McAfee  
 
  Register today for upcoming webinars
       
     
 

Watch the replays of our McAfee product webinars and in 45 minutes you'll learn how easy it is to protect your organization from security threats.

Search the webinar archive

Date

Product Type

Language


  



September 2014

Settembre 2014

Septiembre 2014

Septembre 2014

September 2014

A well connected sandbox: Why it matters
Advanced malware analysis solutions are gaining traction as viable options for enhancing current security defenses. The effectiveness of these solutions is determined not only by examination technologies and features but by the level of integration between existing security sensors – from network to endpoint - and the sandbox or analysis solution.

Join us and learn:
  • How McAfee Advanced Threat Defense provides accurate reputation classification with innovative malware deconstruction capabilities
  • The benefits of tight integration between all security components in the environment – from endpoint to network
  • How McAfee Threat Intelligence Exchange and McAfee Advanced Threat Defense work collaboratively to deliver automated, adaptive protection from emerging threats

View now >>

Recording from Wednesday, September 10th 2014, 2pm BST (3pm CET)

August 2014

Agosto 2014

Agosto 2014

Août 2014

August 2014

Defense In Depth – McAfee Web Gateway + Advanced Threat Defense
Modern malware authors use new techniques to hide malware and determine if it is running in a virtualized environment in an attempt to slip past even the most sophisticated malware defences. As a result, organizations are at greater risk than ever of being victimized by a breach, with resulting public embarrassment and remediation costs. There are a number of technologies available to protect themselves, including firewall, intrusion prevention, secure web gateway, and end-point protection.

Join this webinar on Defence in Depth to:

  • Learn details of how a sophisticated attack works
  • Examine how modern malware attempts to evade detection
  • How McAfee Security Management Center can offer you a single user interface for simplified management
  • Learn how McAfee Web Gateway and Advanced Threat Defence work together to provide a coordinated defence that delivers protection without compromising performance

View now >>

Recording from Wednesday, August 27th 2014, 2pm BST (3pm CET)

McAfee Augmented VPN - Intelligent alternative for secure enterprise networking
Securing communication between enterprise office sites in a flexible yet cost-effective manner is a challenge. One common option is to use MPLS based VPN services for site-to-site connectivity. However, many enterprise customers have preferred McAfee Augmented VPN, which is a cost-efficient, flexible and resilient option for MPLS.

McAfee Next Generation Firewall inherently enables making use of the Augmented VPNs.
Join this webinar to learn:

  • How combining the links into the augmented VPN removes the dependency of MPLS circuits or any other networking technology
  • How combining links can help you consolidate bandwith and prioritize the network flow
  • How McAfee Security Management Center can offer you a single user interface for simplified management
  • How Augumented VPN by McAfee helps you reduce total cost of ownership

View now >>

Recording from Wednesday, August 20th 2014, 2pm BST (3pm CET)

How to Protect Internal Web Sites against Attack
Do you have an internal web site that outsiders need to access? Are you concerned that a malicious actor may be able to upload contaminated content to your site? What are the best available options for allowing external users to access sites without compromising security?

Join this webinar on How to protect internal web sites against attack as:

  • Understand the difference between an attack due to an external download and an internal upload
  • What’s the business case for protecting an internal site against external attack?
  • What are the deployment options for protecting an internal site?
  • What are the differences between a reverse proxy and an ICAP client?
If you’re allowing external users to access an internal web site, you need to understand how to protect your site against malicious content being uploaded. This session will give you the information to design a security architecture that will provide enterprise-quality security for internal web sites.

View now >>

Recording from Wednesday, August 13th 2014, 2pm BST (3pm CET)

Keep Your Data Safe with McAfee Complete Data Protection Suites
How do you protect your data? Sensitive data is constantly at risk of loss, theft, and exposure. Many times, the data simply walks right out the front door on a laptop or USB device. Companies that suffer such a data loss risk serious consequences, including regulatory penalties, public disclosure, brand damage, customer distrust, and financial losses.

Join Pat Correia, Sr. Product Marketing Manage and Stuart Bayliss, Group Product Manager for this webinar to learn:

  • How to get the most business value out for their Intel based endpoints with McAfee Data Protection solutions
  • How to lower your total cost of ownership and extend the reach with ePO Deep Command
  • An overview of McAfee Complete Data Protection Suites, featuring Endpoint Encryption, Management of Native Encryption
This webinar gives you a great overview of the McAfee Data Protection solutions and how to protect your data stored on your endpoints or on portable media. It’s suitable for anyone who would like to learn more about Data protection.

