ESET Webcasts

ESET - Internet Security Threats Channel

IT Security Lessons Learned in 2014 to Make Businesses More Secure in 2015
Live on Dec 17, 2014 (60min)
Aryeh Goretsky, Distinguised Researcher, ESET
Will 2014 be remember as the year of the mega-breach or will we all just try to forget the drumbeat of criminal hacks? In this webinar ESET Distinguished Researcher Aryeh Goretsky takes a positive approach and examines the lessons that can be learned from the year?s events in IT
Why the mHealth Security Challenge is Way Bigger than HIPAA?
Live on Dec 03, 2014 (60min)
Stephen Cobb, Senior Security Researcher, ESET
The potential benefits of mobile medical technology and telemedicine are enormous, from to better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance, as ESET Security Researcher Stephen Cobb explains
How to Keep Information Safe and Secure While Traveling
Live on Nov 19, 2014 (60min)
Lysa Myers, Security Researcher at ESET
Whether it is business travel during the busy conference season, or heading home for the holidays, taking our digital devices beyond the relative safety of home or office creates more security challenges than we may realize. ESET Security Researcher Lysa Myers talks about how you can protect your data and devices on the road or wherever you roam
Wearable Technology: What are the Security Threats?
Live on Nov 05, 2014 (60min)
Cameron Camp, Security Researcher, ESET
From bodycams to fitness gadgets and life-saving medical devices, wearable technology is coming on strong, but are there risks involved? As standalone devices or a sub-category of the Internet of Things, wearable technology raises security and privacy concerns that need to be addressed sooner rather than later, as ESET Security Researcher Cameron Camp explains
What are the Top Topics during National Cyber Security Awareness Month?
Live on Oct 22, 2014 (60min)
Stephen Cobb, Senior Security Researcher, ESET
October is National Cyber Security Awareness Month and in 2014 it will be bigger than ever, surfacing the concerns of both companies and consumers. From the Twitter hashtag #NCSAM to events in your region and this webinar, this is a good time to get expert perspective on the hot topics in cyber security
How do Open Source Tools Stay Secure?
Live on Oct 08, 2014 (60min)
Cameron Camp, Security Researcher, ESET
The Heartbleed flaw alerted the world to the security aspects of open source code which is now widely used everywhere from big enterprises to small businesses. ESET Security Researcher Cameron Camp draws on his many years of experience working with open source tools to the urgent and important issue of how to keep them secure
How Can You Protect Sensitive Data in Education?
Recorded on Sep 17, 2014 (37min 14sec)
Lysa Myers, Security Researcher at ESET
Review the latest survey findings about the IT security challenges faced by educational institutions and the real world responses that are being deployed to protect systems and the very valuable data they process
How Secure is Global Commerce Today?
Recorded on Sep 03, 2014 (55min 17sec)
Stephen Cobb, Senior Security Researcher, ESET
Act local but think global applies to IT security and data privacy as well as many other aspects of doing business. How does adding an international dimension to your business impact privacy and security? What does it mean if your business continuity depends on a global supply chain? This webinar will help you answer these questions and more
The Evolution of Cybercrime
Recorded on Aug 20, 2014 (56min 2sec)
Stephen Cobb, Senior Security Researcher, ESET
Successfully defending IT systems and the valuable data they contain requires an up-to-date understanding of the scale and nature of security threats. For many organizations, the greatest IT security threat is cybercrime, the nature of which is evolving...
Mobility in Healthcare
Recorded on Aug 13, 2014 (42min 28sec)
Lysa Myers, Security Researcher at ESET
Explore how the use of mobile digital devices impacts efforts to ensure the confidentiality, integrity, and availability of medical data. Is there a way to BYOD safely? And can mobile devices help, rather than hinder, IT security
Cloud vs. Virtual Environments: Which one Should you Trust?
Recorded on Jul 09, 2014 (55min 13sec)
Cameron Camp, Security Researcher, ESET
Today's companies face a confusing array of choices when it comes to IT services, from public to private clouds and different types of virtual environments. ESET Security Researcher Cameron Camp explains your options and the security pros and cons of each
Mid-Year Threat Review: Do you know the Latest Threats out There?
Recorded on Jun 25, 2014 (59min 45sec)
Aryeh Goretsky, Distinguised Researcher, ESET
As 2014 passes the half-way mark, ESET Distinguished Researcher, Aryeh Goretsky, reviews the new threats that have emerged this year, as well as the perennial favorities that continue to cause security incidents and data breaches
The ABC's of Authentication: What Should you know?
