Votre solution de sécurité des terminaux est-elle à même de suivre le rythme ? Si vous ne pouvez pas visualiser aisément l’état de santé des terminaux de vos différents tenants, comment être sûr que l’un d’eux n’a pas été compromis ? Et si tel est le cas, comment être certain de pouvoir réagir suffisamment vite ?

Rejoignez Laurent Meimoun, expert en cybersécurité. Il abordera la lutte des administrateurs en matière de visibilité et de gestion de leur stratégie de sécurité des terminaux, notamment en raison de la vague massive de télétravail.

Companies have had to pivot to remote work policies as quickly as possible, with network security often taking a backseat to business continuity. Now, remote working increasingly looks to be a permanent corporate fixture, with Global Workplace Analytics predicting that up to 30% of the workforce will be partially working from home by the end of 2021. Half-baked security protocols can no longer cut it in this new remote reality.

Securing your IT networks is not just a good business practice; it’s critical for any company looking to stay competitive. Proofpoint reports that 88% of global organizations experienced spear phishing attempts in 2019 — and cyber attackers are continually adapting to the new environment. A comprehensive security strategy is more necessary than ever.

Join this panel of experts as they discuss the most critical vulnerabilities of a newly remote system and how to safeguard against cyber threats:

• VPNs and how to choose the right one
• Threat Hijacking Attacks: what are they and how to protect against them
• Understanding Your Endpoints and building scalable endpoint management
• Making Cloud Security work for your organization

Simon Ratcliffe, Technology Evangelist, Ensono
Stan Davidson, Principal Solutions Engineer, EMEA
Steve Cobb, CISO, OnceSource
Michael Jimenez, Senior Product Marketing Manager, Kemp Technologies

Securing the endpoint is riddled with new challenges as most workforces have moved off premises and face a slew of new threats. Join this panel discussion to hear leading experts and thought leaders share their insights and tips for how companies can protect themselves using both known and newer methods and technology.

We’ll discuss:
– Redefining the endpoint in 2022
– ZTNA and other emerging security frameworks
– The challenge of BYOD devices, IoT devices in the modern workforce
– Evolving strategies to protect the endpoint

Panelists include:
Ateef Mulla, Regional Senior Solution Engineer & Cybersecurity Expert – SonicWall

Join us for an informative webcast between SonicWall and SentinelOne, two pioneers in the network and endpoint security space. They will give a live demonstration of two different attack vectors in action to demonstrate the abilities of modern endpoint security solutions.

In this webcast you’ll learn:

• How to stop threats that travel through the network without a file
• How to cut out a common attack method that takes advantage of the good Samaritan in your office
• Best practices for network security hygene to sanitize traffic before it gets to the endpoint

Join SonicWall and SentinelOne security experts for this live webinar. We will cover the modern threat landscape based on SonicWall’s 2019 Threat Report and discuss the impact that cryptojacking makes on your organization.

In this webcast you’ll learn:
•The impact that Cryptojacking makes and how it fits into the current threat landscape
•How to tell if you have an infection
•How to stop it from the perimeter to the endpoint
•How modern endpoints mitigate and remediate attacks

Join SonicWall and Osterman Research, for a discussion about Endpoint Detection and Response (EDR). We will share the Osterman Research’s findings into what are the top three Endpoint Detection and Reponse (EDR) priorities, as well as top concerns with deploying advanced endpoint anti-malware solutions.

You will also learn about:
•Average company threat statisics
•Various EDR capabilities
•How modern anti-malware solutions mitigate and remediate attacks
•How to deploy advanced anti-malware solutions behind and away from perimeter defenses

Threat actors leverage malware to create backdoors into systems for a few key reasons. These forms of malware, even when they fail, can create serious vulnerabilities in systems.

This webcast will cover the threat landscape and discuss new types of attacks. Come for the news but stay for a live hacking demonstration that will install a backdoor on an unprotected endpoint and later, an attempt on a protected one.

In this webcast you’ll learn:

•The current threat landscape
•What backdoors are
•How to stop backdoors like Calisto
•How to roll back the damage of an attack like ransomware

Can you stop a ransomware infection before it starts? If a drive is encrypted, can you easily roll it back to the last known clean slate? Does it use less than 1% of system resources to run?

Join the exclusive webcast to explore:

• The current threat landscape with threat data
• The difference between traditional AV and next-generation AV (NGAV)
• How to roll back the damage of an attack like Ransomware