Presentations Archives - Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors https://solutionsreview.com/endpoint-security/category/presentations/ All the Latest News, Best Practices and Buyer's Guides for Endpoint Security and Protection Mon, 10 Oct 2022 12:52:57 +0000 en-US hourly 1 https://solutionsreview.com/endpoint-security/files/2023/07/SR_Icon.png Presentations Archives - Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors https://solutionsreview.com/endpoint-security/category/presentations/ 32 32 109273813 What to Expect at the 2022 ElasticON; San Francisco, D.C., and NYC https://solutionsreview.com/endpoint-security/what-to-expect-at-the-2022-elasticon-san-francisco-d-c-and-nyc/ Fri, 12 Aug 2022 20:08:33 +0000 https://solutionsreview.com/endpoint-security/?p=5021 ElasticON is a globetrotting tech expo where some of Elastic’s brightest minds will visit your area and show you how to flip on the power of search in your organization. Solutions Review talks about what to expect and how to sign up. Who is Elastic? Elastic is an American-Dutch company that was founded in 2012 […]

The post What to Expect at the 2022 ElasticON; San Francisco, D.C., and NYC appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
ElasticON

ElasticON is a globetrotting tech expo where some of Elastic’s brightest minds will visit your area and show you how to flip on the power of search in your organization. Solutions Review talks about what to expect and how to sign up.

Who is Elastic?

ElasticElastic is an American-Dutch company that was founded in 2012 in Amsterdam, the Netherlands, and was previously known as Elasticsearch. They are a search company that builds self-managed and SaaS offerings for search, logging, security, observability, and analytics use cases. The company develops the Elastic Stack platform, which consists of Elasticsearch, Kibana, Beats, and Logstash, free and paid proprietary features (formerly called X-Pack), Elastic Cloud (a family of SaaS offerings including the Elasticsearch Service), and Elastic Cloud Enterprise (ECE).

What is ElasticON?

ElasticON is the brainchild of cloud and search experts Elastic to showcase their core technologies– including the ELK stack and their solutions for observability, security, and search– and where they plan to take them. Expect panels from industry experts, live tech demos, and more. ElasticON 2022 will take place in San Francisco, Washington, D.C., Singapore, New York City, Amsterdam, and Tokyo.

Why Attend?

When you attend ElasticON, you’ll be joined by fellow developers, architects, Ops, DevOps, managers, leaders, and security experts. You’ll get detailed roadmaps from the creators themselves and learn about new and future features that matter most to you. You’ll hear from real-world users and see how users like you put Elastic solutions to work, driving business value, scaling for growth, and accelerating results that matter. You’ll connect and collaborate with the community while engaging with Ask Me Anything experts for tips on setting up, scaling, and upgrading your projects. And if you can’t join in person, no worries. Choose the virtual viewing option during registration for a city convenient to your time zone. Then, sit back, relax and watch the keynote presentation online.

FAQ

What: ElasticON US Expo

When: October 4 from 9:30am to 4:00pm PST (San Francisco), October 13 from 9:30am to 4:00pm EST (D.C.), November 2 from 9:30am to 4:00pm EST (NYC)

Where: Virtual and in-person at the Westin St. Francis (see San Francisco registration page for more details)

Virtual and in-person at the Marriott Marquis Washington, D.C. (see Washington, D.C. registration page for more details)

Virtual and in-person at The Westin New York at Times Square (see New York City registration page for more details)

Visit the ElasticON Main Page for All Dates and Register for a Location Near You.

The post What to Expect at the 2022 ElasticON; San Francisco, D.C., and NYC appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
5021
CISO Roundtable: Stopping Breaches at the Endpoint https://solutionsreview.com/endpoint-security/ciso-roundtable-stopping-breaches-at-the-endpoint/ https://solutionsreview.com/endpoint-security/ciso-roundtable-stopping-breaches-at-the-endpoint/#respond Wed, 27 Sep 2017 16:15:16 +0000 https://solutionsreview.com/endpoint-security/?p=363 Endpoint protection solutions are an essential part of the enterprise security toolkit, but they’re quickly becoming some of the most complex products on the market. Information Security professionals, CIOs, and CISOs trying to push their organization into the modern era of security need to conduct extensive research to correctly plan, assess, and deploy the right […]

The post CISO Roundtable: Stopping Breaches at the Endpoint appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>

Endpoint protection solutions are an essential part of the enterprise security toolkit, but they’re quickly becoming some of the most complex products on the market.

Information Security professionals, CIOs, and CISOs trying to push their organization into the modern era of security need to conduct extensive research to correctly plan, assess, and deploy the right solution for their organization.