Recorded on Jun 04, 2014 (43min 21sec)
Lysa Myers, Security Researcher at ESET
From passwords to fingerprints to iris scans, there are now more choices than ever for authentication to systems and services
Mobile Device Threats and BYOD Update
Recorded on May 21, 2014 (57min 4sec)
Aryeh Goretsky, Distinguised Researcher, ESET
What security risks do mobile devices introduce into your organization, and how can you protect against them now that so many employees are using their own devices for work? ESET Distinguished Researcher, Aryeh Goretsky explains
Getting Started with Business Continuity
Recorded on May 07, 2014 (56min 50sec)
Stephen Cobb, Senior Security Researcher, ESET
From natural disasters to hacking attacks, your business needs a plan to respond to adverse events and keep on going. That?s the goal of Business Continuity and Stephen Cobb helps you lay the groundwork for a successful strategy for your organization
The Cybersecurity Framework is here, now what?
Recorded on Apr 16, 2014 (53min 42sec)
Cameron Camp, Security Researcher, ESET
Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates
Cyberskills Shortage: Where is the cyber workforce of tomorrow?
Recorded on Apr 02, 2014 (58min 10sec)
Stephen Cobb, Senior Security Researcher, ESET
Numerous studies show a serious shortage of qualified people to fill the cyber jobs of today, particularly those that require security knowledge and skills. Stephen Cobb looks at the implications and the steps being taken to improve cyber education and training
What does your Business need to know about Encryption?
Recorded on Mar 19, 2014 (58min 8sec)
Stephen Cobb, Senior Security Researcher, ESET
With confidential data under attack on many fronts, it is time to look at how encryption can protect data access and what your business could be doing to employ encryption, from servers to endpoints to removable media
How to Discuss Online Safety with Your Kids
Recorded on Mar 17, 2014 (3min 16sec)
Alison Rhodes
"The Safety Mom" Alison Rhodes shares key topics for protecting online security and privacy for your kids. Educate them on the dangers of sharing information and use training tools and parental controls to show them only the good sides of the internet
How to Know if an Android App is Safe to Download
Recorded on Mar 17, 2014 (2min 31sec)
Multiple
The convenience of an open applications market for your android device has led to a heightened threat of security. Good judgement and attention to detail are a few tips for good practice to ensure trusted apps that keep you protected
Online Safety Tips: Protect Your Family from Identity Theft Online (Phishing Sca
Recorded on Mar 17, 2014 (3min 16sec)
Alison Rhodes
"The Safety Mom" Alison Rhodes has tips for limiting risks for your kids online. Educate yourself and them about the reality of the danger, set rules and parental controls and use security software to protect them from phishing and other threats
How to tell the difference between adware, spyware, and a virus
Recorded on Mar 17, 2014 (2min 47sec)
Multiple
Protect yourself online by knowing the basics and recognizing the warning signs. Backing up your information as well as anti-virus scanners and software can provide security from malware, phishing, and other cyber threats
How to choose between free or paid antivirus software
Recorded on Mar 17, 2014 (1min 44sec)
Multiple
With so many anti-virus softwares available, it is important to recognize the difference between free and paid services. While free programs may seem attractive, research the market and know your needs to ensure you have the right protection
Do Apple Computers Need Antivirus Protection?
Recorded on Mar 17, 2014 (1min 44sec)
Multiple
Even though Apple computers cannot be infected by Windows viruses they are still susceptible to other cyber threats. Enhance your apple security and experience with effective antivirus software
Identity Theft Protection: How to Prevent Identity Theft Online
Recorded on Mar 17, 2014 (2min 41sec)
Alison Rhodes
"The Safety Mom" Alison Rhodes has some easy ways to protect your family online. Keys for password protection and safety software with personal firewall and anti-phishing features can help prevent identity theft and other cyber threats
How to detect and remove some viruses from your computer
Recorded on Mar 17, 2014 (2min 26sec)
Multiple
Detecting the symptoms of an infected computer and taking the right steps can help you fix and remove viruses on your own, from the comfort of home. Proper back-up and anti virus software can help protect you from losing important information
How to choose the best antivirus software for you
Recorded on Mar 17, 2014 (1min 53sec)
Multiple
Enjoy and explore the internet freely and securely by choosing the best antivirus software for your computer. Knowing your needs and operating system as well as research are the keys to protecting yourself from viruses and other cyber threats
VIDEO:  Android security tips: how to keep your mobile device secure
Recorded on Mar 07, 2014 (2min 31sec)
Multiple
Android smartphones provide amazing connectivity and convenience but this accessibility and customization but can come at the price of personal security. Mobile security software can provide the safeguards you need for your device and information
HIMSS 2014 recap:  Latest trends seen at HIMSS
Recorded on Mar 05, 2014 (54min 5sec)
Lysa Myers, Security Researcher at ESET
ESET security researcher Lysa Myers reports on developments in healthcare IT system security that she observed attending the recent HIMSS conference in Orlando. Find out what is being done to better protect patient data privacy
Data Privacy for Healthcare
Recorded on Feb 13, 2014 (38min 18sec)
Lysa Myers, Security Researcher at ESET
45% of data breaches reported in 2013 were from the medical and healthcare sector. ESET researcher Lysa Myers looks at information security in the healthcare industry and how we can do better when it comes to protecting the privacy of patient data
What Does Data Privacy Mean for Your Business?
