Endpoint Security and Control
By: Sophos View more from Sophos >>
Download this next:
Worldwide endpoint security for midsize businesses 2024 vendor assessment
By: WatchGuard Technologies, Inc.
Type: Analyst Report
The modern endpoint security market is evolving due to sophisticated cyber threats and increased digital reliance. IDC's analysis shows endpoint security solutions are shifting to multifunction platforms combining endpoint protection (EPP) and endpoint detection and response (EDR) with prevention and recovery features.
The IDC MarketScape report evaluates vendors in the global endpoint security market for midsize businesses. Key findings include:
- Midsize businesses need tailored platforms and strategies.
- Buyers should assess cyber-resilience, evaluate options, and adjust solutions.
- WatchGuard is a Leader in the market.
Read the full report for insights on optimizing cyber-resilience.
These are also closely related to: "Endpoint Security and Control"
-
Worldwide endpoint security for midsize businesses 2024 vendor assessment
By: WatchGuard Technologies, Inc.
Type: Analyst Report
The modern endpoint security market is evolving due to sophisticated cyber threats and increased digital reliance. IDC's analysis shows endpoint security solutions are shifting to multifunction platforms combining endpoint protection (EPP) and endpoint detection and response (EDR) with prevention and recovery features.
The IDC MarketScape report evaluates vendors in the global endpoint security market for midsize businesses. Key findings include:
- Midsize businesses need tailored platforms and strategies.
- Buyers should assess cyber-resilience, evaluate options, and adjust solutions.
- WatchGuard is a Leader in the market.
Read the full report for insights on optimizing cyber-resilience.
-
Actionable insights on the latest cybersecurity threats
By: WatchGuard Technologies, Inc.
Type: Analyst Report
This quarterly report from the WatchGuard Threat Lab offers insights on cybersecurity threats and trends. Highlights include:
· A 24% drop in network-based malware detections, but a 168% rise in evasive malware caught by advanced engines
· A 39% fall in endpoint malware, yet zero-day threats remain challenging
· A 32% rise in network attacks, many targeting a 2019 Nginx vulnerability
· Compromised sites and phishing delivering malicious payloads, some targeting Tibetans and studentsThe report also discusses ransomware, emerging threat groups, and defensive tips.
Read the full WatchGuard Q2 2024 Internet Security Report for a detailed view of the cybersecurity landscape and ways to enhance defenses.
Find more content like what you just read:
-
Actionable insights on the latest cybersecurity threats
By: WatchGuard Technologies, Inc.
Type: Analyst Report
This Internet Security Report analyzes the latest network and endpoint threats, including malware trends, attack vectors, and ransomware. Learn how to secure remote access and build user trust by downloading this e-book.
-
12 key cybersecurity controls for business insurability
By: Hughes Network Systems
Type: Webcast
As organizations continue to combat major cybersecurity challenges, many are seeking out new ways that they can strengthen their security, compliance, and liability management efforts. So, what is the most effective way to do so? Tune into this webinar to learn more.
-
Critical security controls 101: 12 key steps to know
By: Hughes Network Systems
Type: Webcast
As organizations continue to combat major cybersecurity challenges, many are seeking out new ways that they can strengthen their security, compliance, and liability management efforts. So, what is the most effective way to do so? Tune into this webinar to learn more.
-
Buyer's Guide: Selecting a Security-First Identity and Access Management Solution
By: CyberArk
Type: Buyer's Guide
Read this comprehensive buyer's guide to get actionable insights on managing all your identities at a time when the workforce is evolving, must-have capabilities to enable secure and seamless access and using an integrated platform to secure all identities with the right levels of privilege controls.
-
Top 10 Cybersecurity Threats to Watch for in 2024
By: Keeper Security Inc
Type: Blog
Discover the top 10 cybersecurity threats businesses and individuals face in 2024, including social engineering, ransomware, and AI-powered attacks. Learn how to protect yourself with tips from this informative blog post.
-
Security brief: Threats against people, apps, and infrastructure
By: Cloudflare
Type: eBook
Take a deep look at the most important trends shaping the cyber threat landscape today: AI, vulnerability exploitation, DDoS attacks, phishing, and Zero Trust. Based on the extensive data from Cloudflare’s cloud network, this security brief highlights key trends. Access the brief to learn more.