View now >>

Recording from Wednesday, August 6th 2014, 2pm BST (3pm CET)

July 2014

Luglio 2014

Julio 2014

Juillet 2014

Juli 2014

Improve Security Management Efficiency with Centralized Management
Your network security team must know and manage what is happening on your network at all times. Running back and forth to different devices doesn’t work even if you can log in remotely. It takes too much time and is not coordinated. You have to rely on a centralized management system.

Join McAfee as they shows you how the McAfee NGFW acts as the core of your network security, centralizing the monitor, managing and reporting across diverse virtual, physical and third-party devices. He will show you how a single console view can give your team real-time visualization of network operations, improving response time for recognition and remediation.

View now >>

Recording from Wednesday, July 30th 2014, 2pm BST (3pm CET)

McAfee Advanced Detection for Zero-Day Threats
Malware is becoming more complicated, covert, and clever, and your threat defense needs to be able to respond. McAfee Advanced Threat Defense enhances McAfee network and endpoint solutions by detecting today’s stealthy, zero-day threats with a unique combination of advanced technologies including sandboxing and in-depth static code analysis.

Join us and learn:

  • How McAfee Advanced Threat Defense identifies stealthy malware
  • How real-time threat information sharing improves security
  • Key components of a successful advanced malware protection strategy

View now >>

Recording from Wednesday, July 23rd 2014, 2pm BST (3pm CET)

McAfee Network Security Platform and Snort: Better together.
With malware and crafty intrusion behaviors on the rise any tool that provides extended visibility and control over the network is a valuable one. Snort, one of the most widely used security visibility tools, has been an important open source tool to help augment a solid security in depth strategy. By combining snort signatures with McAfee’s Network Security Platform (IPS), existing security strategies and expertise can be augmented. Hear how McAfee’s IPS can complement existing snort signature environments in new and exciting ways, all the while diminishing information overload and false positive chasing.

Join this webinar to:

  • Learn how to leverage snort signatures on McAfee’s IPS.
  • Hear how security teams can blend snort and McAfee’s IPS to become efficient and responsive.
  • See how McAfee can help minimize information overload and false positive chasing.
  • Learn how McAfee’s IPS can help can help drive security investigation in new and exciting ways.

View now >>

Recording from Wednesday, July 16th 2014, 2pm BST (3pm CET)

Malware’s new camouflage
Advanced Evasion Techniques (AETs) work with Advanced Persistent Threats (APT) to disguise cyber-attacks in order to avoid detection and blocking by information security systems. AETs enable cyber criminals to deliver malicious content to a vulnerable system without detection that would normally stop the threat. Network security systems are ineffective against AETs in the same way a stealth fighter can attack without detection by radar or other similar defensive systems.

Join the webinar on AET to learn about:

  • How AETs avoid detection by information security systems.
  • How can AETs work in the same way as a stealth fighter.
  • What are AETs and APTs?

View now >>

Recording from Wednesday, July 9th 2014, 2pm BST (3pm CET)

Creating a New Era for Next Generation Firewalls
Today network security should be considered as a broader concept where security solutions are able to communicate and share information with each other.

Join this webinar on Creating a new era for Next Generation Firewalls as:

  • You will hear how and why the Next Generation Firewalls shall evolve with the current and future security threats
  • You will learn how the Next Generation Firewalls shall be part of a holistic network security solution and the benefits of it

McAfee, part of Intel Security, provides an intelligent Next Generation Firewall, which is and essential part of the Security Connected framework. It enables you to build a complete, yet flexible network security, which maximises your business security and continuity today and in the future.

View now >>

Recording from Wednesday, July 2nd 2014, 2pm BST (3pm CET)

June 2014

Giugno 2014

Junio 2014

Juin 2014

Juni 2013

McAfee Virtual Desktop Infrastructures
VDI (Virtual Desktop Infrastructure) is a growing trend and is one of the top priorities of CIOs. How can customers secure their workloads for their virtual infrastructures such that virtual desktops are protected without impacting the user experience such as desired performance?

This is where McAfee Security Suite for VDI comes in to:

  • provide VDI customers with the set of security products that protect their VDI environment
  • does so without having adverse performance impact to the VDI environment
  • helps customers attain the desired server density

Hosted virtual desktops where the application and operating system processing and even profile data is streamed from a centralized location within the data center (VDI) has deep performance issues when anti-virus scanning is not optimized for this type of virtual endpoint delivery. Find out how McAfee Security Suite for VDI protects virtual desktop while minimizing performance impacts.