Recorded on Jan 29, 2014 (52min 16sec)
Stephen Cobb, Sr. Security Researcher, ESET North America
With consumers and customers more concerned than ever about their data privacy, you need to be sure your business is doing enough to protect personally identifiable information (PII). ESET security and privacy expert Stephen Cobb explains how smart privacy strategies not only protect your company, but win you more business
2014: The year ahead in cyber security
Recorded on Jan 15, 2014 (56min 39sec)
Stephen Cobb, Senior Security Researcher, ESET North America
What cyber threats will your business have to deal with in 2014? From cyber criminals to digital privacy concerns, the landscape is shifting and ESET Senior Security Researcher Stephen Cobb offers his take on the road ahead and the best use of resources to protect your business
How would ESET Experts Protect their Business from Malware?
Recorded on Dec 18, 2013 (57min 45sec)
Stephen Cobb, Senior Security Researcher, Cameron Camp, Security Researcher, and Lysa Myers, Security Researcher III
Learn how ESET Experts would protect their business from Malware. This will be a panel discussion
How can your small business make security policies pay off?
Recorded on Dec 04, 2013 (55min 14sec)
Stephen Cobb, Senior Security Researcher, ESET
A guide to improving the cyber security of your organization through policy, while enlisting employees in the security effort and winning more business
Real-time Malware Detection: The business value of detecting viruses and other t
Recorded on Nov 21, 2013 (35min 32sec)
Lysa Myers, Security Researcher III, ESET
How advances in anti-malware strategies can bring detection and prevention closer to the real-time protection required in today?s rapidly evolving threatscape
7 Things Every MSP Should Know About Selling Security
Recorded on Nov 07, 2013 (32min 51sec)
Tom Berger, Director of Channel Sales
Whether you are a long-time provider of network security or are considering the offering for your portfolio, there are certain things every MSP should know. Presenter Tom Berger, Director of Channel Sales for ESET North America will explore some essential truths about selling security including what features to look for in a security provider, how to take advantage of vendor-offered programs and how to make security work towards your bottom line...
Passwords and PINs: The Worst Choices
Recorded on Nov 06, 2013 (55min 2sec)
Aryeh Goretsky, Distinguished Researcher, ESET
What do you need to know about passwords in your business? What type of passwords get hacked the most? How can you enforce passwords and pins in your business?
Cybersecurity in Government: Strategy, Collaboration & Compliance
Recorded on Oct 22, 2013 (59min 11sec)
Stephen Cobb, Senior Security Researcher, ESET
This webcast will highlight the key components of a cyber security program for government information security, including requirements for compliance and tips for collaboration
Social Media ? Facebook Security Threats
Recorded on Oct 09, 2013 (52min 45sec)
Cameron Camp, Security Researcher, ESET North America
Facebook security updates ? how to make your account more secure, what you need to be sure your employees are doing on social media to keep your business secure. Facebook has recently updated their security settings...
How do you Protect your Educational Institution from cyber attacks?
Recorded on Sep 18, 2013 (54min 9sec)
Cameron Camp, Security Researcher, ESET North America
What is the best way to protect your Educational Institution from Zero Day Vulnerability Threats? The bad guys are hard at work trying to exploit zero day vulnerability, and schools and universities could be the target
Email and Endpoint Security Best Practices for your Business
Recorded on Sep 04, 2013 (51min 23sec)
Brandon Stigers, Director of Learning ?Development, ESET
An IT Best Practice Integration of Email and Endpoint Security System to Raise IT Security Levels. SMB?s need to protect both the email system and the endpoint...
Do Cyber Criminals target the Financial Services Industry?
Recorded on Aug 28, 2013 (56min 28sec)
Cameron Camp, Security Researcher, ESET
This webcast focuses on noteworthy fraud cases. This webcast will highlight recent cyber ploys that targeted investors and the financial services industry
Your First Line of Defense: Securing Your Workforce
Recorded on Aug 21, 2013 (59min)
Stephen Cobb, Security Evangelist, ESET
Educating employees about computer security is a vital part of your defense against cybercriminals and unethical competitors. Yet security training and education is often neglected, sometimes at great cost...
HIPAA security and privacy revisited:  Is your business at risk?
Recorded on Aug 07, 2013 (55min 51sec)
Stephen Cobb, Security Evangelist, ESET
HIPAA security and privacy revisited: Is your business at risk? Practically every business that processes, stores or otherwise handles protected health information data (PHI) is required to comply with privacy and security controls. Does that include you? And are you really compliant?
