Have you ever experienced or known someone who has lost a laptop or a USB drive that contained valuable company IP or customer data? Are you subject to compliance programs, either directly or through partnerships?
Join this webinar on Data Protection and learn about:
How easy it is to keep your data safe from attacks and theft
Encryption performance and why your end-users won’t even notice it’s working
How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
How DLP Endpoint can help you protect IP and ensure regulatory compliance
Use cases on leveraging the synergy between Intel vPro and McAfee Data Protection technologies
Don't miss out on the opportunity to hear from data protection experts on how to protect your data while keeping IT costs in check and your end-users happy!
Recording from Wednesday, November
27th 2013, 2pm GMT (3pm CET)
The McAfee Network Security Platform Combined With Intelligence at the Endpoint, Goes Beyond Layer 7
McAfee is continuing to pioneer a connected approach to security. Combining information at the endpoint with the information in the network gives administrators visibility beyond layer seven. The Network Security Platform along with the McAfee Endpoint Intelligent Agent allows administrators to quickly identify application behavior, identify applications as malicious or safe and take action with a few simple steps..
In our look at visibility beyond layer 7 we’ll explore:
How malware continues to penetrate networks?
What does it mean to go beyond layer 7?
What is the Endpoint Intelligent Agent and how does it work?
How does having an Endpoint Intelligent Agent on the Network Security Platform give you visibility into undetected malware?
Donnerstag, den 19. November 2013 15.00 bis 15.45 Uhr
to Keep Your Organizations Safe from Phishing
know to use email as a direct line to their target. And using links
within emails is one of the easiest ways to lure your users into falling
victim. While the links to websites in the emails your users receive
do not change, the content hosted on those links often does change,
leaving an incredible opportunity for data loss that organizations are
not prepared for.
Join this webinar on email phishing and:
See how hackers think as they plan a phishing attack
Hear about the various intercept points you can use to thwart these attempts
about the trends in using mobile devices to conduct work email, and the
easy steps you can take to provide adequate protect from
Recording from Wednesday, November
13th 2013, 2pm GMT (3pm CET)
to Balance User Empowerment & Security Using Least Privilege
With targeted cyber-attacks rapidly growing in number and sophistication, your organization is faced with a seemingly impossible trade-off: should you optimize security at the expense of user productivity?
In today's enterprise, providing users and IT admins with the privileges they require to perform their roles without seriously impacting the security posture of your endpoints is incredibly challenging.
Join Mark Austin, CEO of Avecto (McAfee’s ‘Most Innovative Partner 2013’) on this live webinar as he shares expertise on how an effective privilege management strategy can prevent users and IT admins from accidentally or deliberately abusing their rights, avoiding high-profile security breaches whilst stopping malware in its tracks.
PwC CISO Lee Barnett complements Mark’s discussion, explaining how least privilege technology has enabled his organization to revolutionise the user experience for mobile, ‘digital native’ workers, without compromising the security of their systems.
3 Business Reasons to Attend:
Discover how to combat insider attacks with a least privilege approach on desktops and servers
Learn how to mitigate over 85% of targeted attacks with effective privilege management
Understand how least privilege can be fully managed through your existing McAfee ePO infrastructure
Recording from Thursday, November 7th 2013, 2pm GMT (3pm CET)
Advanced Malware Detection and Intrusion Prevention Systems
Intrusion Prevention Systems have historically checked for known bad files and blocked any that were on a list. But what happens when the malicious files are a new threat? How do you block against unknown threats or Zero-day attacks?
In our look at Zero-day attacks and traditional IPS devices we’ll explore:
What is Zero-day malware, why is it bad, and what are they after?
IPS detection rates and throughput numbers
Why traditional signature-based detection isn’t enough
Why a layered or defense in depth approach is important
How the McAfee Networks Security Platform uses a defense in depth architecture to protect its customers from Zero-day attacks
Are you looking for the next generation of endpoint protection that addresses all threats to desktops, mobile, servers and datacenters? Join this webinar to learn more about how McAfee delivers leading endpoint protection solutions for all of the devices in your network. In this webinar, we will discuss the following:
How McAfee Complete Endpoint Protection suites add defense in depth against the full threat spectrum from zero-day exploits to web attacks, protecting Windows, Mac and Linux systems, as well as mobile devices such as iPhone, iPad, and Android smartphones and tablets.
How McAfee Data Center Server Security Suites lets you Discover all workloads, Protect virtual and physical servers, and securely Expand into the cloud.
And, how you can act today to strengthen your server protection with a special offer.
Recording from Wednesday, October 30th 2013, 2pm GMT (3pm CET)
Real-Time Data Protection with McAfee DLP and McAfee ESM
Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.
Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
Leverage McAfee ePO to automate DLP policies based on situational awareness
See how McAfee DLP and ESM work together to provide real-time data protection
Recording from Wednesday, October 23rd 2013, 2pm BST (3pm CET)
Hardware Enhanced Security Management with ePO DeepCommand
Are you challenged by regular system maintenance activities like Patching and virus scanning impacting your user productivity?
Do you have challenges supporting remote users in a cost-effective manner on issues like system failures and password resets?
Do you feel remote access to encrypted systems are near impossible because of pre-boot authentication?
Are PC energy costs straining your IT budgets and you are not able to embrace green IT initiatives?
Join this webinar and unleash a new vantage point in your computing assets - with McAfee ePO Deep Command:
To learn how you can save on energy costs by allowing PC’s to be powered down, while still having the flexibility to wake and update PCs to conduct security tasks and patches.
To understand how you can improve efficiency of security operations by providing the ability to wake up PC’s with McAfee encryption software and securely authenticate pre-boot “without” user intervention.
To know how you can increase user productivity with faster pre-boot password resets and remote repair of encrypted PC’s.
To see how one can extend the reach of their IT teams with the ability to remote remediate “disabled” endpoints with full access to the PC’s keyboard, video and mouse.
