McAfee  
 
  Register today for upcoming webinars
       
Device security   Device security   Device security
 
 
     
 

Watch the replays of our McAfee product webinars and in 45 minutes you'll learn how easy it is to protect your organization from security threats.

Search the webinar archive

Date

Product Type

Language


  




 April 2014


 April 2014

 Aprile 2014

 Abril 2014

 Avril 2014

Disrupting Advanced Attacks with Email, Web, and DLP Security
This webinar is presented by McAfee and Intel to help customers understand their Data Protection solution from McAfee and to get the most business value out of their Intel based endpoints. Products that apply to this webcast include McAfee Complete Data Protection Suites, featuring Endpoint Encryption, and EPO Deep Command to extend the reach of your IT department to lower your total cost of ownership. The webinar will include a special highlight on Intel® Core™ vPro™ Processors and associated technologies that increase productivity and hardware-assisted security in the enterprise. This webcast is provided as a 35-40 minute overview and includes 5-10 minutes of Q & A.

Join this webinar on Data Protection and learn about:

  • The key features of Data Protection and how it can provide you with the security you need
  • Use cases on utilizing the synergy between Intel® vPro™ and McAfee Data Protection technologies to reduce your overall TCO
  • How you can extend the reach of your IT team with the ability to remotely wake up or even power on PC’s, remediate “disabled” endpoints and remotely reset pre-boot passwords
  • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users

Don’t miss this webinar! Pat and Jason will explain what you need to know on how the synergy between Intel® vPro™ and McAfee Data Protection technologies can help your end users be more productive and reduce your overall IT TCO.

View now >>

Recording from Wednesday, April 23rd 2014, 2pm BST (3pm CET)

An introduction to and demonstration of NextGen Endpoint
What is McAfee’s Next Generation endpoint solution? How can we reduce the performance impact whilst maintaining high security? How can we extend detection beyond signatures?

Join this webinar on Endpoint Security as we:

  • View the NextGen Endpoint client
  • Discuss the new architecture behind NextGen Endpoint
  • Highlight important features that distinguish it from other endpoint solutions
  • Walk through a live demonstration

The endpoint has been redefined; the motivation behind attacks has changed; the threat landscape has evolved. Traditional signature-based anti-virus protection is 20 year old technology. Learn how NextGen Endpoint provides capabilities beyond signatures to protect a modern endpoint. Learn how NextGen Endpoint Security from McAfee changes the way endpoints will be protected going forward.

View now >>

Recording from Wednesday, April 9th 2014, 2pm BST (3pm CET)

McAfee Advanced IPS
What makes an IPS advanced? Companies often claim to have the "next generation" product or "advanced" features, but what about the McAfee Network Security Platform makes it advanced?

Join this webinar on Advanced IPS as:

  • After attending this webinar you'll better understand the innovative features that McAfee has created to protect it's customers from the most sophisticated attacks
  • I'll also walk through some of the advanced features and how they are implemented McAfee customers can better protect their organizations
  • Learn the importance of signature based detection and the different ways the McAfee Network Security Platform (IPS) is implementing signature-less detection in an industry leader

During our time I’ll walk though the implementation of features that turn a great IPS into an Advanced IPS. We’ll also cover the features that every IPS should have to protect organizations from advanced attacks in today’s security landscape.

View now >>

Recording from Wednesday, April 2nd 2014, 2pm BST (3pm CET)


 March 2014

 Marzo 2014

 Marzo 2014

 Mars 2014


 März 2014

A guide to McAfee’s Signature-less IPS technologies
Today’s security challenges demand a unique perspective to protection. Zero-day attacks and customized malware are challenging the security industry in ways previously unimaginable.
With current security solution struggling to stay ahead, and the average IT organization inundated with volumes of security alerts, a new approach to security and network protection is needed.

Join this webinar to understand what Signature-less IPS inspection is and how it can benefit you:

  • What technologies McAfee uses for signature-less IPS inspection
  • How signature-less inspection is transforming IPS security
  • How McAfee’s IPS can increase your security posture against Advanced Malware

McAfee’s 7 signature-less inspection technologies provide the most comprehensive protection of any vendor on the market. Learn why signatures aren’t the only thing that is important when selecting a Next Generation IPS.