In this conversation with two prominent CISOs – Paul Calatayud from Surescripts and Arindam Bose from Bank of Hope— you’ll hear how they keep their organization safe from attacks by stopping them at the endpoint. The discussion is moderated by Norm Laudermilch, Invincea Chief Operating Officer.

 

The post CISO Roundtable: Stopping Breaches at the Endpoint appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/ciso-roundtable-stopping-breaches-at-the-endpoint/feed/ 0 363
Are You Smarter Than a Cyber Criminal? A Free On-Demand Webinar https://solutionsreview.com/endpoint-security/are-you-smarter-than-a-cyber-criminal-a-free-on-demand-webinar/ https://solutionsreview.com/endpoint-security/are-you-smarter-than-a-cyber-criminal-a-free-on-demand-webinar/#respond Wed, 28 Jun 2017 17:55:11 +0000 https://solutionsreview.com/endpoint-security/?p=428 Are you smarter than a cyber criminal? Short answer: Maybe, but not for long. Malware and other threats move fast. That’s why it’s crucial to stay up-to-date on the latest news. With that in mind, Webroot has created this webinar, which includes their observations on the cybersecurity landscape and malware trends throughout the last year, […]

The post Are You Smarter Than a Cyber Criminal? A Free On-Demand Webinar appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
webinar-are-you-smarter-than-a-criminal

Are you smarter than a cyber criminal? Short answer: Maybe, but not for long. Malware and other threats move fast. That’s why it’s crucial to stay up-to-date on the latest news.

With that in mind, Webroot has created this webinar, which includes their observations on the cybersecurity landscape and malware trends throughout the last year, as well as insights on how to keep ahead. This 60-minute, complimentary webinar will show you what the numbers mean for  you, and how you can use them to secure your business and customers.

 

The post Are You Smarter Than a Cyber Criminal? A Free On-Demand Webinar appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/are-you-smarter-than-a-cyber-criminal-a-free-on-demand-webinar/feed/ 0 428
Examining The Evolution of Malware and Next Gen Endpoint Protection https://solutionsreview.com/endpoint-security/evolution-of-malware-presentation/ https://solutionsreview.com/endpoint-security/evolution-of-malware-presentation/#respond Fri, 09 Jun 2017 13:00:06 +0000 https://solutionsreview.com/endpoint-security/?p=265 The Information Age may just as well be known as the age of the data breach. Malware co-developed almost simultaneously with the advent of the Information Age. Creeper, the first known computer virus, was developed in 1971, just three years after the creation of the ARPAnet. Creeper would not look unfamiliar to a modern information […]

The post Examining The Evolution of Malware and Next Gen Endpoint Protection appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>

 

 

The Information Age may just as well be known as the age of the data breach. Malware co-developed almost simultaneously with the advent of the Information Age.

Creeper, the first known computer virus, was developed in 1971, just three years after the creation of the ARPAnet. Creeper would not look unfamiliar to a modern information security professional. It spread unchecked through the primitive internet, displaying the text “I’m the Creeper. Catch me if you can!” on affected mainframes.

Endpoint_Buyers_Guide_No_DLDon’t Get Hacked. 

Compare Top Endpoint Security Providers with the 2016 Endpoint Security Buyer’s Guide.

  • 24 Vendor Profiles and Capabilities References
  • 10 Top Questions for Buyer’s
  • Complete Market Overview
Download

Shortly thereafter, a different program—Reaper—was developed. Its only purpose was to delete Creeper. It was the first antivirus software. From that playful beginning, malware detection and interception developed into its present-day arms race.

Today, endpoint protection has moved far beyond basic malware scanning—it’s  now a commodity of information security. Now, as Malware evolves into targeted Advance Persistent Threats, any response has to be layered, proactive, and highly visible.

In this 47-slide presentation, InfoSec pros from Panda Security walk us through the history of malware, how it’s changed, and what we can do to fight back.

The post Examining The Evolution of Malware and Next Gen Endpoint Protection appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/evolution-of-malware-presentation/feed/ 0 265
Presentation: Examining the State of Your Endpoint Security https://solutionsreview.com/endpoint-security/presentation-examining-the-state-of-your-endpoint-security/ https://solutionsreview.com/endpoint-security/presentation-examining-the-state-of-your-endpoint-security/#respond Thu, 18 May 2017 14:35:48 +0000 https://solutionsreview.com/endpoint-security/?p=166   According to the 2016 State of Endpoint Security Survey from by the SANS Institute, 44% of respondents report that one or more of their endpoints have been breached in the past 24 months, with desktops, laptops and servers making up the most  often compromised endpoints. Login and access credentials are the most commonly exfiltrated information. 55% of […]

The post Presentation: Examining the State of Your Endpoint Security appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>

 

 

According to the 2016 State of Endpoint Security Survey from by the SANS Institute, 44% of respondents report that one or more of their endpoints have been breached in the past 24 months, with desktops, laptops and servers making up the most  often compromised endpoints. Login and access credentials are the most commonly exfiltrated information.