To discover how you can leverage existing security investments in Intel vPro with deployment and management from McAfee ePO.
Recording from Wednesday, October 16th 2013, 2pm BST (3pm CET)
How to Super Charge Next Generation Security: McAfee Next Generation Firewall
The presentation will discuss where the market is going, why we chose Stonesoft, what are the differences of between current FW to NGFW, features of the new NGFW, uses case with the NGFW and a competitive stance.
Recording from Wednesday, October 9th 2013, 2pm BST (3pm CET)
McAfee Enterprise Security Manager (ESM)
To ensure situational awareness of their enterprise threat and compliance posture, our customers need a single management environment that enables their security and compliance teams to collect, store, analyze, and act upon risks and threats from a single location. McAfee Enterprise Security Manager delivers security intelligence through a single platform for monitoring and reporting while allowing active response via integration with McAfee ePO and McAfee NSM.
Watch this webinar on Endpoint Security as you:
Reduces time to respond - accelerate investigations and decision-making through rapid pivot and single click access to otherwise complicated information in a single console.
Significantly reduces operational cost and time investment for administrative staff to manage and respond.
Content awareness provides the deep analytics necessary to detect advanced threats and insider theft.
Continuous compliance reporting aligned with the Unified Compliance Framework, to enable out of the box reporting on more than 240 global regulations and control frameworks.
Using Application Control to secure the corporate desktop
With the increase in volume and sophistication of malware, how can I protectively protect endpoints? Is
blacklisting sufficient to protect my environment? Think about how your approach to malware has changed over the last 15 years.
Watch this webinar on Endpoint Security as you:
Learn how new protection techniques can deliver vastly superior protection
See how signatures can be supplemented by whitelisting to fight malware
Hear about how zero-day attacks, advanced persistent threats and rootkits can be stopped without signatures
Understand how whitelisting can be used is a desktop environment
Determine if whitelisting can be effective in your environment
The endpoint has been
redefined; the motivation behind attacks has changed; the threat landscape has
evolved. Traditional signature-based anti-virus protection is 20 year old
technology. It should be the last line of defence, yet within many
organizations it is the only line of defence against malware. Learn how to
evolve your approach using Application Control to secure the corporate desktop.
Recording from Wednesday, September 18th 2013, 2pm BST (3pm CET)
How to Secure Access to the Cloud
Outsourcing applications to the Cloud has become strategic for many organizations seeking to improve business agility and reduce internal IT expenses. However, as companies adopt cloud applications they also understand that they need to mitigate the risks of unauthorized access and data leakage to the cloud. If they don’t address these risks, they may find themselves the victim of a breach, with the resulting public embarrassment and litigation costs.
In this webcast, McAfee will discuss the security challenges faced by organizations moving to the cloud and describe how a unique combination of products with features like signature-less malware detection, data loss prevention, encryption, application controls, and multi-factor authentication enables organizations to provide both internal and external users with secure access to cloud applications.
Email Phishing – the Front Door for Cybercriminals
Would your business be hurt if you experienced a data breach? The impact on your reputation and bottom line can be a major setback if cybercriminals gain access to customer information or intellectual property. The use of email phishing as an entry point for data breaches is on the rise - according to the 2013 Verizon Data Breach Investigation Report, social tactics are used in 29% of all breaches, with email (79%), specifically phishing (77%) used as the primary vector for conducting the attack. Most workers communicate via email, and do so on whatever device they have with them at the time. This means protecting users against email-borne attacks is just as important on a mobile device as their office workstation, which creates a difficult situation for traditional models of IT. What are you doing to protect against employees clicking on phishing emails?
Join this webinar on Email Phishing to learn:
What cybercriminals are focusing on to trick users into clicking their malicious links
The most advanced tactics for preventing phishing attacks on your business
How mobile devices introduce a unique email security challenge for IT, and how to solve it
What can be done to verify the identity of those you communicate with, and know when they’re not who you think they are
What it takes to have defence in depth against phishing and malware, on laptops and mobile
Social attacks, including phishing, have quadrupled in the last year and are the point of entry for some of the most high-impact data breaches ever recorded. McAfee has developed advanced email security technology that gives you the defences needed to arm yourself against these evolving and increasingly popular tactics. Join us for a session dedicated to email phishing, as we share our best approaches to stopping it and saving businesses around the world from costly and far too frequent breaches of their valuable data.
Recording from Wednesday, July 31st 2013, 2pm BST (3pm CET)
Real Time for ePolicy Orchestrator – “OK, so how does it work?”
In today’s information-driven enterprises, time is not on the side of the IT security manager. When complete, expedient knowledge of the IT landscape can mean the difference between risk mitigation and catastrophe, seconds count.
Join this webinar on Real Time for ePO as you:
Understand the most relevant use cases
See how it works under the hood with a live demonstration
You will also get a sneak preview into where McAfee is going with this technology, and why your customers are so excited to get Real Time for ePO.
Recording from Wednesday, July 24th 2013, 2pm BST (3pm CET)
Cloud Access Security: Klassische Web-Sicherheit im Umbruch
Referent: Michael Schneider
Erfahren Sie im Rahmen dieses Webcasts wie Sie einen sicheren Zugriff
Cloud-Anwendungen bei gleichzeitigem Schutz Ihrer Daten und Identitäten Ihrer
Benutzer gegen Verlust
oder Missbrauch erreichen können und wie die bidirektionale Internetsicherheit
Improved Data Protection with McAfee DLP and TITUS End-user Classification
Learn how DLP and end-user classification work together to help prevent both accidental and malicious data loss. McAfee extends TITUS protection against malicious data loss by protecting additional vectors, like removable media and web posting. The combined DLP and End-user Classification policies work together to simplify data protection enforcement with the McAfee ePO centralized console. Identify risks early before data breaches have occurred.
Join this webinar on DLP with Endpoint classification and learn how to:
Identify, classify and secure your data
Prevent accidental and malicious data leaks
Raise user security awareness on proper data handling
Don't miss out this great opportunity to learn how to empower your employees to help you improve data protection and reduce the internal operational costs of DLP.