-
Pascoalotto Depends On Check Point For Scalable Security
By: Checkpoint Software Technologies
Type: Case Study
Paschoalotto, a leading Brazilian call center, needed a scalable security solution to meet strict requirements. They chose Check Point's Quantum Maestro Orchestrator, Security Gateways, and R80 Security Management, which provided scalability, cloud integration, and unified visibility, enabling secure services. Read the case study to learn more.
-
Living Off The Land Attacks
By: CyberFOX
Type: eBook
Cybercriminals are using legitimate tools to infiltrate systems and steal data. Learn how privileged access management and blocklisting can reduce your attack surface and prevent "living off the land" attacks. Read the full e-book to discover practical ways to enhance your security.
-
The Most Concerning Developments in P2P Payments Fraud
By:
Type: Replay
Outseer's Jim Ducharme, COO and MUFG Union Bank's retired Director Ken Palla on Authorized Versus Unauthorized Fraud. Whether or not a bank customer authorized a fraudulent P2P payment can be the difference between whether or not the customer is able to get reimbursed by their bank. Outseer COO Jim Ducharme and MUFG Union Bank retired Director Ken Palla break down the significant legal and regulatory differences between authorized and unauthorized P2P payments fraud. In this video interview with Information Security Media Group at RSA Conference 2022, Ducharme and Palla also discuss: • Direct and indirect effects of P2P payment fraud on clients. • Controls that can help organizations mitigate damage. • Regulatory changes across the globe tied to P2P fraud.
-
Revolutionizing P2P: Exploring the Digital Future
By:
Type: Replay
Are you ready to transform your P2P and AP processes and unlock the true potential of your finance operations? Join us for this exciting new, "Revolutionizing P2P: Exploring the Digital Future," designed exclusively for P2P, AP, finance, and procurement professionals like you. In today's rapidly evolving financial landscape, the rising cost of capital has fundamentally changed cash management's criticality and bottom-line impact. How and when you pay your suppliers impacts your organization's profitability, competitiveness, and ability to thrive in the marketplace. In this webinar, Ardent Partners and special guest Tipalti, will examine revolutionary cash management strategies and explore the digital future of P2P. Webinar attendees will learn how to: 1. Gain a Competitive Edge from their P2P Operation 2. Future-Proof Your P2P Team 3. Enhance Cash Flow Management 4. Mitigate Supplier Risk 5. Build Upon Real-Life Success Stories 6. Use Exclusive Strategies and Resources
-
VoIP has never lost its voice: How to get the most out of your business communications
By: TechTarget ComputerWeekly.com
Type: eBook
In today's comms world, and especially with regard to hybrid working, a communications identity has now become a unified calling and collaboration endpoint, one which is part of a suite of business services spanning voice, security and network-as-a-service solutions to power the mobile workforce.
-
Procure to Pay – How to maximise your data quality with Syniti’s DQ Jumpstart
By:
Type: Talk
Procure-to-pay solutions that digitally connect vendors, organisations, policy, and processes are can often be clouded with unusable or incorrect information. Manual data entry and incorrect sources can be the cause of this disruption which can lead to incorrect reporting, excessive costs and time spent on your P2P projects. With Syniti’s DQ Jumpstart, you will receive data insights within two weeks and gain complete visibility of your data! Only Syniti ensures you can leverage your data to recover working capital, reduce P&L costs, and manage procurement supply chain risk. Vendor data and Material data are key company assets. Improve your Procure-to-Pay performance with actionable insights from your data. In this webinar you will see: •Introduction to the SKP - introduction to Syniti and a review of the standard P2P process, identifying the challenges and the negative impact on your business. •The SKP P2P DQ Jumpstart - an insight to Syniti's package and your P2P Process from a data perspective. •Demo - show statistics on data quality. Jump into reports to gain understanding around data and the P2P process. Demo of the Knowledge Tier - Bring all the dots together. Link visions to goals to policies and rules to ensure you reach your business objectives Register now to secure your place on our webinar.
