Safeguard your corporate and roaming employee endpoints and mobile devices.
Unleash the power of your physical and virtual desktops and secure any endpoint with the industry’s most reliable protection, while reducing the impact on your endpoint resources. Deploy protection as an on-premise or hosted solution, and add encryption capabilities to your endpoints.
OfficeScan lets you maximise your security and performance on physical and virtual desktops. Get the industry’s strongest threat and data protection, built into a single endpoint agent, deployed and managed together from a single console. Combine the power of integrated data and threat protection with the cost benefits of faster scans and virtualisation for true next-generation security.
Worry-Free Business Security is a hosted security solution that provides protection anytime and anywhere for your business data. It secures PCs, laptops, servers, and other Windows-based devices such as point of sale machines and tablets. Continuous cloud based, updates block new threats faster, before they reach your computers.
Endpoint Encryption fully encrypts your data at rest on desktops, laptops, files, folders and removable media such as CDs, DVDs, and USB drives. Endpoint encryption protects your data if your device is lost or stolen, and prevents unauthorised access and data breach.
Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)