Recording from Wednesday, July 10th 2013, 2pm BST (3pm CET)
Warum traditionelle Sicherheitsmaßnahmen für neue, dynamische und hoch interaktive
IT-Umgebungen nicht mehr ausreichen
Referent: Marcus Viertel
Erfahren Sie im Rahmen dieses Webcasts mehr über den neuen Ansatz zur Identifizierung von
bösartigen Dateien mittels zentralisierter, dynamischer (Sandboxing) und automatisierter statischer
Analyse-Technologie, verknüpft mit Gegenmaßnahmen in Echtzeit
Seminario Online McAfee Web Identity: resolver el reto de Single-Sign On en la nube
La protección web y las soluciones de administración de identidades de McAfee simplifican y protegen el acceso a las aplicaciones de la nube y protegen a las organizaciones frente al malware avanzado y otras amenazas online ocultas. McAfee proporciona la solución de seguridad web más completa del sector.
How many of your users have accounts with cloud-based/SaaS applications? Do you know if there are any active accounts in your cloud application portfolio that shouldn’t be there – either because the user has left or because it was created without your knowledge? How can you give your users access to cloud applications without compromising security? What are the advantages and disadvantages of the various ways to deploy identity for cloud apps?
Join this webinar on Cloud Single Sign On to:
Learn about the various ways you can regain control over your users' identities in the cloud.
Reduce the administrative effort required to create and manage those accounts.
Eliminate the security weaknesses associated with passwords.
Learn about the two major architectural approaches to managing cloud identities and the advantages and disadvantages of each.
Hear about the various ways you can configure an identity and access management solution that allows you maximum flexibility, without giving up control.
Identity is an essential element in any enterprise’s cloud security strategy. McAfee’s identity and access management solutions enable your IT or security administrators to extend and apply enterprise security policies to user access rights to SaaS apps, without adding an undue burden on end-users. If you, or your organization, are serious about outsourcing applications to the cloud, you need to seriously consider how you are going to leverage identity to protect those applications against unauthorized access.
Date & heure : Vendredi 21 Juin 2013, de 11h00 à 12h00
Verbessertes Risiko- & Sicherheits-Management: Verringern Sie die Sicherheitsrisiken für Ihr Unternehmen
Referent: Marcus Viertel
Erfahren Sie im Rahmen dieses Webcasts mehr über die Bedeutung eines proaktiven Sicherheits-
und Risiko-Management-Ansatzes, das Sicherheitsausbringung in Kombination mit automatisierter
Bewertung, strategischen Reaktionen auf Vorfälle oder potenzielle Risiken sowie proaktive Überwachung
Seminario Online McAfee MOVE: seguridad optimizada para entornos virtualizados
Asegura una eficaz gestión y distribución de las soluciones de seguridad para entornos virtuales.
Las soluciones antivirus tradicionales no funcionan bien con una infraestructura virtualizada. McAfee® MOVE AntiVirus ofrece protección antimalware optimizada y avanzada para sus ordenadores de sobremesa y sus servidores virtualizados. Puede elegir una solución eficaz para las plataformas de distintos proveedores o bien una opción sin agente y adaptada para VMware vShield. En cualquiera de los casos, disfrutará de una seguridad flexible y de primera calidad, además de un alto rendimiento.Para facilitar la protección proactiva, integramos información sobre amenazas en tiempo real y unificamos la administración de la seguridad en las infraestructuras física y virtual.
Replay del: Jueves 20 de junio de 2013, de 11h00 a 12h00
Cloud Based Threat Intelligence to Improve Detection Rates and Security Posture
McAfee Labs identifies more than 100,000 new pieces of malware, more than 12,000 new malicious web sites, and 1,000+ new malicious email sites each and every day. With the threat landscape evolving in “Internet Time” it is impossible for standard signature based or standalone heuristic products to keep up with the volume of threats now appearing. The only answer to address this issue is to leverage the cloud and big data technologies contained in McAfee’s Global Threat Intelligence (GTI) system. McAfee GTi is a cloud based, real time reputation service that tracks new and emerging threats from malware, web, email, and network level sources.
Join this webinar on Global Threat Intelligence and discover:
The four threat vectors tracked by McAfee Global Threat Intelligence
The unique benefits to be realized from cross vector threat correlation
The detection improvements available from activating GTI in all McAfee products
The built in security and performance features that maximize detection accuracy while minimizing the impact on IT infrastructure
This webinar will cover the unique advantages that GTI can provide in optimizing your enterprise security posture.
Recording from Wednesday, June 19th 2013, 2pm BST (3pm CET)
Webinar McAfee Virtualisation
Sécurité, informations sur les menaces et gestion des environnements virtualisés.
Avec les solutions McAfee pour environnements virtualisés, vous profitez des avantages opérationnels de la virtualisation tout en optimisant la sécurité et la conformité de vos serveurs virtuels. Nos solutions intègrent de nouvelles options garantissant protection et efficacité opérationnelle, que vous consolidiez des centres de données, gériez une infrastructure de postes de travail virtuels ou cherchiez à protéger les informations sensibles de vos bases de données.
Countermeasure-Aware Risk Management with McAfee Risk Advisor
Do you find yourself sitting in a war room struggling to answer the question “Do we need to shut down our business and roll out this patch?” when a out-of-band critical patch is released? Do you find yourself deploying several security products not knowing for sure if you are staying ahead of the threat curve? Are you not clear on the RoI from the security investments you have already made?
Watch this webinar on Countermeasure-Aware Risk Management with McAfee Risk Advisor:
To learn how to optimize and reduce patching cycles & establish patching priorities
To determine which countermeasures you should invest in as threats materialize
To see how you can receive up to date threat updates within ePO
To know how to have automatic “application awareness” and associate threats to specific applications
To quantify the risk of a threat on an asset
Also get to know how to customize your risk profile to best reflect your true risk posture, and perform risk modelling to better understand changes to your risk posture as you introduce new countermeasures in your environment.