What's new with virtualization: Securing virtualized and cloud environments
Recorded on Jul 24, 2013 (52min 6sec)
Charles Kolodgy, Analyst, IDC
Gearing up for VM World, the largest virtualization event, we will discuss virtualization, security, and what it means to small business
ESET Security Days - Part 6
Recorded on Jul 11, 2013 (10min 21sec)
Multiple Presenters
ESET Security Days - Part 6
ESET Security Days - Part 5
Recorded on Jul 11, 2013 (6min 30sec)
Multiple Presenters
ESET Security Days - Part 5
ESET Security Days - Part 4
Recorded on Jul 11, 2013 (7min 39sec)
Multiple presenters
ESET Security Days - Part 4
ESET Security Days - Part 3
Recorded on Jul 11, 2013 (10min 9sec)
Multiple Panelists
Healthcare Security Panel
ESET Security Day - Part 2
Recorded on Jul 11, 2013 (8min 49sec)
Andrew Lee, CEO, ESET North America
Healthcare Security Panel
ESET Security Days - Part 1
Recorded on Jul 11, 2013 (1min 8sec)
Multiple
Healthcare Security Panel
ESET Security Days - Part 8
Recorded on Jul 11, 2013 (1min 9sec)
Multiple Presenters
ESET Security Days - Part 8
Antivirus Software: Understand Detection Methods Before you buy
Recorded on Jul 10, 2013 (39min 32sec)
Brandon Stigers, Director of Learning and Development and OJ Wolanyk, Sales Engineer
Before you choose an antivirus solution it's important to understand how it goes about detecting malware in the first place. Join us as we discuss: - Security in the News - Modern threat categoreis and attack vectors - Endpoint risks, infection methods, payloads - Detection with signatures and hueristics - Zero Day Risk - Technologies that protect removeable storage devices - Best Practices
Ever changing Social Media platforms ? What are the newest threats associated?
Recorded on Jun 19, 2013 (54min 28sec)
Stephen Cobb, Security Evangelist, ESET North America
There are always new threats in Social Media out there. What are the newest social media platforms and threats associated with them?
Protecting Your SMB: Streamlining Security?
Recorded on Jun 05, 2013 (31min 42sec)
Clark Collett, Principal Instructional Designer, ESET North America
Your business needs security solutions that are easy to live with and run on a daily basis. This webcast will highlight 5 specific atributes and focus the ease of management and implementation for SMB's
5 Essential Steps for SMB's to Build a Layered Security Solution.
Recorded on May 22, 2013 (34min 39sec)
Brandon Stigers, Director of Learning and Development, ESET
Most SMB's use a single point product for each of the different perceived security threats. This has worked in the past, but a far better approach is layering multiple products in a stouter defense
USB drives are convenient, but are they safe to use at your business?
Recorded on Apr 24, 2013 (45min 21sec)
Cameron Camp, Security Researcher, ESET North America
What are the dangers of USB infection? How can you prevent an infection in your business?
What a Hacker Thinks and how to Protect Your Business from one?
Recorded on Apr 10, 2013 (59min 28sec)
Stephen Cobb, Security Evangelist, ESET North America
Take a look into a hacker?s brain. What do they think? Who do they target? What motivates them?
Life After Forefront - How To Protect Sharepoint After Forefront is EOL'd
Recorded on Mar 27, 2013 (33min 54sec)
OJ Wolanyk, Sales Engineer, ESET North America
This webcast will look at your options for replacing Forefront including a product demo on ESET for SharePoint
Windows 8:  Is it Time for Your Business to go There?
Recorded on Mar 13, 2013 (58min 9sec)
Aryeh Goretsky, Distinguished Researcher, ESET North America
Much of the interest in Windows 8 focuses on cosmetic changes, such as the new modern Windows 8 interface (formerly known as the Metro user interface) and replacement of the Start Menu with the Start Screen, but substantial improvements have been made to Windows security, as well. Is it time for your business to go there?
Why is Two-factor Authentication Important for SMB?s?
Recorded on Mar 06, 2013 (41min 27sec)
Cameron Camp, Security Researcher, ESET North America
To a small and medium-sized business (SMB), setting up a two-factor authentication system can be scary. There's extra hardware to buy and the maintenance could be a nightmare...
Endpoint Content Filtering for Your Business:  Why is it important?
Recorded on Feb 13, 2013 (39min 43sec)
Don Lewis, Product Marketing Manager, Business Security, ESET North America
What is the importance of content filtering? Why do small businesses look for products that use content filtering?
Macs in Your Office:  Part of the Problem or the Solution?