View now >>

Recording from Wednesday, June 18th 2014, 2pm BST (3pm CET)


 May 2014

 Maggio 2014

 Mayo 2014

 Mai 2014

Anatomy of an Attack – How to defend against a multi-vector attack
Recently, we’ve seen the emergence of multi-vector attacks, such as the widely reported Target breach. Multi-vector attacks employ multiple technologies, deployed in multiple stages, to penetrate an organization’s defences. For example, a phishing email can result in a malware download which, in turn, can collect and transfer credit card data to an external server.

Join this webinar on Anatomy of an Attack as:

  • You will learn details of how a multi-vector attack works
  • Examine the vulnerabilities which each stage of the attack is targeting
  • Learn how to protect each stage in a coordinated defence

This session is a must-see for any IT or security professional concerned with protecting an organization against the type of sophisticated, multi-vector attack which resulted in the breach of more than 40 million credit card numbers.

View now >>

Recording from Wednesday, May 28th 2014, 2pm BST (3pm CET)

Verschleierte Angriffe erkennen und bekämpfen

McAfee bietet einmaligen und umfassenden Schutz auf allen Protokollen und Netzwerkebenen selbst vor verschleierten Angriffen, die unbemerkt Schadcodes in Netzwerke einschleusen. Erfahren Sie im Rahmen dieser Webcast-Aufzeichnung, wie Sie die Bedrohung Ihres Netzwerks durch AET’s erkennen und mit welchen Lösungen Sie diesen verschleierten Angriffen begegnen können.

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 23. Mai 2014

A Top 10 checklist to determine endpoint health
You have ePO deployed, endpoints are running current software, and signatures are being applied – what next? How can I tell how well my desktops, laptops and servers are protected? What should I be checking, and how can ePO help me do this?

Join this webinar on Endpoint Security as we:

  • Examine the top 10 checks that reveal if your endpoint environment is adequately protected
  • Use custom queries and reports to indicate if all is ok
  • Highlight indicators of compromise that should be investigated
  • Discuss what to focus on when improving your security posture

There are many ways of protecting an environment, and many factor to consider when providing that protection. It is easy to focus on a single area, and disregard capabilities that can enhance overall endpoint security. Similarly, it is easy to miss an indicator that all is not well, when viewing many events. This session concentrates on the essentials – what really should be done by every customer to provide an adequate security baseline.

View now >>

Recording from Wednesday, May 21st 2014, 2pm BST (3pm CET)

New Features of Real Time for McAfee ePolicy Orchestrator
In today’s information-driven enterprises, time is not on the side of the IT security manager. When complete, expedient knowledge of the IT landscape can mean the difference between risk mitigation and catastrophe, seconds count.

Join this webinar on McAfee Real Time for ePolicy Orchestrator as:

  • Learn what problems it solves
  • Get an understanding of typical use cases
  • See how it works under the hood
  • Learn the new features of Real Time for ePO
  • Understand how to get it

You will also get a sneak preview into where McAfee is going with this technology, and why your customers are so excited to get Real Time for ePO.

View now >>

Recording from Wednesday, May 14th 2014, 2pm BST (3pm CET)

What's New in latest McAfee Data Loss Prevention
In an increasingly connected world, your data gets around - often times without your knowledge. The good news? McAfee Data Loss Prevention delivers the highest levels of protection for sensitive data, while greatly reducing the cost and complexity of safeguarding business-critical information.

Join the webinar on DLP and learn about:

  • The new cool features in the latest DLP release.
  • How to stay ahead of threats without guesswork or trial and error.
  • Use cases on leveraging the synergy between the different McAfee Data Protection technologies.

Don't miss out the opportunity to hear from data protection experts on how to protect your data in the modern organization!

View now >>

Recording from Wednesday, May 7th 2014, 2pm BST (3pm CET)


 April 2014


 April 2014

 Aprile 2014

 Abril 2014

 Avril 2014

An introduction to McAfee Deep Command
Why manage beyond the operating system? How can we improve responsiveness and enhance security? How can we lower the cost of managing endpoint security?

