Every day there is a story in the news, about another business that has fallen prey to cybercriminals. Are you confident your business is protected against these attacks? Join this webinar to learn how you can best protect your business, and avoid becoming next weeks news.
In this informative webinar, you will learn:
The components you need in a holistic, multi-layered endpoint protection solution;
How you can leverage interactive security management interfaces to improve your security posture;
The importance of people and processes in delivering solid security.
Changes in the ways that we create, store, and consume information in the digital, connected age have dramatically increased the need to protect our information assets. Traditionally, an "endpoint" referred to a desktop computer; today that definition has expanded to include laptops, tablets, mobile smartphones, and even removable storage devices such as USB flash drives.
In addition to the proliferation of devices to protect, new and more dangerous malware is surfacing at an alarming rate. From targeted spear-phishing to aggressive zero-day exploits, attackers are working hard to circumvent traditional security measures - and in many high profile cases, succeeding. While not all organizations are alike in their security requirements, there are some key considerations Info-Tech Research Group encourages everyone to consider when evaluating their endpoint security strategy:
There are many platforms and devices that might present avenues for the leakage of sensitive data;
Computing devices are not the only ones that need to be protected;
An increasing need for multiple layers of interconnected protection.
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Wesley McPherson is a Research Manager for the Security and Risk practice at Info-Tech Research Group. Wesley's principal areas of research have been on data protection and privacy, network security, cloud security, and cyber espionage. At Info-Tech, Wesley provides security leaders and practitioners with unique and actionable guidance on how to identify their threats, analyze their vulnerabilities, and reduce their risk exposure through systematic improvements to their information security posture. During his time at Info-Tech, Wesley has conducted primary and secondary research, developed solution based consulting style deliverables, built interactive data analysis tools and developed quantification methods for risk exposure and information security benefits. Wesley has experience in developing security strategies, securing cloud environments, and tailoring security technology evaluation and selection processes. Wesley holds an Honours Specialization in Business Administration from the Richard Ivey School of Business where he focused his studies on predictive analytic strategy and management science.
Director, Product Marketing, Trend Micro
Wendy Moore-Bayley is Director, Product Marketing for Trend Micro's Smart Protection Suites. She has been with Trend Micro for over a year and has 20 years experience developing go to market strategies for B2B security and unified communications solutions. Prior to joining Trend Micro, Wendy has held market and product strategy positions at Mitel, Certicom and Alcatel. She holds a Bachelor of Science and MBA from McMaster University.