Defend Your Company Data and Mobile Workers from Cybersecurity Threats

"It’s a growing problem. Your mobile workers want continual access to company data so they can perform their responsibilities and increase their productivity. But, allowing this information on personal mobile devices increases the risk of malware and lost data.

Join our webcast to understand why having data and apps from both personal and business environments on mobile devices is dangerous"
Watch Now

Spotlight

"Weekly headlines brim with stories of cyber breaches that target the enterprise. But SMB’s need to beware: They are just as much at risk, and perhaps more so. SMB’s are an easier target, and hackers know it: Smaller businesses have limited security resources and expertise. To make matters worse, they are often unaware of the dangers. It is time to take action, and SMB’s can start with one key area: Fix the misuse of elevated privileges. Armed with administrative rights, threat actors have free rein over desktop systems. Once they compromise these systems, the very survival of the business is at stake. With a few strategic moves, smaller businesses can mitigate these risks, by utilizing some of the tools and strategies of their larger counterparts. The good news is that one of the best enterprise tools is free and already available in every Windows domain: Group Policy. With Group Policy, SMB’s can automate tasks like limiting desktop privileges, installing and patching software, and whitelisting applications. The time is now for SMB’s to enlist such readily available tools in their defense. Learning Group Policy security features will go a long way toward making the environment more secure "


OTHER ON-DEMAND WEBINARS

Defending Against the Next-Gen Attack Vector

"Gartner estimates that by 2017, 50% of network attacks will use SSL. Cybercriminals have figured out where every enterprise is most vulnerable and inept to respond – their keys and certificates. As a result, cybercriminals exploit the blind trust that every organization has in encryption keys and digital certificates, using them as an attack vector to infiltrate secure networks and exfiltrate data. According to Intel Security (McAfee), the volume of digitally signed malware more than tripled in 2013 when compared to the previous year. The challenge to every enterprise appears impossible; over half of all enterprises don’t know how many keys and certificates are in use, for example. More than 60% of organizations would take a day or more to correct CA trust relationships if attacked by digitally signed malware or respond to a compromised SSH key."

Security Incidents are the New Normal - Common Gaps in Network Security Strategies

ForeScout

In a survey conducted by Forescout and Frost & Sullivan last October, the reality of how many “serious incidents” were faced by large enterprises is discussed. The results are shocking, in this webinar we will look at the results and dissect the findings to demonstrate how businesses are facing attacks and dealing with incidents.

"Risk-Based Security - Where Next?"

First base technologies

We seem to be struggling to get to grips with risk-based security, especially where it concerns defensive strategy. Few if any organisations have sufficient budget to protect and test every part of the business, so how do we choose where to put our effort and money? The skills, knowledge and techniques needed to defend against an agile and devious attacker are available but infrequently deployed properly. In this webinar, Peter Wood will describe some case studies where risk-based security has made a real difference to organisations’ defences and response to cyber-attack.

Practical Advice for Cloud Data Security

"The rapid rise of cloud data storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned. This session will focus on practical advice on what to look for in cloud service providers and a review of the technologies and architectures available to protect sensitive data in the cloud, both on- and off-site. Through real life use cases, data security industry expert Ulf Mattson will discuss solutions to some of the most common issues of data governance, usability, compliance and security in the cloud environment."

Spotlight

"Weekly headlines brim with stories of cyber breaches that target the enterprise. But SMB’s need to beware: They are just as much at risk, and perhaps more so. SMB’s are an easier target, and hackers know it: Smaller businesses have limited security resources and expertise. To make matters worse, they are often unaware of the dangers. It is time to take action, and SMB’s can start with one key area: Fix the misuse of elevated privileges. Armed with administrative rights, threat actors have free rein over desktop systems. Once they compromise these systems, the very survival of the business is at stake. With a few strategic moves, smaller businesses can mitigate these risks, by utilizing some of the tools and strategies of their larger counterparts. The good news is that one of the best enterprise tools is free and already available in every Windows domain: Group Policy. With Group Policy, SMB’s can automate tasks like limiting desktop privileges, installing and patching software, and whitelisting applications. The time is now for SMB’s to enlist such readily available tools in their defense. Learning Group Policy security features will go a long way toward making the environment more secure "

resources