Join this webinar on Endpoint Security as we:

  • Understand what AMT-enabled hardware offers
  • Hear how AMT hardware can improve our ability to manage an endpoint
  • Highlight important use cases that are enabled when management extends beyond the operating system
  • Discuss how ePO can be used to easily configure AMT

Endpoint management typically relies on an agent operating within Windows. Whilst this is convenient if the endpoint is powered up, it provides no management when switched off, or if the endpoint is unable to boot the operating system. Deep Command, using AMT hardware can extend management beyond the operating system, to allow endpoints to be powered on securely, to run a KVM session before the Operating System has loaded, to boot from the Network, and enables many other capabilities.

View now >>

Recording from Wednesday, April 30th 2014, 2pm BST (3pm CET)

Disrupting Advanced Attacks with Email, Web, and DLP Security
This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

Join this webinar on Data Protection and learn about:

  • The key features of Data Protection and how it can provide you with the security you need
  • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
  • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
  • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users

Don’t miss this webinar! Pat and Jason will explain what you need to know on how the synergy between Intel® vPro™ and McAfee Data Protection technologies can help your end users be more productive and reduce your overall IT TCO.

View now >>

Recording from Wednesday, April 23rd 2014, 2pm BST (3pm CET)

An introduction to and demonstration of NextGen Endpoint
What is McAfee’s Next Generation endpoint solution? How can we reduce the performance impact whilst maintaining high security? How can we extend detection beyond signatures?

Join this webinar on Endpoint Security as we:

  • View the NextGen Endpoint client
  • Discuss the new architecture behind NextGen Endpoint
  • Highlight important features that distinguish it from other endpoint solutions
  • Walk through a live demonstration

The endpoint has been redefined; the motivation behind attacks has changed; the threat landscape has evolved. Traditional signature-based anti-virus protection is 20 year old technology. Learn how NextGen Endpoint provides capabilities beyond signatures to protect a modern endpoint. Learn how NextGen Endpoint Security from McAfee changes the way endpoints will be protected going forward.

View now >>

Recording from Wednesday, April 9th 2014, 2pm BST (3pm CET)

McAfee Advanced IPS
What makes an IPS advanced? Companies often claim to have the "next generation" product or "advanced" features, but what about the McAfee Network Security Platform makes it advanced?

Join this webinar on Advanced IPS as:

  • After attending this webinar you'll better understand the innovative features that McAfee has created to protect it's customers from the most sophisticated attacks
  • I'll also walk through some of the advanced features and how they are implemented McAfee customers can better protect their organizations
  • Learn the importance of signature based detection and the different ways the McAfee Network Security Platform (IPS) is implementing signature-less detection in an industry leader

During our time I’ll walk though the implementation of features that turn a great IPS into an Advanced IPS. We’ll also cover the features that every IPS should have to protect organizations from advanced attacks in today’s security landscape.

View now >>

Recording from Wednesday, April 2nd 2014, 2pm BST (3pm CET)


 March 2014

 Marzo 2014

 Marzo 2014

 Mars 2014


 März 2014

A guide to McAfee’s Signature-less IPS technologies
Today’s security challenges demand a unique perspective to protection. Zero-day attacks and customized malware are challenging the security industry in ways previously unimaginable.
With current security solution struggling to stay ahead, and the average IT organization inundated with volumes of security alerts, a new approach to security and network protection is needed.

Join this webinar to understand what Signature-less IPS inspection is and how it can benefit you:

  • What technologies McAfee uses for signature-less IPS inspection
  • How signature-less inspection is transforming IPS security
  • How McAfee’s IPS can increase your security posture against Advanced Malware

McAfee’s 7 signature-less inspection technologies provide the most comprehensive protection of any vendor on the market. Learn why signatures aren’t the only thing that is important when selecting a Next Generation IPS.

View now >>

Recording from Wednesday, March 12th 2014, 2pm GMT (3pm CET)

McAfee Complete Data Protection
Have you ever experienced or known someone who has lost a laptop or a USB drive that contained valuable company IP or customer data? Are you subject to compliance programs, either directly or through partnerships?

Join this webinar on Data Protection and learn about:

  • How easy it is to keep your data safe from attacks and theft
  • Encryption performance and why your end-users won’t even notice it’s working
  • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • How DLP Endpoint can help you protect IP and ensure regulatory compliance
  • Use cases on leveraging the synergy between Intel vPro and McAfee Data Protection technologies
  • New Mac OS support

Don't miss out on the opportunity to hear from data protection experts on how to protect your data while keeping IT costs in check and your end-users happy!