-
Procure to Pay – How to maximise your data quality with Syniti’s DQ Jumpstart
By:
Type: Replay
Procure-to-pay solutions that digitally connect vendors, organisations, policy, and processes are can often be clouded with unusable or incorrect information. Manual data entry and incorrect sources can be the cause of this disruption which can lead to incorrect reporting, excessive costs and time spent on your P2P projects. With Syniti’s DQ Jumpstart, you will receive data insights within two weeks and gain complete visibility of your data! Only Syniti ensures you can leverage your data to recover working capital, reduce P&L costs, and manage procurement supply chain risk. Vendor data and Material data are key company assets. Improve your Procure-to-Pay performance with actionable insights from your data. In this webinar you will see: •Introduction to the SKP - introduction to Syniti and a review of the standard P2P process, identifying the challenges and the negative impact on your business. •The SKP P2P DQ Jumpstart - an insight to Syniti's package and your P2P Process from a data perspective. •Demo - show statistics on data quality. Jump into reports to gain understanding around data and the P2P process. Demo of the Knowledge Tier - Bring all the dots together. Link visions to goals to policies and rules to ensure you reach your business objectives Register now to secure your place on our webinar.
-
Keeping Up with Today’s Top Mobile Spyware Threat Trends | APAC\EMEA
By:
Type: Talk
According to Check Point research, 1 out of every 5 organizations has suffered a malicious incident through mobile activity. An emerging threat is Mobile Spyware. It keeps increasing in sophistication with zero-click attacks and nation-state tools being used on public organizations. Join us to learn more about mobile spyware and how to protect your organization. Agenda: Overview of recent trends in mobile threats A mobile spyware case study Best practices in protecting your organization from mobile spyware attacks Harmony Mobile live demo
-
Keeping Up with Today’s Top Mobile Spyware Threat Trends | AMER
By:
Type: Talk
According to Check Point research, 1 out of every 5 organizations has suffered a malicious incident through mobile activity. An emerging threat is Mobile Spyware. It keeps increasing in sophistication with zero-click attacks and nation-state tools being used on public organizations. Join us to learn more about mobile spyware and how to protect your organization. Agenda: Overview of recent trends in mobile threats A mobile spyware case study Best practices in protecting your organization from mobile spyware attacks Harmony Mobile live demo
-
Network Security - Making Sure VoIP Is Not A Security Risk
By:
Type: Replay
Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.
-
Network Security - Is VoIP A Security Risk?
By:
Type: Replay
Are you deploying SIP Trunks for IP-based carrier interconnection or to serve your enterprise customers? If yes, then you need a session border controller (SBC) to make sure your VoIP services are not a security risk and an attack vector. Join Ribbon's Dan Teichman as he utilizes his years of experience in the telecommunications industry to share with you the latest information and recommendations on securing VoIP networks & services.
-
What is Mobile Threat Defense (MTD)?
By: JAMF
Type: Blog
Implement AI-powered mobile threat defense to protect remote workers from malware, phishing, and network attacks. Learn how mobile threat defense solutions can secure your device fleet and safeguard enterprise data. Read the full blog post to discover the benefits of this comprehensive endpoint security.
-
Veeam data platform & Sophos managed detect and response
By: Veeam Software
Type: eBook
With Veeam’s and Sophos’ integration, anomalies in your backup environment automatically generate an alert to the Sophos MDR team. Together, Sophos and Veeam can help you remain secure and radically resilient - even as threats continue to rise. Read this e-book for more integration details.
-
AI-Powered Search: Maximising Knowledge Mobilisation
By:
Type: Video
Are you ready to revolutionise your AI implementation and digital transformation strategies? Join Coveo in our latest podcast with CCW Europe where you'll get an in-depth look at how Sophos, a global cybersecurity provider trusted by leading enterprises worldwide, uses Coveo to transform their customer experience securely. Here's a glimpse of what you'll learn: • The specific challenges Sophos were facing before bringing Coveo into the picture • How the Sophos team secured executive buy-in for investment in generative AI technology • The work Sophos is doing with data and content in the backend • Roadmaps for AI implementation • How to sidestep concerns around AI hallucinations • The changing dynamics within the general search landscape Featuring Sophos’ Director of Product Documentation and Digital Adoption, Remi Preghenella, and Coveo’s Northern Europe Sales Lead, Geoff Branch, this podcast offers valuable insights for decision-makers driving digital transformation.