Recorded on Jan 24, 2013 (55min 7sec)
Stephen Cobb, Security Evangelist, ESET North America
What do you know about Mac security threats? Does having the Mac platform in your business help you keep your network and data secure, or does it increase your chances of being hacked or attacked? Explore these Mac security questions and ask your own during this webcast
5 Reasons why a 2009 Antivirus Solution Doesn't Protect you From 2013 Threats
Recorded on Jan 16, 2013 (56min 58sec)
Cameron Camp, Security Researcher at ESET
Changes in the threat landscape with a focus on how the virus?s and malware threats that have changed and how this impacts the AV tools for your business
Selecting an Endpoint Security Solution - Facing a New Threat Landscape
Recorded on Dec 12, 2012 (56min 6sec)
Charles Kolodgy, Reasearch VP, IDC
It wasn't that long ago that most threats came from "mass market" malware. However attackers are now attacking with custom malware...
How SMB's Can Make Security Policies Pay Off
Recorded on Nov 14, 2012 (56min 36sec)
Stephen Cobb, Security Evangelist at ESET
It wasn't that long ago that most threats came from "mass market" malware. However attackers are now attacking with custom malware...
What does Cross Platform Protection Mean Today?
Recorded on Oct 17, 2012 (40min 51sec)
Cameron Camp, Security Researcher at ESET
Do you have cross platform protection? What does cross platform protection mean today for your business ? What are all the platforms that you need to think about protecting and why? ESET Endpoint Antivirus software has cross platform protection for all of your endpoints. ESET Endpoint Antivirus Eliminates PC and Mac Viruses, too
The Changing SMB Threat Landscape
Recorded on Oct 03, 2012 (57min 37sec)
Stephen Cobb, Security Evangelist at ESET North America
What is the best practice against cyberthreats and information security for small and medium-sized businesses (SMB's)? For SMB's information security is sometimes seen as a headache and a "grudge purchase", but SMB's are facing the same threat landscape as larger organizations - but without their budgets. What do you need to know about information security in today's threat landscape?
Why do ESET Partners recommend ESET Products?
Recorded on Sep 26, 2012 (50min 12sec)
Chris Risenhoover, VP Sales and Marketing, GalaxyTech Int'l
Learn why ESET products are recommended by their partners. ?Why recommend ESET? To get more bang for the buck, and because these days you don?t want to spend a lot of time on antivirus...
Endpoint Security Analysis:  What is driving the endpoint market now and forecas
Recorded on Sep 19, 2012 (52min 5sec)
Martha Vazquez,Industry Analyst, Network Security- Information & Communication Technologies, Frost & Sullivan
Endpoint security remains a key component necessary for thwarting against malware threats and attacks to end users. It is inevitable that the threat landscape is changing as more various types of endpoints are introduced into the market...
The Importance of Security Training and Education
Recorded on Sep 05, 2012 (62min 43sec)
Stephen Cobb, Security Evangelist at ESET
Educating employees about computer security is a vital part of your defense against cybercriminals and unethical competitors. Yet security training and education is often neglected, sometimes at great cost...
Antivirus Software:  Understand Detection Methods Before You Buy
Recorded on Aug 15, 2012 (58min 27sec)
Brandon Stigers, Director of Learning and Development, ESET and Stephen Cobb, Security Evangelist, ESET
Before you choose an antiviruous solution its important to understand how it goes about detecting malware in the first place. Join us as we discuss: - Security in the news - Modern threat categories and attack vectors - Endpoint risks, infection methods, payloads - Detection with signatures and hueristics - Zero Day Risk - Technologies that protect removable storage devices - Best practices
What Happens in an Attack?
Recorded on Jul 23, 2012 (59min 21sec)
Pierre-Marc Bureau, Malware Researcher at ESET
Most Internet users have been in contact with malicious software (malware) and most of us understand these threats should be avoided. Far less people understand what happens when a computer is attacked, more precisely, what are the objectives of the attackers and how these attacks could affect your business? We will present various attacks that have been recently witnessed which illustrate the different motivations of malware creators and operators...
What Keeps you up at Night as a Small or Medium Business IT manager?
Recorded on Jul 11, 2012 (43min 13sec)
David Ditzenberger ? Vice President, Savitz, Jeff Savitz ? Founder and CEO, Savitz, and Don Lewis, Product Marketing, ESET
What areas of security risks concern you the most? What possible damages from a cybercrime attack keep you up at night? What are the most important aspects of endpoint security? Learn what concerns IT managers have when it comes to the security of your business and how to get a peace of mind by getting the right security solution for you. Join Savitz Research Insights Team as they present their findings on the latest cybersecurity issues facing the SMB IT Manager
Announcing ESET Endpoint Solutions
Recorded on Jun 27, 2012 (46min 46sec)
Brandon Stigers, Director of Learning Development, ESET, ESET Product Marketing Team
Learn how ESET?s next generation of endpoint security products make protecting and controlling your business systems easier and more cost-effective. Built using the award-winning ESET NOD32® technology...