View now >>

Recording from Wednesday, March 5th 2014, 2pm GMT (3pm CET)


 February 2014

 Febbraio 2014

 Febrero 2013

 Février 2014


 Februar 2014

Host to Virtual Machine, Cloud to Chip – comprehensive security in the Data Centre
Where are my Virtual Machines, what are they doing and how are they protected? How to secure the hypervisor? As the data centre has evolved, how have my security solutions changed to reflect this?

Join this webinar on Data Centre Security and find out:

  • What are some of the new challenges in securing a modern data centre?
  • How can I balance the needs of performance, flexibility and security?
  • Hear about how hardware features can be used to detect attacks to hypervisors?
  • What new technologies are available to secure a modern data centre?

The data centre has evolved massively to encompass a complex hybrid environment of virtual endpoints, servers and infrastructure, involving both public and private clouds. Before securing virtual machines, challenges now include locating these transient and often invisible systems and securing the hosts upon which these virtual machines are running. Learn how to evolve your approach to protecting the Data Centre using McAfee solutions.

View now >>

Recording from Wednesday, February 26th 2014, 2pm GMT (3pm CET)

Shadow IT: The Hidden Security Threat Impacting Your Business
Using cloud-based applications has become the norm for most of us. But what happens when employees sign up for cloud applications without the IT department involved? This creates what we refer to as “Shadow IT”, a growing trend that can open up serious holes in a business’s security posture.

McAfee recently conducted a research study, led by consulting firm Frost & Sullivan, which discovered that Shadow IT is more widespread than previously thought. We found that over 80% of employees worldwide go around IT to deploy their own applications. And, employees who bypass IT expose the organization to increased risk. In fact, 15% of employees reported experiencing a security, access, or liability event related to cloud applications, including unauthorized access by malicious actors, loss of sensitive data, and malware infection while using the applications.

Watch this webinar on Shadow IT to learn:

  • How extensive is the problem of Shadow IT
  • The most popular Shadow IT programs
  • The security risks Shadow IT creates for organizations
  • Best practices on how to manage the risk opened up by Shadow IT

They say you can’t manage what you don’t know about. Find out the truth about Shadow IT within your organization and how you can effectively regain control over the security of your network.

View now >>

Recording from Wednesday, February 19th 2014, 2pm GMT (3pm CET)

Security and Compliance for Business-Critical Servers
Are you in the midst of a major shift as the boundaries between physical, virtual, and public and private clouds are blurring? Organizations must transform and optimize their server infrastructure as the next-generation data center will require a new security approach to keep their systems and critical data secure.

Join this webinar to learn more about how the new McAfee Server Security Suites and our McAfee Data Center Database Security Suite can help secure and protect your data while building efficient compliance practices around business-critical servers.

View now >>

Recording from Wednesday, February 12th 2014, 2pm GMT (3pm CET)


 January 2014

 Gennaio 2014

 Enero 2013

 Janvier 2014


 Januar 2014

Advanced Malware; Find, Freeze, Fix
Most advanced malware solutions available today focus on identifying or discovering malware. While malware discovery is required, it is only one piece of a solution needed for addressing advanced malware. Organizations need to be prepared to deal with the full range of issues that accompany an attack and potential breach, from detection and blocking to visibility and triage.

Join McAfee for insight into today’s advanced threats and what you can do to improve your security posture. This webcast covers:
  • The state of advanced malware
  • Why organizations need to plan beyond avoidance
  • Key components of a successful advanced malware protection strategy

View now >>

Recording from Wednesday, January 29nd 2014, 2pm GMT (3pm CET)

NSP 8.0 – Bringing Endpoint Intelligence to the Network
Next generation firewalls use application visibility to make blocking decisions, but what protects you from malware that masquerades a “good application” to perform nefarious activities? Many of today’s advanced persistent threats are content to slowly gather information masquerading as acceptable network traffic, and if there is no known signature what’s to stop valuable data from leaving your network before it’s too late?

Join this webinar on Endpoint Intelligence in the Network and learn:
  • What features are new to the Networks Security Platform 8.0
  • How to leverage security measures you may already have to better protect yourself from Advanced Persistent Threats and Zero-day attacks that are often missed by today’s security tools
  • How products like Advanced Threat Defence and Endpoint Intelligence Agent are closing the gap on zero-day detection

View now >>

Recording from Wednesday, January 22nd 2014, 2pm GMT (3pm CET)

Application Control for Desktop's Best Practice
How can whitelisting supplement blacklisting technologies? How do I implement this in a desktop environment? What is the best approach and what should be avoided?

