THE DIFFERENCE BETWEEN ENDPOINT PROTECTION AND TRADITIONAL ANTIVIRUS

Traditional antivirus solutions require a list of virus definitions - or "signatures" to detect known viruses and malware. But with nearly 1 million new malware threats released - every day, it is no wonder traditional antivirus can no longer cope. Learn the difference between traditional AV and Endpoint Protection. Discover the difference between signature-based and behaviour-based detection, and the fundamental differences between Antivirus and Endpoint Protection.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

How to Implement a Cybersecurity-first Culture for the Modern Workplace

The shift to the remote and hybrid workplace has presented new opportunities to hackers as they look to exploit weaknesses brought about by unfamiliar work practices, multiple and BYOD devices, and most importantly the busy day-to-day lives of our employees. According to email statistics, the average person receives over 100 emails per day (Earthweb), and with human error the cause of 85% of cyber security breaches (IBM) you can see why email is the number one threat vector.
Watch Now

Security Holes In The Machine Learning Pipeline

Python is the second most popular language and is very easy to start using. It is almost a de-facto standard in machine learning. Here be dragons! Many machine learning (ML) models are Python pickle files under the hood. The use of pickling conserves memory, enables start-and-stop model training, and makes trained models portable (and, thereby, shareable).
Watch Now

Information is power: The role of threat intel in cloud security

Cloud security is complex. Join Omdia’s expert cybersecurity analysts as they discuss the complex nature of cloud security and provide insights into everything from threat intel and SaaS to infrastructure- and platform-as-a-service, customer responsibilities, emerging trends, and the kinds of tools available to help.
Watch Now

OT & IoT Security Case Studies to Ensure Reliable Cyber Resilience

Uptime, disruption-free operations, and availability are important considerations for any OT and IoT security plan. Knowing the threats and ways to mitigate them is only half the battle. The other half involves aligning technology, assets, and knowledge base to secure the entire length and breadth of your business and its digital footprint.
Watch Now