-
Recreating the IT walk-in experience through Virtual Tech bars, with Sophos
By:
Type: Replay
Do you have many people working in remote places where the IT walk-in experience is unavailable? Do some of you end-users feel like they are missing out on certain IT services that others are receiving? Sophos had this exact challenge. Specific end-users in remote locations, in countries where IT HQ was unavailable, were desperate to receive the walk-in experience for IT Incidents and Requests. After discovering this was a problem, Sophos worked on how to replicate this experience to all of their end-users - creating a Virtual Tech bar. Find out in this episode the challenges their end-users faced, the solution they implemented and how Sophos increased and maintained end-user Happiness.
-
Recreating the IT walk-in experience through Virtual Tech bars, with Sophos
By:
Type: Replay
Do you have many people working in remote places where the IT walk-in experience is unavailable? Do some of you end-users feel like they are missing out on certain IT services that others are receiving? Sophos had this exact challenge. Specific end-users in remote locations, in countries where IT HQ was unavailable, were desperate to receive the walk-in experience for IT Incidents and Requests. After discovering this was a problem, Sophos worked on how to replicate this experience to all of their end-users - creating a Virtual Tech bar. Find out in this episode the challenges their end-users faced, the solution they implemented and how Sophos increased and maintained end-user Happiness.
-
Best Proactive Ransomware Defense and Orchestrated Recovery
By:
Type: Talk
Ransomware has become the biggest risk to businesses of all size, with an attack estimated to occur every 11 seconds in 2021. It’s time to fight back! You need to arm your organization with a multi-layer protection approach to strengthen your overall data resilience. Join the experts from Arcserve and Sophos for an exclusive webcast to learn about effective ways to minimize your organization’s vulnerability to ransomware: - Proactive ransomware defense for your backup data combined with orchestrated recovery and immutable storage - How to recover data in the event of cyberattacks - How Arcserve & Sophos can give you peace of mind in the event of a ransomware attack so that you can recover and say "no" to ransom demands Arcserve Solutions, secured by Sophos, brings you integrated cybersecurity and data protection with immutable storage for on-premises, cloud, and SaaS-based data.
-
A CFO's Guide to Top AP Performance
By:
Type: Video
In this webinar, Tipalti's VP Finance Alex Cedro and Ardent Partners' VP of Research and Marketing Bob Cohen discuss proven tactics and strategies that AP, finance, and P2P professionals can use to evaluate and improve their processes to achieve top accounts payable performance. Key takeaways include: CFO challenges and concerns in 2023; Critical areas of AP that need addressing; A discussion on best-in-class and smart AP strategies
-
BrightTALK Panel - Sample of Remote Participant - Filmed in London, UK
By:
Type: Video
1 moderator with 2 participant in studio and 1 participant joining remotely over VOIP
-
Jargon Buster Guide to Voice over IP (VoIP)
By: TechTarget ComputerWeekly.com
Type: eGuide
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
-
Boost Your Work from Home Experience
By:
Type: Talk
Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.
-
Boost Your Work from Home Experience
By:
Type: Replay
Tolly benchmarked the quality of service and remediation capabilities of VMware SD-WAN to improve the end user experience for VoIP and work from home (WFH) applications. They found that VMware SD-WAN can remediate packet loss and deliver a high-quality experience, even under adverse network conditions. The results showed that there’s an improvement of up to 45% in the quality of a VoIP call with a 2% packet loss. In addition, in a WFH environment, the results showed an improved download time by up to 71%.