View now >>

Recording from Wednesday, March 12th 2014, 2pm GMT (3pm CET)

McAfee Complete Data Protection
Have you ever experienced or known someone who has lost a laptop or a USB drive that contained valuable company IP or customer data? Are you subject to compliance programs, either directly or through partnerships?

Join this webinar on Data Protection and learn about:

  • How easy it is to keep your data safe from attacks and theft
  • Encryption performance and why your end-users won’t even notice it’s working
  • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • How DLP Endpoint can help you protect IP and ensure regulatory compliance
  • Use cases on leveraging the synergy between Intel vPro and McAfee Data Protection technologies
  • New Mac OS support

Don't miss out on the opportunity to hear from data protection experts on how to protect your data while keeping IT costs in check and your end-users happy!

View now >>

Recording from Wednesday, March 5th 2014, 2pm GMT (3pm CET)


 February 2014

 Febbraio 2014

 Febrero 2013

 Février 2014


 Februar 2014

Host to Virtual Machine, Cloud to Chip – comprehensive security in the Data Centre
Where are my Virtual Machines, what are they doing and how are they protected? How to secure the hypervisor? As the data centre has evolved, how have my security solutions changed to reflect this?

Join this webinar on Data Centre Security and find out:

  • What are some of the new challenges in securing a modern data centre?
  • How can I balance the needs of performance, flexibility and security?
  • Hear about how hardware features can be used to detect attacks to hypervisors?
  • What new technologies are available to secure a modern data centre?

The data centre has evolved massively to encompass a complex hybrid environment of virtual endpoints, servers and infrastructure, involving both public and private clouds. Before securing virtual machines, challenges now include locating these transient and often invisible systems and securing the hosts upon which these virtual machines are running. Learn how to evolve your approach to protecting the Data Centre using McAfee solutions.

View now >>

Recording from Wednesday, February 26th 2014, 2pm GMT (3pm CET)

Shadow IT: The Hidden Security Threat Impacting Your Business
Using cloud-based applications has become the norm for most of us. But what happens when employees sign up for cloud applications without the IT department involved? This creates what we refer to as “Shadow IT”, a growing trend that can open up serious holes in a business’s security posture.

McAfee recently conducted a research study, led by consulting firm Frost & Sullivan, which discovered that Shadow IT is more widespread than previously thought. We found that over 80% of employees worldwide go around IT to deploy their own applications. And, employees who bypass IT expose the organization to increased risk. In fact, 15% of employees reported experiencing a security, access, or liability event related to cloud applications, including unauthorized access by malicious actors, loss of sensitive data, and malware infection while using the applications.

Watch this webinar on Shadow IT to learn:

  • How extensive is the problem of Shadow IT
  • The most popular Shadow IT programs
  • The security risks Shadow IT creates for organizations
  • Best practices on how to manage the risk opened up by Shadow IT

They say you can’t manage what you don’t know about. Find out the truth about Shadow IT within your organization and how you can effectively regain control over the security of your network.

View now >>

Recording from Wednesday, February 19th 2014, 2pm GMT (3pm CET)

Security and Compliance for Business-Critical Servers
Are you in the midst of a major shift as the boundaries between physical, virtual, and public and private clouds are blurring? Organizations must transform and optimize their server infrastructure as the next-generation data center will require a new security approach to keep their systems and critical data secure.

Join this webinar to learn more about how the new McAfee Server Security Suites and our McAfee Data Center Database Security Suite can help secure and protect your data while building efficient compliance practices around business-critical servers.

View now >>

Recording from Wednesday, February 12th 2014, 2pm GMT (3pm CET)


 January 2014

 Gennaio 2014

 Enero 2013

 Janvier 2014


 Januar 2014

Advanced Malware; Find, Freeze, Fix
Most advanced malware solutions available today focus on identifying or discovering malware. While malware discovery is required, it is only one piece of a solution needed for addressing advanced malware. Organizations need to be prepared to deal with the full range of issues that accompany an attack and potential breach, from detection and blocking to visibility and triage.