Recording from Wednesday, June 12th 2013, 2pm BST (3pm CET)
Seminario Online McAfee SIEM: información de seguridad y administración de eventos
Nuestro SIEM potente y de alto rendimiento, reúne los datos de los eventos, de las amenazas y de los riesgos para proporcionar la mayor información de seguridad, lograr respuestas rápidas a los incidentes, gestionar los registros de forma sencilla y generar informes de cumplimiento ampliables. En el corazón de nuestra oferta SIEM Enterprise Security Manager consolida, correlaciona, evalúa y da prioridad a los incidentes de seguridad tanto para las soluciones de terceros como para las de McAfee. Como parte del marco Security Connected, McAfee Enterprise Security Manager se integra con McAfee ePolicy Orchestrator (McAfee ePO), McAfee Risk Advisor y McAfee Global Threat Intelligence, y proporciona el contexto necesario para gestionar los riesgos de la seguridad de forma autónoma y adaptativa.
Aproveche nuestra seguridad intrínsecamente inteligente, con el asesoramiento de expertos para que obtenga el mayor rendimiento de su solución de McAfee. Los servicios para soluciones de McAfee emplean las mejores prácticas para proporcionarle el conocimiento contextual, la visibilidad y la información que necesita para entender cómo amenazan a su empresa los eventos de seguridad y los que no son de seguridad.
I prodotti di Enterprise Risk & Compliance Management di McAfee aiutano a minimizzare
i rischi di sicurezza IT e non conformita’, e ad automatizzare la gestione della
compliance e a ottimizzare la sicurezza. Con il framework McAfee Security Connected,
l’Enterprise Risk e Compliance Management raggiunge un nuovo livello di efficienza
operativa. Grazie a una singola console di gestione delle attività sulla rete e dei
vostri endpoint, è facile rintracciare gap di security & compliance identificando
vulnerabilità, misconfigurazioni e contromisure, in modo da proteggere i vostri asset
più critici, intensificando l’investimento di security laddove sia più necessario.
Con le nostre soluzioni, potete spendere un budget minore sulle operazioni, garantendo allo
stesso tempo un livello di sicurezza maggiore unito a un maggiore controllo su attivita’
di audit e review.
Schalten Sie den Sicherheits-Turbo ein: Verbessern Sie Ihre IT-Sicherheit und Ereignisreaktion durch automatische Netzwerkintelligenz
Referent: Marcus Viertel
Erfahren Sie im Rahmen dieses Webcasts, wie Sie präzise, integrierte Netzwerksicherheit mit
einem konsolidierten, intelligenten Überwachungsprogramm kombinieren und hierdurch mehr
Bedrohungen erkennen und blockieren sowie eine schnelle Reaktion auf neue Angriffe gewährleisten
McAfee Application Control – zero tolerance for zeroday threats
Advanced persistent threats via remote attack or social engineering make it increasingly difficult to protect your business. At McAfee, safe never sleeps. We work around the clock to find effective ways to help you keep your business secure and productive. Outsmart cyberthugs with McAfee® Application Control software. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that block unauthorized applications and foil advanced persistent threats (APTs) — without labor-intensive lists
Join this webinar on McAfee Application Control to learn how to:
zero-day and APTs without signature updates
Utilize McAfee Global
Threat Intelligence™ (McAfee GTI™) to provide reputation of files and applications
Strengthen security and lower ownership costs with dynamic whitelisting
application access with McAfee® ePolicy Orchestrator® (McAfee ePO™) software’s
centralized management platform
McAfee Application Control software provides
an effective way to block unauthorized applications
and code on servers, corporate
desktops, and fixed-function devices. This centrally managed whitelisting
solution uses a dynamic trust model and innovative security features that
thwart advanced persistent threats — without requiring signature updates or
labor-intensive list management. Protect systems from unknown, advanced
persistent threats with centrally managed whitelisting with McAfee Application
Do you struggle with unknown devices appearing on your network and have no way of understanding the security
threats they pose? Do virtual machines spinning up without your knowledge give you headaches? Want to embrace BYOD but don’t want to compromise your
security? Want to understand which mobile devices are entering your corporate environment?
Join this webinar on Continuous RealTime Vulnerability Assessment to understand how to:
Identify and profile devices as they enter your network
Understand the risk that unauthorised devices bring to your network
Embrace BYOD with confidence by understanding what devices are connecting
Understand the vulnerabilities mobile devices within your network are carrying
Embark on a RealTime Asset Management Programme
The world of static vulnerability assessment has passed. As organisations embrace virtual environment, mobile devices in the enterprise and BYOD,
you need to have immediate visibility into these assets and understand the risk they bring and mitigate accordingly.
Recording from Wednesday, May 29th 2013, 2pm BST (3pm CET)
Seminario Online McAfee ePolicy Orchestrator
El software más avanzado para la gestión de la seguridad: entienda, proteja y elabore informes en un tiempo mucho menor
El mundo en el que vivimos ha cambiado. El trabajo ha dejado de ser un lugar; ahora es una actividad que se desarrolla en cualquier ubicación y con cualquier dispositivo. Esto hace que ya no baste con proteger el centro de datos o el perímetro de red. La seguridad debe estar dondequiera que residan los datos, en todos los procesos operativos y empresariales clave. En la actualidad, la complejidad de las actividades comerciales, junto con el volumen y sofisticación de las amenazas, requiere un enfoque distinto de la administración de la seguridad.
Cuando conoce las vulnerabilidades y riesgos que afectan a su empresa, necesita una solución de administración que pueda coordinar la respuesta a esta situación y unifique la administración de todos sus dispositivos, redes, datos y soluciones de cumplimiento de normativas.