Social Media and Social Engineering Threats: Defending Your Users and Network
Recorded on Jun 21, 2012 (47min 28sec)
Stephen Cobb, Security Evangelist, ESET
Just when you thought your company was getting a handle on phishing and malware attacks via regular email and media, powerful new mobile devices and web 2.0 apps are providing new attack vectors for cybercriminals...
10 Ways to Tell If It's Time to Change Your Anti-Virus Software
Recorded on Jun 06, 2012 (58min 37sec)
Pete Streips, President, Network Security Group, ESET Research Team
If you are like most small businesses you have probably experienced issues with anti-malware software in the past. Do any of the issues below ring true when thinking about your current antivirus solution? ? When it performs scans it slows our systems to a crawl ? It creates too many alerts on files that aren?t malicious ? It is hard to manage across all our platforms and devices ? Our users want to turn it off because it is so annoying If so, join Peter Streips, Network Security Group (ESET?s Gold Partner) President and ESET researchers for a panel discussion and learn why it?s time to change your antivirus solution
Truth or Spin in AV Testing?
Recorded on May 30, 2012 (58min 37sec)
Jon Friedman, Tech Target Aryeh Goretsky, ESET,Righard Zwienenberg , ESET
Third-party tests can be extremely caluable for evaluating anti-malware products. In-fact, more tests are available than most people realize, covering not only detection rates and scanning speeds, but also factors like number of false positives and ability to block zero-day attacks...
RSA Testimonial 7
Recorded on May 29, 2012 (0min 48sec)
Wasif Khan, Core IT Group
RSA Testimonial 7
RSA Video Testimonial 6
Recorded on May 23, 2012 (1min 2sec)
Mohit Kullar, Engineering Lab Manager, Narus, Inc.
RSA Video Testimonial 6
RSA Testimonial 5
Recorded on May 15, 2012 (0min 33sec)
Val Gonzalez, Sr. IT Analyst, AZ Public Service
RSA Testimonial 5
RSA Video Testimonial 4
Recorded on May 02, 2012 (0min 36sec)
Mike Fung, Senior Knowledge Engineer, Red Seal Networks
RSA Video Testimonial 4
RSA Testimonial 3
Recorded on Apr 24, 2012 (0min 49sec)
Anonymous, IT Consultant
RSA Testimonial 3
RSA Video Testimonial 2
Recorded on Apr 18, 2012 (0min 41sec)
Dr. David Hotchkiss, CTO, City College SF
RSA Video Testimonial 2
RSA Testimonial 1
Recorded on Apr 12, 2012 (0min 27sec)
Justin Rumph, IT project manager, La Targe
See what customers say about ESET solutions at RSA
Are SMB?s targets for Cyber Criminals?
Recorded on Apr 11, 2012 (59min 32sec)
Charles Kolodgy, IDC Security Products Research Vice President
The Internet is a force multiplier, allowing businesses of all sizes to reach more customers, better service those customers and ultimately be more competitive. By utilizing the Internet, many small and medium businesses can be much more successful...
What are the challenges of antimalware testing organizations?
Recorded on Mar 28, 2012 (3min 28sec)
Lysa Myers, Westcoast Labs; Simon Edwards, Dennis Technology Labs; John Hawes, Virus Bulliten, Benny Czarny, OPSWAT
Antimalware Updates from the Experts: What are the biggest challenges, if any, antimalware testing organizations are facing nowadays?
Creating and Managing a Cyber Security Policy: Tips for the SMB
Recorded on Mar 21, 2012 (55min 43sec)
Stephen Cobb, Security Evangelist, ESET
Join Stephen Cobb, Security Evangelist at ESET to discover how: - Vunerable SMB's like yours really are - You can establish a cyber security policy for your organization - You can defend your company-and it's employees partners and customers against online attacks Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyber attacks
What is a real-time/dynamic detection test?
Recorded on Mar 21, 2012 (4min 13sec)
Lysa Myers, Westcoast Labs; Andreas Marx, AV-Test; Peter Stelzhammer, AV-Comparatives; Simon Edwards, Dennis Technology Lab
Antimalware Updates from the Experts: We see that most of the testers are now concentrating on real-time/dynamic testing of products? Can you tell us what it means and why it is important?
ESET at RSA
Recorded on Mar 14, 2012 (6min 33sec)
Stephen Cobb
An interview with Stephen Cobb
How important are proactive detection test results?
Recorded on Mar 14, 2012 (1min 58sec)
John Hawes, Virus Bulliten; Andreas Marx, AV-Test; Aryeh Goretsky, ESET
Antimalware Updates from the Experts: How important are proactive detection test results?