Join McAfee for insight into today’s advanced threats and what you can do to improve your security posture. This webcast covers:
  • The state of advanced malware
  • Why organizations need to plan beyond avoidance
  • Key components of a successful advanced malware protection strategy

View now >>

Recording from Wednesday, January 29nd 2014, 2pm GMT (3pm CET)

NSP 8.0 – Bringing Endpoint Intelligence to the Network
Next generation firewalls use application visibility to make blocking decisions, but what protects you from malware that masquerades a “good application” to perform nefarious activities? Many of today’s advanced persistent threats are content to slowly gather information masquerading as acceptable network traffic, and if there is no known signature what’s to stop valuable data from leaving your network before it’s too late?

Join this webinar on Endpoint Intelligence in the Network and learn:
  • What features are new to the Networks Security Platform 8.0
  • How to leverage security measures you may already have to better protect yourself from Advanced Persistent Threats and Zero-day attacks that are often missed by today’s security tools
  • How products like Advanced Threat Defence and Endpoint Intelligence Agent are closing the gap on zero-day detection

View now >>

Recording from Wednesday, January 22nd 2014, 2pm GMT (3pm CET)

Application Control for Desktop's Best Practice
How can whitelisting supplement blacklisting technologies? How do I implement this in a desktop environment? What is the best approach and what should be avoided?

Join this webinar on Application Control and:
  • See how observations can be used to supplement the administrators understanding of how change occurs
  • Learn how to build policy and ultimately enhance security of traditional desktops
  • Discuss deployment techniques and lessons learned from previous deployments

View now >>

Recording from Wednesday, January 8th 2014, 2pm GMT (3pm CET)


 December 2013

 Dicembre 2013

 Diciembre 2013

 Decembre 2013


 Dezember 2013

Real Time Advanced for ePO Launching
McAfee Real Time Advanced for ePolicy Orchestrator revolutionizes security systems management with rapid visibility into system data and immediate interventions. This powerful solution lets you use plain English within an ePO-based interface and workflow to find facts fast to exert control with confidence. From stalking worms and forbidden applications to large-scale remediation of noncompliance, Real Time Advanced empowers ePO administrators to proactively manage incident response, outbreaks, and compliance.

What does this mean to your customers?
  • Instant Queries: Query every computer in your enterprise and get the answers back within seconds to reduce audit and data collection bottlenecks and increase the number of events you can respond to
  • Instant Actions: Reduce costly incident remediation and software distribution timelines from hours to minutes
  • ePO Integration: Leverages the known and trusted ePO console and workflow – no new interface to learn or headcount to add
  • Plain English: Use a Google-like natural language interface to issue queries—no scripting or special expertise required—permitting prompt data access for everyone, including auditors and novice administrators
  • Simple Peer-to-Peer Infrastructure: Install a single server and expedite time-sensitive processes across globally distributed networks and large organizations
  • Enterprise Ready: Leverage features critical to security and large scale: FIPS 140-2 certified cryptography, rigorous management rights, support for hundreds of administrators and hundreds of thousands of managed assets

View now >>

Recording from Wednesday, December 11th 2013, 2pm GMT (3pm CET)

Advanced Malware: Detection, Protection and Remediation
In today's world of advanced malware, zero-day attacks, and stealthy threats, simply having visibility into the malware affecting your organization is not enough. If you want to protect your business from the costs, risks, and brand damage these threats can cause, you need to consider a more comprehensive approach to complete malware defense – one that goes beyond just analysis to full protection and resolution.

Join this webinar on advanced malware to:
  • Understand why organizations are looking to expand detection and ultimately protection
  • Learn about McAfee’s newest advanced malware detection solution: Advanced Threat Defense
  • Discover how Advanced Threat Defense integrates with other McAfee solutions to freeze advanced threats and initiates fix actions

View now >>

Recording from Wednesday, December 4th 2013, 2pm GMT (3pm CET)

Advanced Threat Defense: Schutz vor gezielten Angriffen durch dynamische und statische Analyse
Referent: Marcus Viertel

Im Rahmen dieses Webcasts stellen wir Ihnen McAfee’s neue Advanced Threat Defense (ATD)-Lösung vor und zeigen, wie die Kombination von statischer und dynamischer Analyse-Methoden zusammen mit einer umfangreichen Integrationsarchitektur einen wesentlich verbesserten Schutz gegen fortgeschrittene Angriffe bieten kann.