Replay del: Miércoles 29 de mayo de 2013, de 11h00 a 12h00
Webinar McAfee ePolicy Orchestrator
Véritable fondement de la gestion de la sécurité McAfee, la plateforme McAfee ePO apporte aux clients des solutions de sécurisation de pointe integrées à leur infrastructure d'entreprise afin d'accroître la visibilité sur leur environnement, de gagner en efficacité et de renforcer leur niveau de protection.
Date & heure : Vendredi 24 Mai 2013, de 11h00 à 12h00
The Top Five Reasons to Upgrade to ePolicy Orchestrator 5.0
Today, more than ever, IT organizations are taking a strategic approach to security—consolidating security portfolios to reduce complexity, investing in next-generation technologies to improve protection, and integrating with existing IT assets to streamline processes. Building on the foundation of the world’s best security management platform, ePolicy Orchestrator extends on its key messages of unification, extensibility, and scalability in response to customer demand…come hear and see precisely how.
Join this webinar on ePO 5.0 as you:
See what trends are keeping security practitioners up at night
Hear about the real-world problems McAfee ePO 5.0 solves, and why your customers want it
Learn the top five things you need to know (and your customers will ask) about ePO 5.0
You will also get a sneak preview into where McAfee is going with security management, and why your customers are so excited about it.
Recording from Wednesday, May 22nd 2013, 2pm BST (3pm CET)
McAfee Data Loss Prevention 9.3
In an increasingly connected world, your data gets around - often many times without your knowledge. The good news? McAfee Data Loss Prevention delivers the highest levels of protection for sensitive data, while greatly reducing the cost and complexity of safeguarding business-critical information.
View this webinar on DLP and learn about:
The new cool features in the latest DLP 9.3 release
How to stay ahead of threats without guesswork or trial and error
Use cases on leveraging the synergy between the different McAfee Data Protection technologies
Don't miss the opportunity to hear from data protection experts on how to protect your data in the modern organization!
Recording from Wednesday, May 15th 2013, 2pm BST (3pm CET)
Webinar sulle Soluzioni di Intrusion Prevention di McAfee (IPS)
Registrati ora per conoscere le tecniche più comuni di attacco mirato e come si possono
contrastare i tentativi di furto di dati sensibili e critici da parte di hacker e di
organizzazioni criminali grazie all’implementazione del Next Generation Network Intrusion
Prevention da McAfee.
Vieni a scoprire come combattere gli attacchi mirati con il Next Generation Network IPS:
Decostruzione di una minaccia persistente avanzata.
La necessità di un nuovo paradigma di prevenzione degli attacchi attacco.
How ePO can deliver real-time information across thousands of systems in seconds
Threats travel across the globe in seconds. The difference between a successful attack and a successful defence, depends largely on timing. Traditional management reports what’s happened in the past. How can protection be implemented, and security be managed with any accuracy, when the management system uses old data. How can McAfee Real Time for ePO change this and allow you to view up-to-the-minute information?
View this webinar on Realtime for ePO to learn:
How do I know how much protection I have right now?
How do I know what’s happening now, not an hour ago or yesterday?
How can I fix problems instantly and know they have been fixed instantly?
When is historic data useful?
How can I retrieve information instantly?
How can I respond to events immediately?
What is Real Time for ePO and how can it help?
How is Real different from traditional management architecture?
Recording from Wednesday, May 8th 2013, 2pm BST (3pm CET)
threats and malware – and a guide to NextGen Endpoint
does your endpoint look like today? How has malware evolved to evade
traditional endpoint solutions?
Think about how your approach to
malware has changed over the last 5 years. The endpoint has been
redefined; the motivation behind attacks has changed; the threat
landscape has evolved.
Join this webinar on Endpoint Security to:
Learn how malware has evolved
See how signatures have become less and less relevant in fighting malware
Hear about how advanced persistent threats and rootkits have changed the threat landscape
Understand the four phases of every attack and how these can be combatted
Hear about how McAfee NextGen Endpoint can help you fight the war against malware
Traditional signature-based anti-virus protection is 20 year old technology. It
should be the last line of defence, yet within many organizations it is
the only line of defence against malware. Learn how to evolve your
approach using NextGen Endpoint Security from McAfee.
SIEM has long been the central analytics console for security. With the right solution and a solid implementation, SIEM provides actionable intelligence – immediately alerting security teams about possible breaches. As SIEM has gotten smarter, a key question has arisen – why is it still a passive solution? Why doesn’t it do something about everything it sees? Well, now it does.
This webcast will cover new practices to shorten time to respond, stop attacks in their tracks, and obtain continuous situational awareness through new active remediation capabilities in McAfee ESM – McAfee’s leading SIEM solution.
Join this webinar on putting SIEM into action as you:
Gain a clear understanding of new active remediation capabilities of McAfee’s SIEM
Obtain simple operational processes to put these capabilities into action immediately
Learn how to stop common attack scenarios faster and with more precision
Don’t miss this opportunity to turn actionable intelligence into intelligent action.
Recording from Wednesday, April 24th 2013, 2pm BST (3pm CET)
Webinar McAfee SIEM: gestion des événements et des informations de sécurité
Une sécurité efficace commence par une visibilité en temps réel sur toutes les activités de l'ensemble des systèmes, réseaux, bases de données et applications.
McAfee® Enterprise Security Manager offre à votre entreprise une connaissance précise et en temps réel
du contexte situationnel, ainsi que la vitesse et l'évolutivité requises pour identifier les menaces critiques, y répondre intelligemment et assurer une surveillance constante de la conformité.
De plus, l'intégration avec McAfee Global Threat Intelligence™ (McAfee GTI™) et le logiciel McAfee® ePolicy Orchestrator® (McAfee ePO™) vous permet de détecter les menaces, de les mettre en corrélation et d'appliquer les mesures correctives nécessaires en quelques minutes dans l'ensemble de votre infrastructure informatique.
Date & heure: Mercredi 24 Avril 2013, de 11h00 à 12h00
Countering Malware and Bots
It seems that every security vendor is talking about malware today, how it is growing, and how you need to do something about it. But those words often come with little in the way of working solution. Nor do most of the vendors explain which are the most effective approaches to defend against advanced malware and why.