55% of survey respondents spend 3 or more hours per compromised endpoint, and over 70% of say that they find it difficult or impossible to determine when an incident has been fully remediated.

These statistics encompass a wide set of industries, from financial services to education, all with one thing in common—vulnerability. So while each network is uniquely built to support your particular business, none is immune from being breached.

To protect your data most effectively, you need a way to find the threats that are most relevant to your organization and prioritize them so you can remediate the most critical and lethal ones first.

In this 21-slide presentation, George Mina, IBM Program Director, and Mark Hafner, IBM Systems Engineer, examine the state of endpoint security and demonstrate how the integration of advanced tools can offer accelerated risk prioritization and incident response to keep your corporate and customer data secure.

interested readers can view IBM’s  full webinar on-demand here.

For a detailed market overview of Endpoint Protection solutions, check out our free 2016 Endpoint Security Solutions Buyer’s Guide here.

Endpoint_Buyers_Guide_No_DLDon’t Get Hacked. 

Compare Top Endpoint Security Providers with the 2016 Endpoint Security Buyer’s Guide.

  • 24 Vendor Profiles and Capabilities References
  • 10 Top Questions for Buyer’s
  • Complete Market Overview
Download

The post Presentation: Examining the State of Your Endpoint Security appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/presentation-examining-the-state-of-your-endpoint-security/feed/ 0 166
Using API Management to Secure Microservices https://solutionsreview.com/endpoint-security/280-2/ https://solutionsreview.com/endpoint-security/280-2/#respond Thu, 13 Apr 2017 16:31:31 +0000 https://solutionsreview.com/endpoint-security/?p=280 Want to know how to use API management for the security enforcement of microservices? This 41-slide talk by Charles Moulliard explains how microservices (Restfull Endpoint) could be secured using a policy-based approach to intercept the HTTP request. A less intrusive pattern is proposed at the level of the Web Container using Contrants mapping the Web […]

The post Using API Management to Secure Microservices appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>

 

 

Want to know how to use API management for the security enforcement of microservices? This 41-slide talk by Charles Moulliard explains how microservices (Restfull Endpoint) could be secured using a policy-based approach to intercept the HTTP request. A less intrusive pattern is proposed at the level of the Web Container using Contrants mapping the Web Resources with JAAS API & Roles. Finally, Moulliard will investigate how such Security design can be developed using an external API Management platform which enforce the Security and Governance aspect.

Endpoint_Buyers_Guide_No_DLDon’t Get Hacked. 

Compare Top Endpoint Security Providers with the 2016 Endpoint Security Buyer’s Guide.

  • 24 Vendor Profiles and Capabilities References
  • 10 Top Questions for Buyer’s
  • Complete Market Overview
Download

The post Using API Management to Secure Microservices appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/280-2/feed/ 0 280
The Scoop on Outsourcing Your Endpoint Detection and Response https://solutionsreview.com/endpoint-security/the-scoop-on-outsourcing-your-endpoint-detection-and-response/ https://solutionsreview.com/endpoint-security/the-scoop-on-outsourcing-your-endpoint-detection-and-response/#respond Tue, 14 Mar 2017 16:52:45 +0000 https://solutionsreview.com/endpoint-security/?p=388 Many organizations are looking to level up their security with Endpoint Detection and Response, but recognize a resource gap exists. They can either hire dedicated headcount and build up their internal abilities. Or they can outsource their detection and response. There are tradeoffs with each approach. In this 40-minute presentation, Red Canary’s CTO and Co-Founder […]

The post The Scoop on Outsourcing Your Endpoint Detection and Response appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>

Many organizations are looking to level up their security with Endpoint Detection and Response, but recognize a resource gap exists. They can either hire dedicated headcount and build up their internal abilities. Or they can outsource their detection and response. There are tradeoffs with each approach.