Jetzt ansehen auf Deutsch >> >>

Dienstag, den 3. Dezember 2013 15.00 bis 15.45 Uhr


 November 2013

 Novembre 2013

 Noviembre 2013

 Novembre 2013

McAfee Complete Data Protection
Have you ever experienced or known someone who has lost a laptop or a USB drive that contained valuable company IP or customer data? Are you subject to compliance programs, either directly or through partnerships?

Join this webinar on Data Protection and learn about:
  • How easy it is to keep your data safe from attacks and theft
  • Encryption performance and why your end-users won’t even notice it’s working
  • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
  • How DLP Endpoint can help you protect IP and ensure regulatory compliance
  • Use cases on leveraging the synergy between Intel vPro and McAfee Data Protection technologies

Don't miss out on the opportunity to hear from data protection experts on how to protect your data while keeping IT costs in check and your end-users happy!

View now >>

Recording from Wednesday, November 27th 2013, 2pm GMT (3pm CET)

The McAfee Network Security Platform Combined With Intelligence at the Endpoint, Goes Beyond Layer 7
McAfee is continuing to pioneer a connected approach to security. Combining information at the endpoint with the information in the network gives administrators visibility beyond layer seven. The Network Security Platform along with the McAfee Endpoint Intelligent Agent allows administrators to quickly identify application behavior, identify applications as malicious or safe and take action with a few simple steps..

In our look at visibility beyond layer 7 we’ll explore:
  • How malware continues to penetrate networks?
  • What does it mean to go beyond layer 7?
  • What is the Endpoint Intelligent Agent and how does it work?
  • How does having an Endpoint Intelligent Agent on the Network Security Platform give you visibility into undetected malware?

View now >>

Recording from Wednesday, November 20th 2013, 2pm GMT (3pm CET)

Verborgene Bedrohungen entdecken und blockieren
Referent: Marcus Viertel

Erfahren Sie im Rahmen dieses Webcasts wie Sie verborgene Bedrohungen erkennen und blockieren können:

  • Stoppen Sie Zero-Day-Angriffe und andere Stealth-Malware mit Echtzeit-Verhaltensüberwachung von Kernelvorgängen sowie hardwareunterstützter Sicherheit.
  • Erkennen Sie Rootkits in Echtzeit, noch während sie versuchen, die Malware zu verbergen.
  • Blockieren und entfernen Sie Malware, bevor sie sich in Ihren Systemen verankert.

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 19. November 2013 15.00 bis 15.45 Uhr

How to Balance User Empowerment & Security Using Least Privilege
With targeted cyber-attacks rapidly growing in number and sophistication, your organization is faced with a seemingly impossible trade-off: should you optimize security at the expense of user productivity?

In today's enterprise, providing users and IT admins with the privileges they require to perform their roles without seriously impacting the security posture of your endpoints is incredibly challenging.

Join Mark Austin, CEO of Avecto (McAfee’s ‘Most Innovative Partner 2013’) on this live webinar as he shares expertise on how an effective privilege management strategy can prevent users and IT admins from accidentally or deliberately abusing their rights, avoiding high-profile security breaches whilst stopping malware in its tracks.

PwC CISO Lee Barnett complements Mark’s discussion, explaining how least privilege technology has enabled his organization to revolutionise the user experience for mobile, ‘digital native’ workers, without compromising the security of their systems.

3 Business Reasons to Attend:

  • Discover how to combat insider attacks with a least privilege approach on desktops and servers
  • Learn how to mitigate over 85% of targeted attacks with effective privilege management
  • Understand how least privilege can be fully managed through your existing McAfee ePO infrastructure

View now >>

Recording from Thursday, November 7th 2013, 2pm GMT (3pm CET)

Advanced Malware Detection and Intrusion Prevention Systems
Intrusion Prevention Systems have historically checked for known bad files and blocked any that were on a list. But what happens when the malicious files are a new threat? How do you block against unknown threats or Zero-day attacks?