-
Q&A Panel: How to Stay Cybersafe in 2020
By:
Type: Talk
Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face. Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including: • What you can do today to remain secure • The types of threats Sophos Labs is seeing recently • What we know about COVID-19 scams • How to correct your security posture
-
Q&A Panel: How to Stay Cybersafe in 2020
By:
Type: Replay
Cyberthreats morph rapidly as they try to stay ahead of our defenses; wearing new disguises and breaking down virtual barriers in unique ways. As such, the answer to, "How do I remain secure?" changes as quickly as the cyberthreats we face. Join us for an interactive Q&A Panel with experts Chris Chaves of Sophos, and Michelle Drolet and Arun Subramoniam of Towerwall. Engage in a discussion on staying safe in the evolving threat landscape. They'll provide the multi-layered answer to, "How do I stay cybersafe in 2020?", including: • What you can do today to remain secure • The types of threats Sophos Labs is seeing recently • What we know about COVID-19 scams • How to correct your security posture
-
#Infosec18 Video Interview: James Lyne & Thom Langford
By:
Type: Video
Editor and Publisher of Infosecurity Magazine, Eleanor Dallaway, sat down with James Lyne, Sophos and Thom Langford, Publicis Groupe at Infosecurity Europe 2018 to discuss the state of information security
-
Proactive Ransomware Defense and Orchestrated Recovery
By:
Type: Talk
Ransomware has become the biggest risk to businesses of all sizes, with an attack estimated to occur every 11 seconds in 2021*. It’s time to fight back! You need to arm your organization with a multi-layer protection approach to strengthen your overall data resilience. Arcserve Solutions, secured by Sophos, brings you integrated cybersecurity and data protection with immutable storage for on-premises, cloud, and SaaS-based data. Register for this live webinar to hear and learn about effective ways to minimize your organization’s vulnerability to ransomware: Proactive ransomware defense for your backup data combined with orchestrated recovery and immutable storage How to recover data in the event of cyberattacks How Arcserve & Sophos can give you peace of mind in the event of a ransomware attack so that you can recover and say "no" to ransom demands If you'd like to reach out or discuss anything further with our speakers, feel free to reach out to Philip and/or Karl below: Philip Dimitriu | APJ Director Systems Engineering M +61 409 258 090 | philip.dimitriu@sophos.com.au Karl Thomson | Senior Sales Engineer Mobile: +6421354865 Karl Thomson karl.thomson@arcserve.com
-
Tanium Converged Endpoint Management-A Platform to Address Today's IT Challenges
By:
Type: Replay
Organizations lose visibility and control of their IT environments as they grow and become distributed. Tanium offers a single platform that delivers complete, accurate, and real-time endpoint data regardless of scale and complexity. With Tanium Converged Endpoint Management, you have visibility, control, and remediation on any endpoint.
-
Tanium Converged Endpoint Management-A Platform to Address Today's IT Challenges
By:
Type: Replay
Organizations lose visibility and control of their IT environments as they grow and become distributed. Tanium offers a single platform that delivers complete, accurate, and real-time endpoint data regardless of scale and complexity. With Tanium Converged Endpoint Management, you have visibility, control, and remediation on any endpoint.
-
Walking the tightrope - Balancing Usability with Security
By:
Type: Talk
Endpoint security is a balancing act between security and privacy controls, and providing usability to the end user. Endpoint security should be invisible to the user and not get in the way of daily tasks. If we apply too many security controls users will find ways around them effectively removing the control.
-
Computer Weekly – 10 May 2022: The spies who hack you – the growing threat of spyware
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, after 10 Downing Street was hit by a spyware attack, fears about targeted mobile phone hacks are increasing. Our salary survey highlights the diversity challenge in IT, with men's support for women in IT declining. And we look at how datacentre heat reuse can help reduce carbon emissions. Read the issue now.
-
Complying with CPS 234: Proactive Protective Procedures
By:
Type: Video
2020 marked the onset of a digitization juggernaut. While businesses were busy restructuring for online operations to brace the pandemic, nearly every organization in Australia observed a sizeable increase in the frequency of spyware and trojan attacks masked under interactive coronavirus maps and websites. what you will learn : The APRA Prudential Standard CPS 234 aims to fill these gaps in the existing cybersecurity framework and elevate the existing security best practices and preparedness. It will make protection levels more stringent as regulated entities will have to demonstrate compliance with the standard rather than just following the guidance. This also means that sprawling your workloads across multiple clouds is going to get a bit more complex and will come with added responsibility. Enterprises will need the capability to secure their data, ability to thwart potential breaches, and better control over diverse cloud environments
-
Bad Data is Costing You Millions: How to Find it, Fix it, and Keep it Clean
By:
Type: Talk
You know the story by now… data doesn’t keep itself clean, up-to-date and duplicate free. You know that without a data quality strategy your data is misinforming decisions, diluting metrics, giving you the wrong picture, and ultimately – costing you a fortune in time, money and credibility. Join Syniti to find out just how you can take back control, identify problem areas and fix them! Tune in to hear our in-house data quality gurus, Tyler Warden, SVP, Engineering & Products Deputy and Ricardo Rosales, SVP Sales America, dive into the ways that being without a data quality strategy has negatively impacted numerous fortune 500 companies; From Procure-to-Pay (P2P), Order-to-Cash (O2C), inventory, unhappy customers, brand image, inability to deliver a product, and more. You can expect to learn how these leading organizations overcame their grueling data quality challenges and how they kept their data clean. You won’t want to miss this opportunity to gain exclusive insight as to how your organization can utilize accurate, trustworthy data to deliver faster results with less effort.