Join this webinar on Application Control and:
  • See how observations can be used to supplement the administrators understanding of how change occurs
  • Learn how to build policy and ultimately enhance security of traditional desktops
  • Discuss deployment techniques and lessons learned from previous deployments

View now >>

Recording from Wednesday, January 8th 2014, 2pm GMT (3pm CET)


 December 2013

 Dicembre 2013

 Diciembre 2013

 Decembre 2013


 Dezember 2013

Real Time Advanced for ePO Launching
McAfee Real Time Advanced for ePolicy Orchestrator revolutionizes security systems management with rapid visibility into system data and immediate interventions. This powerful solution lets you use plain English within an ePO-based interface and workflow to find facts fast to exert control with confidence. From stalking worms and forbidden applications to large-scale remediation of noncompliance, Real Time Advanced empowers ePO administrators to proactively manage incident response, outbreaks, and compliance.

What does this mean to your customers?
  • Instant Queries: Query every computer in your enterprise and get the answers back within seconds to reduce audit and data collection bottlenecks and increase the number of events you can respond to
  • Instant Actions: Reduce costly incident remediation and software distribution timelines from hours to minutes
  • ePO Integration: Leverages the known and trusted ePO console and workflow – no new interface to learn or headcount to add
  • Plain English: Use a Google-like natural language interface to issue queries—no scripting or special expertise required—permitting prompt data access for everyone, including auditors and novice administrators
  • Simple Peer-to-Peer Infrastructure: Install a single server and expedite time-sensitive processes across globally distributed networks and large organizations
  • Enterprise Ready: Leverage features critical to security and large scale: FIPS 140-2 certified cryptography, rigorous management rights, support for hundreds of administrators and hundreds of thousands of managed assets

View now >>

Recording from Wednesday, December 11th 2013, 2pm GMT (3pm CET)

Advanced Malware: Detection, Protection and Remediation
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense – one that goes beyond just analysis to full protection and resolution.

Join this webinar on advanced malware to:
  • Understand why organizations are looking to expand detection and ultimately protection
  • Learn about McAfee’s newest advanced malware detection solution: Advanced Threat Defense
  • Discover how Advanced Threat Defense integrates with other McAfee solutions to freeze advanced threats and initiates fix actions

View now >>

Recording from Wednesday, December 4th 2013, 2pm GMT (3pm CET)

Advanced Threat Defense: Schutz vor gezielten Angriffen durch dynamische und statische Analyse
Referent: Marcus Viertel

Im Rahmen dieses Webcasts stellen wir Ihnen McAfee’s neue Advanced Threat Defense (ATD)-Lösung vor und zeigen, wie die Kombination von statischer und dynamischer Analyse-Methoden zusammen mit einer umfangreichen Integrationsarchitektur einen wesentlich verbesserten Schutz gegen fortgeschrittene Angriffe bieten kann.

Jetzt ansehen auf Deutsch >> >>

Dienstag, den 3. Dezember 2013 15.00 bis 15.45 Uhr


 November 2013

 Novembre 2013

 Noviembre 2013

 Novembre 2013

McAfee Complete Data Protection
Have you ever experienced or known someone who has lost a laptop or a USB drive that contained valuable company IP or customer data? Are you subject to compliance programs, either directly or through partnerships?

Join this webinar on Data Protection and learn about:
  • How easy it is to keep your data safe from attacks and theft
  • Encryption performance and why your end-users won’t even notice it’s working
  • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • How DLP Endpoint can help you protect IP and ensure regulatory compliance
  • Use cases on leveraging the synergy between Intel vPro and McAfee Data Protection technologies

Don't miss out on the opportunity to hear from data protection experts on how to protect your data while keeping IT costs in check and your end-users happy!

View now >>

Recording from Wednesday, November 27th 2013, 2pm GMT (3pm CET)

The McAfee Network Security Platform Combined With Intelligence at the Endpoint, Goes Beyond Layer 7
McAfee is continuing to pioneer a connected approach to security. Combining information at the endpoint with the information in the network gives administrators visibility beyond layer seven. The Network Security Platform along with the McAfee Endpoint Intelligent Agent allows administrators to quickly identify application behavior, identify applications as malicious or safe and take action with a few simple steps..

In our look at visibility beyond layer 7 we’ll explore:
  • How malware continues to penetrate networks?
  • What does it mean to go beyond layer 7?
  • What is the Endpoint Intelligent Agent and how does it work?
  • How does having an Endpoint Intelligent Agent on the Network Security Platform give you visibility into undetected malware?