Join this webinar on advanced malware to learn:
Why current security approaches often miss advanced malware
Which layering techniques are effective and when
Best practices on investigating malware
Proof that a network security solution today is effective against advanced malware
It is not a question of whether or not your organization will be attacked by advanced malware – it probably is under attack already. The question is what will you do about it? Can you afford to pass up an opportunity to learn about the best approaches to this problem?
Recording from Wednesday, April 17th 2013, 2pm BST (3pm CET)
Webinar sulla gestione delle informazioni e degli eventi di sicurezza (SIEM)
McAfee Security Information and Event Management fornisce una soluzione integrata di intelligence per la sicurezza, grazie all’archiviazione, consolidazione e correlazione di informazioni ed eventi provenienti dai log di security. A fronte delle complessità di gestione della sicurezza aziendale e delle esigenze di compliance, McAfee SIEM unisce visibilità sullo stato generale di sicurezza della propria infrastruttura, protezione da minacce di tipo Insider e furto di dati, all’efficienza e livello di prestazioni migliori sul mercato.
Can anyone here say for a fact that they know how many assets are currently connected to the network? How about 10 minutes ago, can you? Or how about the amount of BYOD and mobile assets that try to connect to your network on a daily basis?
Join this webinar on McAfee Asset Manager and you will:
Learn about the gap that exists between the perceived vs. the actual security of the network
See how to overcome this gap using real-time visibility and get real-time awareness on every device, physical or virtual, fixed or mobile, managed or unmanaged
Hear about the continuous monitoring mechanism for providing real-time visibility
Have the opportunity to explore the solution and view the product demo
Today more than ever, your network is at risk. The amount of unknown assets such as BYOD, mobile and uncontrolled assets are increasing on a daily basis exposing your network to more risks every day. When that happens, you need to have a tool alerting, locating and profiling these assets the minute they pop up to understand the change they bring to your security posture.
Recording from Wednesday, April 10th 2013, 2pm BST (3pm CET)
Getting the Most out of Security Connected from McAfee
As attacks have become more complex, so has security. To address the ever-evolving threat landscape, organizations have implemented a host of technologies to block, detect and manage security on the network, at the endpoint and throughout the enterprise. While this has increased our defences, it has also created silos of security management that slow down response times and increase cost.
This webcast will cover how organizations can meaningfully leverage Security Connected at McAfee to not only lower complexity, but improve the defences they already have. Security Connected at McAfee is continually evolving, and now with key integrations between endpoint, network and security management, with a small amount of operational planning, organizations can realize the benefits of a truly integrated security architecture.
Join this webinar on Security Connected as you:
Gain a clear understanding of Security Connected at McAfee
Learn Simple operational processes to gain maximum benefit from Security Connected
Understand how Security Connected, combined with some small customizations, can detect and stop even the most stealthy attacks
Don’t miss this opportunity to end security management chaos.
Next generation endpoint security delivers superior Day Zero protection results: A side by side comparison
Endpoint Protection Products (EPP) are designed first and foremost to protect from known threats using signature based scanning. However, today’s fast moving advanced threats are designed to take advantage of new vulnerabilities in operating systems and other services like Flash or Java. The ability to block exploits and not just known malicious files is a fundamental requirement of today’s antimalware products. How does your endpoint protection stack up against 10 of the most prevalent commercial security vendors?
Most 3rd party antimalware tests measure straight detection of known files. Released in Feb 2013, the NSS Exploit and Evasion tests are unique in that they go beyond simple file detection to judge the day zero protection capabilities of 11 different products.
In this webcast, you will see a side by side comparison of 11 commercial security products and how they protect against the most advanced threats.
Recording from Wednesday, March 27th 2013, 2pm GMT (3pm CET)
The Latest Email Security Requirements – Are you covered?
Email is a popular attack vector, and needs to be protected. Is your email security solution keeping up?
Join this webinar on Email security to hear about:
• The power of McAfee’s threat protection
• How you can take steps towards preventing data exfiltration
• With delivery models shifting, what you need to consider
We will also cover some of the recent McAfee Email Protection enhancements and how they can provide stronger protection for this critical business communications channel.
Date & heure : Mercredi 14 Mars 2013, de 11h00 à 12h00
Malware is advancing: Is your web protection solution keeping up?
Web attacks and malware continue to evolve and are now often specifically designed to evade detection. Is your web protection solution keeping up?
Join this webcast and learn about emerging web-based malware trends and recent McAfee Web Gateway enhancements to help combat these threats. We’ll also share how McAfee Gateway protections stack up against today’s malware and share results from recent testing completed by independent testing lab, AV-Test.
Join us and learn about:
Emerging web-based malware trends
McAfee Web Gateway recent protection enhancements
Recent independent testing results on Web Gateway’s protections
We’ll share the full test summary from the AV-Test results with all attendees.
Recording from Wednesday, March 13th 2013, 2pm GMT (3pm CET)
Seminario Online Seguridad de la Red
McAfee, el líder global en sistemas de prevención de intrusiones en la red (IPS), proporciona niveles de seguridad nunca vistos y, al mismo tiempo, opciones de despliegue flexibles que facilitan la optimización de sus inversiones en seguridad. Sólo McAfee® Network Security Platform ofrece la mejor efectividad en su categoría, rendimiento en línea escalable y controles de gestión IPS de nueva generación que eliminan las conjeturas en la administración de la seguridad. Unifique la administración de la seguridad en entornos físicos y virtuales, simplifique las operaciones de seguridad y proteja su empresa contra las últimas amenazas: malware, ataques de tipo zero-day, redes de bots, intentos de denegación de servicio (DoS) y APTs.