-
Bad Data is Costing You Millions: How to Find it, Fix it, and Keep it Clean
By:
Type: Replay
You know the story by now… data doesn’t keep itself clean, up-to-date and duplicate free. You know that without a data quality strategy your data is misinforming decisions, diluting metrics, giving you the wrong picture, and ultimately – costing you a fortune in time, money and credibility. Join Syniti to find out just how you can take back control, identify problem areas and fix them! Tune in to hear our in-house data quality gurus, Tyler Warden, SVP, Engineering & Products Deputy and Ricardo Rosales, SVP Sales America, dive into the ways that being without a data quality strategy has negatively impacted numerous fortune 500 companies; From Procure-to-Pay (P2P), Order-to-Cash (O2C), inventory, unhappy customers, brand image, inability to deliver a product, and more. You can expect to learn how these leading organizations overcame their grueling data quality challenges and how they kept their data clean. You won’t want to miss this opportunity to gain exclusive insight as to how your organization can utilize accurate, trustworthy data to deliver faster results with less effort.
-
Navigating Wi-Fi 7: A Deep Dive into Next-Gen Advancements | Session 2
By:
Type: Video
In the second webinar session of Spirent's Wi-Fi 7 Technical Overview, we continue with additional QoS features such as Restricted TWT and Triggered P2P Transmission, then shift focus to Multi-Link Operation, detailing architecture, reliability vs. latency trade-offs, Multi-Link Discovery types, channel access, and performance. MLD contrasts legacy methods, covering association and security setup. This webinar series serves as a concise guide for Wi-Fi enthusiasts, spotlighting its revolutionary features and testing insights for future wireless technology. It closes with a quick overview of Spirent’s OCTOBOX testbeds and software with REST API and ScriptManager integration.
-
Is malware using steganography on your network?
By:
Type: Video
As cyber threats become more evasive, technology that protects organisations must have the capability to look deeper into the content flowing in and out of an organisation's network. More and more, attackers are using seemingly innocuous image files to sneak ransomware and spyware into, or sensitive data out of networks. Join Steve Jeffery, Lead Solutions Engineer for Fortra Email Security, as he outlines how malware can leverage steganography and how to recognise your risk even if it can’t be seen. You'll also learn:
-
Using Intelligence To Safeguard Your Supply Chain Against Cyber Risks
By:
Type: Talk
Security teams are undergoing pressure to monitor and respond to indirect threats to their organisation. New thinking about safeguarding your supply chain has expanded beyond just stolen certificates and code injections targeting your software vendors. Phishing, ransomware, and spyware attacks against any of your partners can also disrupt business continuity or disclose sensitive data that affects you. Join Silobreaker and (ISC)² on 13 September 2022 at 1:00 pm BST to learn about some of the most recent supply chain incidents and best practices to build an effective intelligence programme, helping you navigate the threats beyond your control. In this webinar, you will learn: • The impact of recent supply chain incidents • How to monitor compromised vendors across your supply chain • How to identify when specific threats and risks are trending up so you can be ready to respond • Best practices to build an effective intelligence programme that addresses your risks, without overloading your analysts
-
Safeguard Your Network with Endpoint Visibility and Control
By:
Type: Talk
Ensuring secure endpoint connectivity is a critical aspect of modern-day network management, and organisations are constantly seeking solutions that simplify the complex task of managing and controlling endpoint access. In this webinar, we will deep dive into the key components and benefits of Sangfor IAG, focusing on its ability to simplify overall management and enhance control over endpoint connectivity. Participants will gain valuable insights into leveraging Sangfor IAG to create a secure and efficient network management system, including: a. Endpoint security measures mitigate risks and strengthen the overall security. b. Granular policy control to promote users’ productivity and comply with any organization's compliance c. Central management to reduce the administrative burden and ensure security consistency across your network.
