Designing Your Next-Gen Endpoint Security Strategy to Defend Against Modern Threats

Today’s security battle is being waged at the endpoint, and industry analyst firms are all reaching the same conclusion: every organization needs to upgrade their endpoint security to a modern Next-Generation Endpoint Security solution (NGES). As your organization begins the search for a Next-Generation Endpoint Security (NGES) solution, you’re faced with an overwhelming number of vendors and approaches. So how does one build a next-gen endpoint security strategy?During this webcast, Rick McElroy, Carbon Black Security Strategist cuts through the noise and offers a clear description of.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Threat Detection for Common MITRE ATT&CK Techniques

LogRhythm

If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join Ultimate Security Windows Host Randy Franklin Smith to zero in on the new standard to assess the effectiveness of your security monitoring and alerting capabilities — the MITRE ATT&CK framework.
Watch Now

Microsoft 365 Security in the Face of Increased Mobility & Security Breaches

With technological advancements taking the world by storm, almost every other company is now a software company. All these companies are slowly moving to the cloud to reduce IT investment. Whether it is delivering personalized apps, or employing software to improve internal processes or managing business transactions – it is all on the cloud. This recent expansion of technology has made the threat of cyberattacks exceedingly prevalent and more aggressive.��
Watch Now

State of Cloud Security in the Enterprise

More and more enterprises have moved their infrastructure and operations to the cloud than ever before. Along with these changes, we have also seen a significant change in enterprise security posture and use of technology. However, what does that change look like? How have security teams kept up with the change? Just what is the state of cloud security in the enterprise?
Watch Now

How to Secure Teams From External Threats and Data Loss

Microsoft Teams is arguably the most powerful workplace productivity tool on the market. But with such a robust solution comes a myriad of potential vulnerabilities that could affect your day-today business. In fact, both Gartner and Forrester report that 80% of SaaS breaches stem from misconfiguration, inappropriate user behavi
Watch Now