View now >>

Recording from Wednesday, November 20th 2013, 2pm GMT (3pm CET)

Verborgene Bedrohungen entdecken und blockieren
Referent: Marcus Viertel

Erfahren Sie im Rahmen dieses Webcasts wie Sie verborgene Bedrohungen erkennen und blockieren können:

  • Stoppen Sie Zero-Day-Angriffe und andere Stealth-Malware mit Echtzeit-Verhaltensüberwachung von Kernelvorgängen sowie hardwareunterstützter Sicherheit.
  • Erkennen Sie Rootkits in Echtzeit, noch während sie versuchen, die Malware zu verbergen.
  • Blockieren und entfernen Sie Malware, bevor sie sich in Ihren Systemen verankert.

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 19. November 2013 15.00 bis 15.45 Uhr

How to Balance User Empowerment & Security Using Least Privilege
With targeted cyber-attacks rapidly growing in number and sophistication, your organization is faced with a seemingly impossible trade-off: should you optimize security at the expense of user productivity?

In today's enterprise, providing users and IT admins with the privileges they require to perform their roles without seriously impacting the security posture of your endpoints is incredibly challenging.

Join Mark Austin, CEO of Avecto (McAfee’s ‘Most Innovative Partner 2013’) on this live webinar as he shares expertise on how an effective privilege management strategy can prevent users and IT admins from accidentally or deliberately abusing their rights, avoiding high-profile security breaches whilst stopping malware in its tracks.

PwC CISO Lee Barnett complements Mark’s discussion, explaining how least privilege technology has enabled his organization to revolutionise the user experience for mobile, ‘digital native’ workers, without compromising the security of their systems.

3 Business Reasons to Attend:

  • Discover how to combat insider attacks with a least privilege approach on desktops and servers
  • Learn how to mitigate over 85% of targeted attacks with effective privilege management
  • Understand how least privilege can be fully managed through your existing McAfee ePO infrastructure

View now >>

Recording from Thursday, November 7th 2013, 2pm GMT (3pm CET)

Advanced Malware Detection and Intrusion Prevention Systems
Intrusion Prevention Systems have historically checked for known bad files and blocked any that were on a list. But what happens when the malicious files are a new threat? How do you block against unknown threats or Zero-day attacks?

In our look at Zero-day attacks and traditional IPS devices we’ll explore:
  • What is Zero-day malware, why is it bad, and what are they after?
  • IPS detection rates and throughput numbers
  • Why traditional signature-based detection isn’t enough
  • Why a layered or defense in depth approach is important
  • How the McAfee Networks Security Platform uses a defense in depth architecture to protect its customers from Zero-day attacks

View now >>

Recording from Wednesday, November 6th 2013, 2pm GMT (3pm CET)


 October 2013

 Ottobre 2013

 Octubre 2013

 Octobre 2013


 Oktober 2013

The Next Generation of Endpoint Protection
Are you looking for the next generation of endpoint protection that addresses all threats to desktops, mobile, servers and datacenters? Join this webinar to learn more about how McAfee delivers leading endpoint protection solutions for all of the devices in your network. In this webinar, we will discuss the following:
  • How McAfee Complete Endpoint Protection suites add defense in depth against the full threat spectrum from zero-day exploits to web attacks, protecting Windows, Mac and Linux systems, as well as mobile devices such as iPhone, iPad, and Android smartphones and tablets.
  • How McAfee Data Center Server Security Suites lets you Discover all workloads, Protect virtual and physical servers, and securely Expand into the cloud.
  • And, how you can act today to strengthen your server protection with a special offer.

View now >>

Recording from Wednesday, October 30th 2013, 2pm GMT (3pm CET)

Real-Time Data Protection with McAfee DLP and McAfee ESM
Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.
  • Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
  • Leverage McAfee ePO to automate DLP policies based on situational awareness
  • See how McAfee DLP and ESM work together to provide real-time data protection

View now >>

Recording from Wednesday, October 23rd 2013, 2pm BST (3pm CET)

Hardware Enhanced Security Management with ePO DeepCommand
Are you challenged by regular system maintenance activities like Patching and virus scanning impacting your user productivity?

Do you have challenges supporting remote users in a cost-effective manner on issues like system failures and password resets?

Do you feel remote access to encrypted systems are near impossible because of pre-boot authentication?

Are PC energy costs straining your IT budgets and you are not able to embrace green IT initiatives?