In this 40-minute presentation, Red Canary’s CTO and Co-Founder Chris Rothe and Carbon Black’s Security Strategist Rick McElroy and you’ll learn:

– The key differences between two of the most common endpoint outsourcing options: Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR)
– Important criteria to consider before increasing headcount or outsourcing your security

The post The Scoop on Outsourcing Your Endpoint Detection and Response appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/the-scoop-on-outsourcing-your-endpoint-detection-and-response/feed/ 0 388
RSAC ’17: Critical Hygiene for Preventing Major Breaches https://solutionsreview.com/endpoint-security/rsac-17-critical-hygiene-for-preventing-major-breaches/ https://solutionsreview.com/endpoint-security/rsac-17-critical-hygiene-for-preventing-major-breaches/#respond Mon, 06 Mar 2017 18:06:54 +0000 https://solutionsreview.com/endpoint-security/?p=536 Microsoft’s Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. In this 45-minute presentation from RSAC ’17, Jonathan Trull, CISO of Microsoft and Tony Sager of the Center for Internet Security (CIS) will share step by step recommendations to defend against these […]

The post RSAC ’17: Critical Hygiene for Preventing Major Breaches appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
Microsoft’s Incident Response teams investigate major breaches week after week and almost always see the exact same pattern of attacks and customer vulnerabilities. In this 45-minute presentation from RSAC ’17, Jonathan Trull, CISO of Microsoft and Tony Sager of the Center for Internet Security (CIS) will share step by step recommendations to defend against these attacks, including information on cybersecurity solutions that Microsoft has open-sourced to protect their customers.

The post RSAC ’17: Critical Hygiene for Preventing Major Breaches appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/rsac-17-critical-hygiene-for-preventing-major-breaches/feed/ 0 536
The Finance Sector and Countering Cyberthreats, A Presentation from RSAC ’17 https://solutionsreview.com/endpoint-security/the-finance-sector-and-countering-cyberthreats-a-presentation-from-rsac-17/ https://solutionsreview.com/endpoint-security/the-finance-sector-and-countering-cyberthreats-a-presentation-from-rsac-17/#respond Thu, 23 Feb 2017 16:37:29 +0000 https://solutionsreview.com/endpoint-security/?p=527 How do CISOs defend the integrity of financial networks? What technological and strategic tools are available to cyber-defenders? How should critical infrastructure defenses be prepared for a cyber-crisis? This panel of veteran security leaders will share lessons learned from countering the most advanced cyberthreats targeting financial services to inform cybersecurity strategies across sectors. Moderator: Frank Cilluffo, Director, […]

The post The Finance Sector and Countering Cyberthreats, A Presentation from RSAC ’17 appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
How do CISOs defend the integrity of financial networks? What technological and strategic tools are available to cyber-defenders? How should critical infrastructure defenses be prepared for a cyber-crisis? This panel of veteran security leaders will share lessons learned from countering the most advanced cyberthreats targeting financial services to inform cybersecurity strategies across sectors.

Moderator: Frank Cilluffo, Director, Center for Cyber and Homeland Security, George Washington University
Panelist: Valerie Abend, Managing Director & Lead for North America Financial Services Security, Accenture
Panelist: Cheri McGuire, Group Chief Information Security Officer, Standard Chartered PLC
Panelist: Troels Oerting, Group Chief Security Officer (CSO) and Group Chief Information Security Officer (CISO), Barclays
Panelist: Rob Wainwright, Director, Europol

The post The Finance Sector and Countering Cyberthreats, A Presentation from RSAC ’17 appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/the-finance-sector-and-countering-cyberthreats-a-presentation-from-rsac-17/feed/ 0 527
VIDEO: Palo Alto Networks’ Traps VS. Microsoft EMET https://solutionsreview.com/endpoint-security/video-traps-vs-emet/ https://solutionsreview.com/endpoint-security/video-traps-vs-emet/#respond Fri, 27 Jan 2017 16:09:34 +0000 https://solutionsreview.com/endpoint-security/?p=183 Endpoint security is an essential element of any organization’s strategy for detecting and preventing damaging attacks. There has been a lot of discussion in the infosec world about how to use endpoint security tools to provide the best possible protection. In this video, Sebastian Goodwin, Director of product marketing at Palo Alto Networks expalins the […]

The post VIDEO: Palo Alto Networks’ Traps VS. Microsoft EMET appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>

Endpoint security is an essential element of any organization’s strategy for detecting and preventing damaging attacks. There has been a lot of discussion in the infosec world about how to use endpoint security tools to provide the best possible protection.

In this video, Sebastian Goodwin, Director of product marketing at Palo Alto Networks expalins the difference between Palo Alto’s Traps endpoint security product and Microsoft’s EMETs.

Insight Jam Ad

The post VIDEO: Palo Alto Networks’ Traps VS. Microsoft EMET appeared first on Best Endpoint Protection Security (EPP) Tools, Software, Solutions & Vendors.

]]>
https://solutionsreview.com/endpoint-security/video-traps-vs-emet/feed/ 0 183