Webinar - Stop More Threats With Additional Email Security Layer

Frustrated by malware and spear phishing attacks getting past your email security defenses? According to the SANS institute, 95% of all attacks on enterprise networks gained entry through a spear phishing attack. By adding an additional email security layer that utilizes technologies such as multi antivirus scanning and data sanitization you can catch more malware threats and spear phishing attempts, which previously would have passed by undetected.Tony Berning, Senior Product Manager at OPSWAT, discusses how the Metascan Mail Agent can be used with Exchange Server or any third party email security gateway to scan email attachments and significantly increase your protection against email-borne threats. Tony also completes the webinar with a live demo of Metascan Mail Agent.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Zimperium & IBM MaaS360

Zimperium

Zimperium has integrated IBM MaaS360 into zConsole, the administrative console that supports our award-winning mobile threat defense (MTD) solution, zIPS. With “Zimperium for MaaS360,” MaaS360 owners can now detect mobile risks and threats with Zimperium, and then set compliance and remediation policies them via MaaS360. Watch our on-demand webinar to learn more about Zimperium’s integration with IBM MaaS360. In this recorded event, we review how Zimperium and IBM work together, including: Deployment / activation.
Watch Now

Overcoming Unstructured Data Security and Privacy Choke Points

HealthcareInfoSecurity

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as GDPR and CCPA. Join Deborah Kish, former Gartner data security analyst, as she shares insights gleaned from hundreds of sessions with CISO, CIO, CDO, CPO and CCOs to offer an insider's playbook to implementing an unstructured data security and privacy program.
Watch Now

ON-DEMAND WEBINAR Why Cyber-Physical Convergence Really Matters

Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it really mean and why does it matter? In this session we’ll discuss: The evolution of converged security Cyber-physical security convergence vs. security convergence Preparing for, and protecting against, cyber-
Watch Now

AWS + Fortanix: New Innovations to Accelerate Cloud Adoption Through Data Security, Privacy, and Compliance

While the GDPR and Schrems II mandates accelerated the need for external key management solutions in Europe, it is clear that these needs are expanding to become global requirements. Other countries and even states are jumping into the fray with clear specifications for safeguarding Personally Identifiable Information (PII). For example, Schrems-II doesn’t allow keys that provide access to the encrypted data, to be hosted outside of the European Economic Area (EEA). Privacy and compliance are calling the shots on the data protection lifecycle.
Watch Now