Join this webinar and unleash a new vantage point in your computing assets - with McAfee ePO Deep Command:
  • To learn how you can save on energy costs by allowing PC’s to be powered down, while still having the flexibility to wake and update PCs to conduct security tasks and patches.
  • To understand how you can improve efficiency of security operations by providing the ability to wake up PC’s with McAfee encryption software and securely authenticate pre-boot “without” user intervention.
  • To know how you can increase user productivity with faster pre-boot password resets and remote repair of encrypted PC’s.
  • To see how one can extend the reach of their IT teams with the ability to remote remediate “disabled” endpoints with full access to the PC’s keyboard, video and mouse.
  • To discover how you can leverage existing security investments in Intel vPro with deployment and management from McAfee ePO.

View now >>

Recording from Wednesday, October 16th 2013, 2pm BST (3pm CET)

How to Super Charge Next Generation Security: McAfee Next Generation Firewall
The presentation will discuss where the market is going, why we chose Stonesoft, what are the differences of between current FW to NGFW, features of the new NGFW, uses case with the NGFW and a competitive stance.

View now >>

Recording from Wednesday, October 9th 2013, 2pm BST (3pm CET)

McAfee Enterprise Security Manager (ESM)
To ensure situational awareness of their enterprise threat and compliance posture, our customers need a single management environment that enables their security and compliance teams to collect, store, analyze, and act upon risks and threats from a single location. McAfee Enterprise Security Manager delivers security intelligence through a single platform for monitoring and reporting while allowing active response via integration with McAfee ePO and McAfee NSM.

Watch this webinar on Endpoint Security as you:
  • Reduces time to respond - accelerate investigations and decision-making through rapid pivot and single click access to otherwise complicated information in a single console.
  • Significantly reduces operational cost and time investment for administrative staff to manage and respond.
  • Content awareness provides the deep analytics necessary to detect advanced threats and insider theft.
  • Continuous compliance reporting aligned with the Unified Compliance Framework, to enable out of the box reporting on more than 240 global regulations and control frameworks.

View now >>

Recording from Wednesday, October 2nd 2013, 2pm BST (3pm CET)


 September 2013

 Settembre 2013

 Septiembre 2013

 Septembre 2013

Using Application Control to secure the corporate desktop
With the increase in volume and sophistication of malware, how can I protectively protect endpoints? Is blacklisting sufficient to protect my environment? Think about how your approach to malware has changed over the last 15 years.

Watch this webinar on Endpoint Security as you:
  • Learn how new protection techniques can deliver vastly superior protection
  • See how signatures can be supplemented by whitelisting to fight malware
  • Hear about how zero-day attacks, advanced persistent threats and rootkits can be stopped without signatures
  • Understand how whitelisting can be used is a desktop environment
  • Determine if whitelisting can be effective in your environment
The endpoint has been redefined; the motivation behind attacks has changed; the threat landscape has evolved. Traditional signature-based anti-virus protection is 20 year old technology. It should be the last line of defence, yet within many organizations it is the only line of defence against malware. Learn how to evolve your approach using Application Control to secure the corporate desktop.

View now >>

Recording from Wednesday, September 18th 2013, 2pm BST (3pm CET)

How to Secure Access to the Cloud
Outsourcing applications to the Cloud has become strategic for many organizations seeking to improve business agility and reduce internal IT expenses. However, as companies adopt cloud applications they also understand that they need to mitigate the risks of unauthorized access and data leakage to the cloud. If they don’t address these risks, they may find themselves the victim of a breach, with the resulting public embarrassment and litigation costs.

In this webcast, McAfee will discuss the security challenges faced by organizations moving to the cloud and describe how a unique combination of products with features like signature-less malware detection, data loss prevention, encryption, application controls, and multi-factor authentication enables organizations to provide both internal and external users with secure access to cloud applications.

View now >>

Recording from Wednesday, September 11th 2013, 2pm BST (3pm CET)

Datacenter Security
How can customers secure their workloads in the hybrid data center if they don't even know how many virtual machines they have and where these are located?

In comes McAfee Datacenter Security Suite 3.0 which lets you:
  • Discover all workloads and provide complete security visibility, on premise and in the cloud
  • Secure workloads with desired policies for the hybrid data center
  • Grow infrastructure into the cloud with automatic provisioning of security policies

View now >>

Recording from Wednesday, September 4th 2013, 2pm BST (3pm CET)

No webinars found

 

 Back to top