Replay del : Martes 12 de Marzo de 2013, de 11h00 a 12h00
Webinar sulla sicurezza avanzata dei contenuti con McAfee Web Gateway
Potenziato da una sicurezza a più livelli, potete contare sul McAfee Gateway Anti-Malware Engine per una protezione automatica dai malware e una aggiornata Global Reputation Intelligence per combattere minacce zero-day, spyware e attacchi mirati - senza signature - prima che possano invadere la vostra rete.
Venite a scoprire come le nuove tecnologie del McAfee Web Gateway Anti-Malware Engine offrano una avanzata e proattiva protezione contro le odierne minacce del web.
So you want to begin to leverage all the benefits associated to software as a service (SaaS), but you have some concerns? You should! Organizations that provide online services are always trying to make it sound as if there are no risks and you should just jump in. The fact of the matter is, anyone can start a services company, and there are few guarantees that can be made. Everyone should have a basic understanding of what a SaaS offering can provide in reality, and what to watch out for.
Benefits you should expect.
Risks to be aware of.
What you should be asking about regarding datacenters.
What sort of service levels are realistic.
During this seminar, a brief overview of SaaS benefits and pitfalls will be covered. You will visually be able to see what a datacenter should look like and how it should work, in addition to some of the games some vendors play in order to make you feel better about their solutions. Insight into the fluffy marketing side of SaaS providers is enough reason alone to attend.
In an increasingly connected world, your data gets around – often many times without your knowledge. The good news? McAfee Data Loss Prevention delivers the highest levels of protection for sensitive data, while greatly reducing the cost and complexity of safeguarding business-critical information.
Join the webinar and learn about how you can:
Secure sensitive data wherever it is stored or used, from the USB drive to the network firewall.
Stay ahead of threats without guesswork or trial and error.
Monitor your network and improve business process.
Take advantage of the synergy between the different McAfee Data Protection technologies (Mobile, SIEM, and more).
Don't miss the opportunity to hear from data protection experts on how to protect your data in the modern organization!
Recording from Wednesday, February 27th 2013, 2pm GMT (3pm CET)
Webinar Network IPS
Protection contre les menaces réseau et les infractions aux stratégies susceptibles de porter atteinte aux utilisateurs, aux données et aux réseaux.
Les solutions de prévention des intrusions sur le réseau McAfee préservent la continuité des activités et la sécurité de votre entreprise grâce à une protection de pointe contre les pirates, les logiciels malveillants et les exploits « jour zéro » de tous types.
Non seulement la couverture est complète et les protections robustes, mais la gestion est facilitée par une console web centralisée simplifiée.
Date & heure : Mardi 26 Fevrier 2013, de 11h00 à 12h00
How to Counter Advanced Threats with McAfee Network Security
Do you struggle to respond to the multitude of security threats launched at your network every day? Most organizations face increasingly sophisticated threats with increased exposure of data loss. Stealthy attacks affect more than just corporate data. The operational response required to investigate and remediate breaches takes its toll on IT organizations.
Join this webinar to learn how McAfee Network Security Platform:
Prevents sophisticated threats, including advanced malware and bots
Enhances visibility through intelligent event prioritization
Streamlines event resolution through intuitive workflows
Don’t miss the first look at McAfee’s new and improved Network Security Platform, with new management and new anti-malware technologies. The webcast includes a live demo of the new features.
Replay del : Martes 12 de Febrero de 2013, de 11h00 a 12h00
Webinar sulle Soluzioni McAfee per la Sicurezza del Database
McAfee Database Activity Monitoring (DAM) individua automaticamente i database della tua rete, li protegge con un insieme di difese preconfigurate e aiuta a creare policy di sicurezza personalizzate per il tuo ambiente. McAfee DAM protegge in modo conveniente i dati dalle minacce, monitorando localmente l'attività su ciascun server database e allertando sulla presenza di utilizzi pericolosi o bloccandoli in tempo reale, anche quando viene eseguito in ambienti virtualizzati o di cloud computing.
How many SaaS applications is your organization using? How certain are you that only the right people have access to the right applications in the cloud? What kind of infrastructure do you have to prevent sensitive data in the cloud from being exposed by someone with the wrong kind of access?
Join this webinar on Getting Control of Identity in the Clouds to learn how your organisation can:
Enhance the protection of sensitive applications and data in the cloud
Increase end-user productivity and convenience
Protect saas applications against unauthorized access
Extend enterprise-class security and access controls to all your saas applications.
The Cloud is hot and companies are adopting saas applications at a frenzied pace. This webinar will provide valuable insight into how you can establish cost-effective security and access controls that will enable you to protect sensitive data and applications in the cloud.
Recording from Wednesday, January 30th 2013, 2pm GMT (3pm CET)
Webinar Server Security
McAfee a mis au point une série de solutions de sécurisation des Datacenter qui protègent à la fois les serveurs, les systèmes de stockage et le réseau. L'ensemble peut être géré par la plateforme Security Connected de McAfee, qui fournit une infrastructure de sécurité globale et néanmoins modulaire requise par les centres de données complexes actuels.
Découvrez, grâce à ce webinar, comment les nouvelles solutions McAfee peuvent assurer la protection complète des Datacenter pour de nombreux types de serveurs et grandement faciliter la gestion. Les avantages sont nombreux :
Solution de sécurité unique
Absence de dégradation des performances
Couverture assurée des plates-formes et applications critiques
Date & heure : Mardi 29 Janvier 2013, de 11h00 à 12h00
Seminario Online sobre la protección de los Servidores
¿Cómo mantener la gestión de seguridad IT y la de gestión del cambio cuando se puede desplegar aplicaciones y nuevos servidores en cuestión de minutos en lugar de semanas o meses?
¿Cómo se controlan esas nuevas aplicaciones y servidores contra las violaciones de seguridad cuando se implementan sin la ayuda de la organización de IT? Es hora de mirar el centro de datos y la seguridad de los servidores de una manera diferente.
Replay del : Jueves 24 de Enero de 2013, de 11h00 a 12h00
Continuous RealTime Vulnerability Assessment
Do you struggle with unknown devices appearing on your network and have no way of understanding the security threats they pose?