-
Beyond the Login: Modern Identity Security for the Workforce & How to Minimize Risk
By: CyberArk
Type: eBook
The evolving threat landscape has rendered foundational endpoint and access controls prone to breaches. To secure the workforce against growing identity-based threats, organizations need a modern identity security strategy. Read this e-book now to learn about a modern approach to securing workforce identities.
-
Ready For Whatever Comes Next
By:
Type: Video
Our customers rely on Tanium to gain control of their devices and data. With real-time visibility and comprehensive control of endpoints, we help them get ready for whatever comes next.
-
Streamlining Endpoint Management for Enhanced Efficiency with BigFix Workspace
By:
Type: Talk
Join us for this technical webinar to discover how BigFix Workspace can revolutionize your endpoint management processes fueled by AI, providing you with enhanced efficiency and control. Explore the benefits of BigFix Workspace and unlock the full potential of your endpoint management
-
EPM - More Than Just Least Privilege
By:
Type: Replay
Phishing, ransomware and other endpoint attacks can disrupt your business, damage your company's reputation and lead to steep regulatory fines and costly lawsuits. To stop attackers in their tracks, consistent least privilege enforcement is key. CyberArk Endpoint Privilege Manager gives you the tools and techniques to get there quickly and confidently - but it doesn't stop there! Explore the first critical stage of controlling privilege on the endpoint, as well as CyberArk capabilities that enable continued expansion of your endpoint security program.
-
Universal Endpoint Management
By:
Type: Video
In this presentation we explore Universal Endpoint Management (UEM) domain of the Cloud Controls Matrix, which includes fourteen control specifications focused on mitigating risks associated with endpoints, including mobile devices. The primary concerns in endpoint security relate to user behavior and awareness regarding acceptable use policies for devices, whether they are managed, unmanaged, enterprise-owned, or personal. Under the Shared Security Responsibility Model (SSRM), both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) have independent yet complementary roles in implementing UEM controls. CSPs are responsible for managing endpoint capabilities, including maintaining inventories, approving acceptable services and applications, and implementing security measures like automatic lock screens, firewalls, anti-malware, and data loss prevention technologies. CSCs, in turn, must securely manage their own devices, ensure compliance with CSP security policies, and protect their data.
-
Protection proactive des données contre ransomware et restauration orchestrée
By:
Type: Talk
Avec une attaque toutes les 11 secondes en 2021*, les ransomwares continuent d'être une menace pour toutes les entreprises, malgré le déploiement de solutions de sécurité. Il est temps de réagir! Vous devez renforcer la résilience de toutes vos données en équipant votre société d'une protection muticouche. Rejoignez les spécialistes d'Arcserve et de Sophos lors d'un webcast exclusif et découvrez les méthodes efficaces pour réduire les vulnérabilités de votre organisation aux attaques par ransomware : - Défense proactive contre les attaques par ransomware, restauration orchestrée et stockage immuable, une combinaison gagnante pour assurer la securité de vos données - Restauration des données en cas de cyberattaques - Grâce à Arcserve et à Sophos, vous avez l'esprit tranquille en cas d'attaque par ransomware : vous allez pouvoir récupérer vos données et refuser toute demande de rançon Les solutions Arcserve, sécurisées par Sophos, vous proposent des fonctionnalités intégrées de cybersécurité et de protection des données SaaS, sur site et dans le cloud, grâce à un stockage immuable. * Cybersecurity Ventures : https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021
-
An Interview with Sophos: Navigating Cloud Security
By:
Type: Replay
Curious about how a leader in cybersecurity moves to the cloud? Join us for an exclusive interview with Ganesh Krishnan, VP of Engineering, and Guy Davies, Principal Cloud Architect at Sophos. We’ll discuss how to approach your transition to the cloud, cybersecurity fundamentals and how they need to be re-orientated to deal with cloud threats, and what they’ve learned after all these years of working with security and DevOps teams around the world.