In our look at Zero-day attacks and traditional IPS devices we’ll explore:
  • What is Zero-day malware, why is it bad, and what are they after?
  • IPS detection rates and throughput numbers
  • Why traditional signature-based detection isn’t enough
  • Why a layered or defense in depth approach is important
  • How the McAfee Networks Security Platform uses a defense in depth architecture to protect its customers from Zero-day attacks

View now >>

Recording from Wednesday, November 6th 2013, 2pm GMT (3pm CET)


 October 2013

 Ottobre 2013

 Octubre 2013

 Octobre 2013


 Oktober 2013

The Next Generation of Endpoint Protection
Are you looking for the next generation of endpoint protection that addresses all threats to desktops, mobile, servers and datacenters? Join this webinar to learn more about how McAfee delivers leading endpoint protection solutions for all of the devices in your network. In this webinar, we will discuss the following:
  • How McAfee Complete Endpoint Protection suites add defense in depth against the full threat spectrum from zero-day exploits to web attacks, protecting Windows, Mac and Linux systems, as well as mobile devices such as iPhone, iPad, and Android smartphones and tablets.
  • How McAfee Data Center Server Security Suites lets you Discover all workloads, Protect virtual and physical servers, and securely Expand into the cloud.
  • And, how you can act today to strengthen your server protection with a special offer.

View now >>

Recording from Wednesday, October 30th 2013, 2pm GMT (3pm CET)

Real-Time Data Protection with McAfee DLP and McAfee ESM
Data sprawl posts a big challenge to data protection today. Having visibility to data movement and how it is being used is a key step to controlling data at the source. This session will focus on how DLP discovery along with user and file activity monitoring can give you contextual awareness of the file being used.
  • Learn how event and application monitoring enables visibility into data movement within and out of the enterprise
  • Leverage McAfee ePO to automate DLP policies based on situational awareness
  • See how McAfee DLP and ESM work together to provide real-time data protection

View now >>

Recording from Wednesday, October 23rd 2013, 2pm BST (3pm CET)

Hardware Enhanced Security Management with ePO DeepCommand
Are you challenged by regular system maintenance activities like Patching and virus scanning impacting your user productivity?

Do you have challenges supporting remote users in a cost-effective manner on issues like system failures and password resets?

Do you feel remote access to encrypted systems are near impossible because of pre-boot authentication?

Are PC energy costs straining your IT budgets and you are not able to embrace green IT initiatives?

Join this webinar and unleash a new vantage point in your computing assets - with McAfee ePO Deep Command:
  • To learn how you can save on energy costs by allowing PC’s to be powered down, while still having the flexibility to wake and update PCs to conduct security tasks and patches.
  • To understand how you can improve efficiency of security operations by providing the ability to wake up PC’s with McAfee encryption software and securely authenticate pre-boot “without” user intervention.
  • To know how you can increase user productivity with faster pre-boot password resets and remote repair of encrypted PC’s.
  • To see how one can extend the reach of their IT teams with the ability to remote remediate “disabled” endpoints with full access to the PC’s keyboard, video and mouse.
  • To discover how you can leverage existing security investments in Intel vPro with deployment and management from McAfee ePO.

View now >>

Recording from Wednesday, October 16th 2013, 2pm BST (3pm CET)

How to Super Charge Next Generation Security: McAfee Next Generation Firewall
The presentation will discuss where the market is going, why we chose Stonesoft, what are the differences of between current FW to NGFW, features of the new NGFW, uses case with the NGFW and a competitive stance.

View now >>

Recording from Wednesday, October 9th 2013, 2pm BST (3pm CET)

McAfee Enterprise Security Manager (ESM)
To ensure situational awareness of their enterprise threat and compliance posture, our customers need a single management environment that enables their security and compliance teams to collect, store, analyze, and act upon risks and threats from a single location. McAfee Enterprise Security Manager delivers security intelligence through a single platform for monitoring and reporting while allowing active response via integration with McAfee ePO and McAfee NSM.