Do virtual machines spinning up without your knowledge give you headaches?
Want to embrace BYOD but don’t want to compromise your security?
Want to understand which mobile devices are entering your corporate environment?
View this webinar on Continuous RealTime Vulnerability Assessment to understand how to:
Identify and Profile devices as they enter your network
Understand the risk that unauthorised devices bring to your network
Embrace BYOD with confidence by understanding what devices are connecting
Understand the vulnerabilities mobile devices within your network are carrying
Embark on a RealTime Asset Management Programme
The world of static vulnerability assessment has passed, as organisations embrace virtual environment, mobile devices in the enterprise and BYOD you need to have immediate visibility into these assets and understand the risk they bring and mitigate accordingly. Watch this webcast to understand how McAfee has moved Discovery, Asset Management and Vulnerability Assessment to be RealTime and Continuous.
Recording from Wednesday, January 23rd 2013, 2pm GMT (3pm CET)
Webinar sulle Soluzioni McAfee per la sicurezza del data center
McAfee ti invita a partecipare al webinar sulle soluzioni McAfee per la sicurezza del dacenter.
McAfee offre soluzioni di sicurezza di rete per proteggere i vostri data center e i dati e le applicazioni che fornite ai vostri dipendenti o direttamente ai vostri clienti. La vostra rete è la chiave per il vostro data center, fornendo connettività ai vostri utenti e clienti, e include applicazioni basate su web-network, database stores, e-mail, file server storage e la vostra crescente infrastruttura virtualizzata.
Venite a scoprire tutti i dettagli su:
Protezione degli ambienti VDI utilizzando il Network Integrity Agent.
Protezione Server con IPS.
Sicurezza scalabile per ambienti fisici e virtuali.
How can IT security and change management processes keep up with the application owners that can easily roll out new servers in a matter of minutes rather than the traditional weeks or months? How can you monitor those servers and applications for security breaches when they can be deployed with no assistance from the IT organization? It is time to look at the data center and server security differently.
In this session you will hear how Next Generation Data Center Security can help your organization to:
Provide common protection for servers across private data centers and cloud providers
Empower the application owner to easily deploy strong server security controls as part of any application project
Regain control and compliance over rogue cloud servers
Identify risk mitigation strategies for cloud service provider security events
Learn how to lead your organization the next generation data center securely while delivering the cost and agility advantages offered by cloud technologies.
Webinar sulla sicurezza per gli ambienti virtualizzati con McAfee MOVE
L'implementazione delle soluzioni di virtualizzazione è abbastanza complessa senza bisogno che problemi di sicurezza e conformità incidano negativamente sulle prestazioni e sui profitti operativi previsti. Con le soluzioni McAfee per gli ambienti virtuali, godi dei vantaggi operativi della virtualizzazione con la garanzia di una sicurezza e una conformità ottimali per i server virtuali. Le nostre soluzioni forniscono nuove opzioni per l'efficienza di protezione e operatività, indipendentemente dal fatto che la tua azienda stia consolidando i data center, gestendo un'infrastruttura di desktop virtuali o cercando un modo per proteggere le informazioni sensibili contenute nel database.
McAfee Security Optimized for VMWare Virtual Data Centers
This webcast will cover detail and technical know-how on how VMware and McAfee are working together to provide you optimized security for your virtual environments. Join to hear directly from VMware and McAfee product experts, and learn how the latest vSphere pricing model includes vShield endpoint.
McAfee's latest version of MOVE AV now supports VMware clusters and allows you to fully automate the deployment of the security virtual appliance to hundreds of hypervisor hosts at one time, saving you time, effort, and valuable resources
Vulnerability Management, Database Activity Monitoring & Virtual Patching are techniques to protect the information stored in databases against undesired access and attacks from both inside and outside organizations.
The webinar gives answers to the following questions:
How to get an overview of all my databases?
Where is sensitive data stored?
How can the security state of my databases be audited?
Access by high privileged users is often an security issue. How can it be audited and prevented?
What happens inside the database, what are the applications which are accessing the database?
How can data be protected against manipulations?
Patching the database is a huge issue and costs a lot of time and money. How can the risk be minimized, if installing of the patches is not possible in a timely manner?
How does Security-Out-Of-The-Box work?
How can an attack against the database be detected and prevented?
McAfee delivers network security solutions to guard your data center along with the data and applications you provide to your employees or directly to your customers. Your network is the key to your data center, supplying connectivity to your users and clients, and includes web and network-based applications, database stores, e-mail, file server storage, and your growing virtualized infrastructure.
Listen in as our McAfee security professional goes into detail about:
Protection of VDI environments using the Network Integrity Agent.
Server protection using IPS.
Scalable security for both physical AND virtual environments.
Recording from Wednesday, November 28th 2012, 2pm GMT (3pm CET)
Webinar sulla protezione degli Endpoint
La suite McAfee Endpoint Protection offre una protezione fondamentale in una soluzione integrata che protegge i sistemi contro malware, dispositivi non autorizzati e attacchi zero day. Grazie al controllo dei dispositivi e alla protezione fondamentale di e-mail e web, la suite Endpoint Protection rappresenta il metodo ideale per proteggere i desktop tradizionali e i sistemi fissi che hanno un'esposizione limitata alle minacce Internet.
The Next Generation of Endpoint Security Will Be Context Aware
First generation Endpoint Security dealt with protecting devices – mainly desktops and laptops. In today’s threat environment, every endpoint is vulnerable to malicious attack—from virtual servers to smartphones. Context-aware security protects all your devices and the data and applications they contain across all threat types and with unified management. Discover how context-aware McAfee endpoint security solutions immediately address threats to your organization while lowering costs and simplifying management.
What you’ll learn:
How malicious attacks are delivered and what happens when they infiltrate endpoints.
How to protect your organization against the most recent threats, including Stuxnet, fake antivirus, Cridex and others.
Gartner research findings and recommendations about context-aware security.