What is the most important: Detection, Perfomance, or Features?
Recorded on Mar 07, 2012 (4min 6sec)
Simon Edwards, Dennis Technology Labs; Andy Hayter, ICSA Labs
Antimalware Updates from the Experts: Vendors are adding more and more features to their security products, can you tell us what in your opinion is most important and why? Is it detection rate, performance or number of features in the product?
Do you see improvement in detection rates of antimalware products?
Recorded on Feb 29, 2012 (2min)
Simon Edwards, Dennis Technology Labs; Andreas Marx, AV/Test
Antimalware Updates from the Experts: In terms of detection rates, would you say antimalware products improved over time?
What are the differentiators between anti-malware products?
Recorded on Feb 22, 2012 (2min 29sec)
Andreas Marx, AB-Test; Andy Hayter, ICSA Lab; Aryeh Goretsky, ESET
Antimalware Updates from the Experts: From your perspective, what are the biggest differentiators between individual antimalware products?
The most important attributes when choosing security software
Recorded on Feb 15, 2012 (7min 7sec)
Lysa Myers, Westcoast Labs; Aryeh Gortesky, ESET; Benny Czarny, OPSWAT
Antimalware Updates from the Experts: Currently there are over 45 endpoint security competitors in the industry so it might get challenging to choose the right product to secure the network. When deciding about security software, what are the most important attributes that should be looked at for a business? Do you think the attributes are different for an enterprise vs...
Security at the Sharp End: Strategies to Repel Relentless Attackers
Recorded on Feb 08, 2012 (59min 27sec)
Stephen Cobb, CISSP, Security Evangelist,
Targeting of corporate and consumer data and devices by criminals and rogue states is well-funded and likely to persist for some time. Hardened operating systems, firewalls, IDS, and secure application coding are leading attackers to target endpoints, defined as people with devices, not devices alone...
What is the future for Endpoint Security Products?
Recorded on Feb 08, 2012 (4min 31sec)
Simon Edwards, Dennic Technology Labs; Andreas Marx, AV-Test; Stephen Cobb, ESET
Antimalware Updates from the Experts: Endpoint security products evolved from signature based back in 1980-2000 through HIPS, web reputation, device control to cloud computing and SaaS. What do you think is next?
What are the biggest drivers of security market growth?
Recorded on Feb 01, 2012 (3min 27sec)
various
Antimalware Updates from the Experts: Security market revenue was $5.6 billion in 2010 and is expected to double in 2017...
What is the current state of the antimalware industry?
Recorded on Jan 25, 2012 (3min 44sec)
John Hawes, Virus Bulletin; Lysa Myers, West Coast Labs; Andy Hayter, ICSA Labs, Aryeh Gortesky, ESET; Andreas Marx, AV-Test
Antimalware Updates from the Experts: What would you say the current state of antimalware industry is? How much do you think antimalware products evolved compared to degree of cybercrime evolution?
IT's Role in a Changing Threat Landscape
Recorded on Jan 18, 2012 (61min 25sec)
Forrester Analyst, Chenxi Wang, Ph.D. and ESET's Research team
How can IT security adapt to fight constantly mutating cyber threats? As the adversarial relationship between information security professionals and malicious cyberactors intensifies, the security gap between new attack methods and traditional controls will grow in favor of the attackers. Cyberattacks have become multidimensional in their complexity and sophistication...
Surviving the Mobile Device Invasion ? When Mobile Tries to Connect to IT
Recorded on Dec 07, 2011 (49min 25sec)
Cameron Camp, ESET
With the deluge of new mobile smartphones like Android, iPhone, and others hitting the streets, there are thousands of new attack vectors against a company's IT infrastructure that create potential security nightmares. When users download apps by the droves and then want to connect to core critical infrastructure, how should IT handle it? While there is a drive for increased off-hours and/or offsite productivity using mobiles, can we stomach the changes that are coming, and can our organizations remain (or become) secure?
Antivirus Software: Understand the Detection Methods Before You Buy
Recorded on Nov 15, 2011 (55min 2sec)
Sean Michael Kerner, Sr. Editor, InternetNews.com & Brandon Stigers, Director of Learning & Development, ESET
Before you choose an antivirus solution it is important to understand how it goes about detecting malware in the first place. Join us as we discuss: - Security in the news - Modern threat categories and attack vectors - Endpoint risks, infection methods, payloads - Detection with signatures and heuristics - Zero day risk - Technologies that protect removable storage devices - Best practices
Step 3 - The Impact of SMB Security on Our Nation's Critical Infrastructure (CI)
Recorded on Oct 26, 2011 (47min 44sec)
Sempra Energy, Wells Fargo Insurance, U.S. National Institute of Standards and Technology
SMB Cybersecurity Challenge - Webcast Series Part 4 Join a blue-ribbon panel of experts from government and business to learn: - How U.S...