Watch this webinar on Endpoint Security as you:
  • Reduces time to respond - accelerate investigations and decision-making through rapid pivot and single click access to otherwise complicated information in a single console.
  • Significantly reduces operational cost and time investment for administrative staff to manage and respond.
  • Content awareness provides the deep analytics necessary to detect advanced threats and insider theft.
  • Continuous compliance reporting aligned with the Unified Compliance Framework, to enable out of the box reporting on more than 240 global regulations and control frameworks.

View now >>

Recording from Wednesday, October 2nd 2013, 2pm BST (3pm CET)


 September 2013

 Settembre 2013

 Septiembre 2013

 Septembre 2013

Using Application Control to secure the corporate desktop
With the increase in volume and sophistication of malware, how can I protectively protect endpoints? Is blacklisting sufficient to protect my environment? Think about how your approach to malware has changed over the last 15 years.

Watch this webinar on Endpoint Security as you:
  • Learn how new protection techniques can deliver vastly superior protection
  • See how signatures can be supplemented by whitelisting to fight malware
  • Hear about how zero-day attacks, advanced persistent threats and rootkits can be stopped without signatures
  • Understand how whitelisting can be used is a desktop environment
  • Determine if whitelisting can be effective in your environment
The endpoint has been redefined; the motivation behind attacks has changed; the threat landscape has evolved. Traditional signature-based anti-virus protection is 20 year old technology. It should be the last line of defence, yet within many organizations it is the only line of defence against malware. Learn how to evolve your approach using Application Control to secure the corporate desktop.

View now >>

Recording from Wednesday, September 18th 2013, 2pm BST (3pm CET)

How to Secure Access to the Cloud
Outsourcing applications to the Cloud has become strategic for many organizations seeking to improve business agility and reduce internal IT expenses. However, as companies adopt cloud applications they also understand that they need to mitigate the risks of unauthorized access and data leakage to the cloud. If they don’t address these risks, they may find themselves the victim of a breach, with the resulting public embarrassment and litigation costs.

In this webcast, McAfee will discuss the security challenges faced by organizations moving to the cloud and describe how a unique combination of products with features like signature-less malware detection, data loss prevention, encryption, application controls, and multi-factor authentication enables organizations to provide both internal and external users with secure access to cloud applications.

View now >>

Recording from Wednesday, September 11th 2013, 2pm BST (3pm CET)

Datacenter Security
How can customers secure their workloads in the hybrid data center if they don't even know how many virtual machines they have and where these are located?

In comes McAfee Datacenter Security Suite 3.0 which lets you:
  • Discover all workloads and provide complete security visibility, on premise and in the cloud
  • Secure workloads with desired policies for the hybrid data center
  • Grow infrastructure into the cloud with automatic provisioning of security policies

View now >>

Recording from Wednesday, September 4th 2013, 2pm BST (3pm CET)

 July 2013

 Luglio 2013

 Julio 2013

 Juillet 2013

 Juli 2013

Real Time for ePolicy Orchestrator – “OK, so how does it work?”
In today’s information-driven enterprises, time is not on the side of the IT security manager. When complete, expedient knowledge of the IT landscape can mean the difference between risk mitigation and catastrophe, seconds count.

Join this webinar on Real Time for ePO as you:
  • Understand the most relevant use cases
  • See how it works under the hood with a live demonstration
You will also get a sneak preview into where McAfee is going with this technology, and why your customers are so excited to get Real Time for ePO.

View now >>

Recording from Wednesday, July 24th 2013, 2pm BST (3pm CET)

Cloud Access Security:
Klassische Web-Sicherheit im Umbruch
Referent: Michael Schneider

Erfahren Sie im Rahmen dieses Webcasts wie Sie einen sicheren Zugriff auf produktivitätssteigernde Cloud-Anwendungen bei gleichzeitigem Schutz Ihrer Daten und Identitäten Ihrer Benutzer gegen Verlust oder Missbrauch erreichen können und wie die bidirektionale Internetsicherheit damit zusammenhängt.