-
Introduction to the Tanium Platform Lightboard
By:
Type: Video
Watch this brief lightboard video to learn more about the Tanium Platform, which offers customers unparalleled visibility and control over their endpoints.
-
Gartner Hype Cycle for Endpoint and Workspace Security, 2024
By: Tanium
Type: Gartner Research Report
The rapidly evolving cybersecurity landscape demands innovative solutions – and innovation is abundant. Read The Hype Cycle™ for Endpoint and Workspace Security to distinguish between transient trends and real advancements in the endpoint and workspace security arena.
-
How Endpoint Privilege Management Fulfills Federal Mandates
By: Merlin International
Type: White Paper
Endpoint privilege management is crucial for federal agencies to fulfill security mandates and defend against sophisticated cyberattacks. This whitepaper explores how CyberArk Endpoint Privilege Manager can help agencies meet Zero Trust requirements, prevent privilege escalation, and reduce ransomware risks. Read the whitepaper to learn more.
-
Securing Remote Endpoints in a Hybrid Workforce
By:
Type: Video
Watch now as we review Illumio’s Security Risks 2021 endpoint security survey report on how businesses are protecting employee endpoints, on or off the corporate network. You’ll also be able to listen to us cover other key topics including… • What security visibility and control does IT have into endpoints on ungoverned home networks? • Considerations for preventing the spread of ransomware like Ryuk, and even Zero Day threats, into mass infections • Where Zero Trust security fits in a hybrid model as employees – and their endpoints – start returning to the campus network
-
Securing Remote Endpoints in a Hybrid Workforce - EMEA
By:
Type: Replay
Watch now as we review Illumio’s Security Risks 2021 endpoint security survey report on how businesses are protecting employee endpoints, on or off the corporate network. You’ll also be able to listen to us cover other key topics including… • What security visibility and control does IT have into endpoints on ungoverned home networks? • Considerations for preventing the spread of ransomware like Ryuk, and even Zero Day threats, into mass infections • Where Zero Trust security fits in a hybrid model as employees – and their endpoints – start returning to the campus network
-
Securing Remote Endpoints in a Hybrid Workforce - APAC
By:
Type: Replay
Watch now as we review Illumio’s Security Risks 2021 endpoint security survey report on how businesses are protecting employee endpoints, on or off the corporate network. You’ll also be able to listen to us cover other key topics including… • What security visibility and control does IT have into endpoints on ungoverned home networks? • Considerations for preventing the spread of ransomware like Ryuk, and even Zero Day threats, into mass infections • Where Zero Trust security fits in a hybrid model as employees – and their endpoints – start returning to the campus network
-
A MythBusting Special — 9 Myths about File-based Threats
By:
Type: Replay
Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files from unknown sources, executing the first step in a cyber attack. This continues to happen whether the file is an EXE or a Microsoft Excel document. Far too often, end users have an illusion of security, masked by good faith efforts of other users and (ineffective) security controls. This creates a virality effect for ransomware, malware, spyware, and annoying grayware and adware to be spread easily from user to user and machine to machine. To stop users from saying “I reject your reality and substitute my own!” – it’s time to bust some myths about file-based attacks. Testing in three! Two! One! Join Zscaler’s Vinay Polurouthu, Principal Product Manager, and Amy Heng, Product Marketing Manager, to: *Bust the 9 most common assumptions and myths about file-based threats *Uncover the latest evasion trends and detect stealthy delivery methods *Prevent patient zero infections and zero-day security events from unknown files
-
Securing the Open Door on Your Endpoints
By:
Type: Replay
We see figures around projected endpoint security spend climbing year-over-year as organizations aim to protect themselves against today’s evolving threat landscape. In a December ‘21 survey by ESG, 75% of respondents indicated that they planned to increase their spending in endpoint security over the next 12 months. Unfortunately, this increase in spend does not result in a decrease in successful endpoint attacks, so what’s missing? There is a fundamental gap in today’s endpoint security and foundational endpoint controls are being ignored. If you are not managing endpoint privileges, you are leaving the door open to attackers. In this panel we will discuss topics such as: - Latest attack trends and deconstructed attacks as researched by CyberArk Labs - Why endpoint least privilege is often ignored/deprioritized - How you can successfully achieve endpoint least privilege, effectively reduce risk and enhance security without sacrificing operational efficiency.