Step 2 - Securing Your Network:Safeguarding Business Data-at Work & at Home
Recorded on Oct 19, 2011 (55min 14sec)
Mark Culp, Supervising Special Agent, FBI; Glenn E. Jacobs, Cybersecurity Expert, Author & Consultant
SMB Cybersecurity Challenge - Webcast Series Part 3 Join FBI Supervising Special Agent, Mark Culp, and Author Glenn Jacobs, as they provide your business: >> Tips and best practices to prevent an attack from occurring >> Important steps to take when a cyber break-in has been discovered >> How to bring perpetrators to justice and recoup your losses When it comes to being a victim of cybercrime, size does matter: âThe sting of a cybercrime is not felt equally across the board. A small company may NOT be able to survive even one significant cyberattack...
Step 1 -  Creating and Managing a Cybersecurity Policy: Tips for the SMB
Recorded on Oct 12, 2011 (56min 33sec)
Stephen Cobb, Security Evangelist, ESET
SMB Cybersecurity Challenge - Webcast Series Part 2 Join Stephen Cobb, Security Evangelist at ESET to discover how: - Vulnerable SMBs like yours really are - You can establish a cybersecurity policy for your organization - You can to defend your company ? and its employees, partners and customers ? against online attacks. Many small and medium-size businesses (SMB) operate under the mistaken impression that their size, or the minimal security steps that they have already taken, will protect them from cyberattacks...
Escalating Cyberthreats: Simple Steps to Secure Your SMB
Recorded on Oct 05, 2011 (48min 51sec)
Liz Fraumann, Securing Our eCity; Naresh Lachmandas, CIO, General Atomics
SMB Cybersecurity Challenge - Webcast Series Part 1 Cybercrooks have changed the game. Lone hackers craving attention have been replaced by international criminal networks with vast resources and patience, and to them, your small business looks like easy prey...
How to Ensure Real-Time Threat Detection
Recorded on Sep 14, 2011 (58min 11sec)
Frost & Sullivan Analyst along with ESET Researcher
As part of the Threat Management Summit ESET along with Frost & Sullivan will discuss Real-time Threat Detection. Frost & Sullivan: Making the Case for Endpoint Security The headline grabbing attacks against firms like RSA, Epsilon, Lockheed Martin, and others have brought a great deal of attention to data protection and tools to protect the data itself...
Protecting Your SMB: Selecting the Right Antivirus & Internet Security Solution
Recorded on Aug 24, 2011 (49min 56sec)
ESET Team - Product Marketing and Systems Engineers
Get the information you need to make the right decision through this presentation followed by a 30 minute panel available for your questions about ESET products, services and solutions. >> Effectiveness/Coverage: What threats does the solution eliminate? Does the solution address the immediate concerns of zero-day attacks while maintaining a legacy database to avoid the re-introduction of known viruses? >> Performance: Does the solution consume resources that impact your users in order to meet fast scanning requirements or operate in the background to minimize the impact on your users...
Mobile Security: Trends, Threats and Solutions for Your Business
Recorded on Jul 13, 2011 (50min 46sec)
ESET & Nitin Bhas, Research Analyst, Juniper Research
Join ESET and Nitin Bhas, Research Analyst at Juniper Research as we share research and data to help your organization address the concerns and security issues with mobile devices. These topics include: Mobile Device Security: * Drivers and Trends * IT Issues and Threats * Solutions and Technologies * Latest in Juniper Research
Protecting Your Multi-Platform Network:  The New Wave of Attacks
Recorded on Jun 16, 2011 (51min 58sec)
ICSA Labs, Anti-Malcode Program Manager - Andy Hayter
The proliferation of multiple type?s of devices across businesses offers many benefits; desktop computers running both Windows or Mac OSX, tablets and mobile phones. The advantages and productivity are obvious...
Key Considerations for Selecting Endpoint Security Solutions
Recorded on May 18, 2011 (59min 55sec)
Charles J. Kolodgy, IDC Analyst: Research VP of Security Products & Brandon Stigers, Training & Development, ESET
Not long ago there were those who were complaining that there was a monoculture in computing. Too many people were using Windows operating systems and that was a primary facilitator for Windows based attacks...
VIDEO: Global malware thrives on demise of global terrorist
Recorded on May 12, 2011 (1min 36sec)
Aryeh Goretsky
ESET Distinguished Researcher Aryeh Goretsky explains how black hat search engine optimization is used to generate favorable placement in search results for videos of Osama bin Laden's death in a video captured by ESET's Virus Lab
The New Threatscape: What Security Managers Need to Know
Recorded on Apr 28, 2011 (58min 16sec)
Forrester, Vice President - Jonathan Penn | ESET, Director of Technical Education - Randy Abrams
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control...