and internal threats.
Watch Now