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 18. Juli 2013 15.00 bis 15.45 Uhr

Improved Data Protection with McAfee DLP and TITUS End-user Classification
Learn how DLP and end-user classification work together to help prevent both accidental and malicious data loss. McAfee extends TITUS protection against malicious data loss by protecting additional vectors, like removable media and web posting. The combined DLP and End-user Classification policies work together to simplify data protection enforcement with the McAfee ePO centralized console. Identify risks early before data breaches have occurred.

Join this webinar on DLP with Endpoint classification and learn how to:
  • Identify, classify and secure your data
  • Prevent accidental and malicious data leaks
  • Raise user security awareness on proper data handling
Don't miss out this great opportunity to learn how to empower your employees to help you improve data protection and reduce the internal operational costs of DLP.

View now >>

Recording from Wednesday, July 10th 2013, 2pm BST (3pm CET)

Warum traditionelle Sicherheitsmaßnahmen für neue, dynamische und hoch interaktive IT-Umgebungen nicht mehr ausreichen
Referent: Marcus Viertel

Erfahren Sie im Rahmen dieses Webcasts mehr über den neuen Ansatz zur Identifizierung von bösartigen Dateien mittels zentralisierter, dynamischer (Sandboxing) und automatisierter statischer Analyse-Technologie, verknüpft mit Gegenmaßnahmen in Echtzeit

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 04. Juli 2013 15.00 bis 15.45 Uhr

Seminario Online McAfee Web Identity: resolver el reto de Single-Sign On en la nube
La protección web y las soluciones de administración de identidades de McAfee simplifican y protegen el acceso a las aplicaciones de la nube y protegen a las organizaciones frente al malware avanzado y otras amenazas online ocultas. McAfee proporciona la solución de seguridad web más completa del sector.

Ver en Español >>

Replay del: Martes 2 de julio de 2013, de 11h00 a 12h00

 June 2013

 Giugno 2013

 Junio 2013

 Juin 2013

 Juni 2013

Cloud Single Sign On - Architectural Choices
How many of your users have accounts with cloud-based/SaaS applications? Do you know if there are any active accounts in your cloud application portfolio that shouldn’t be there – either because the user has left or because it was created without your knowledge? How can you give your users access to cloud applications without compromising security? What are the advantages and disadvantages of the various ways to deploy identity for cloud apps?

Join this webinar on Cloud Single Sign On to:
  • Learn about the various ways you can regain control over your users' identities in the cloud.
  • Reduce the administrative effort required to create and manage those accounts.
  • Eliminate the security weaknesses associated with passwords.
  • Learn about the two major architectural approaches to managing cloud identities and the advantages and disadvantages of each.
  • Hear about the various ways you can configure an identity and access management solution that allows you maximum flexibility, without giving up control.
Identity is an essential element in any enterprise’s cloud security strategy. McAfee’s identity and access management solutions enable your IT or security administrators to extend and apply enterprise security policies to user access rights to SaaS apps, without adding an undue burden on end-users. If you, or your organization, are serious about outsourcing applications to the cloud, you need to seriously consider how you are going to leverage identity to protect those applications against unauthorized access.

View now >>

Recording from Wednesday, June 26th 2013, 2pm BST (3pm CET)

Webinar nouvelles suites McAfee: la sécurité nouvelle génération des postes clients
Le poste client est la clé de voute de la sécurité de votre système d'information.

McAfee enrichi ses suites de sécurité pour les postes clients avec de nouvelles fonctionnalités pour contrer les nouvelles menaces de plus en plus nombreuses et sophistiquées.

Ce webinar vous fera découvrir comment:
  • Contrer les attaques Rootkit et les APT (Advanced Persistent Threats)
  • Surveiller en temps réel votre infrastructure sécurité
  • Controller votre environnement applicatif

Voir en Français >>

Date & heure : Vendredi 21 Juin 2013, de 11h00 à 12h00

Verbessertes Risiko- & Sicherheits-Management:
Verringern Sie die Sicherheitsrisiken für Ihr Unternehmen
Referent: Marcus Viertel

Erfahren Sie im Rahmen dieses Webcasts mehr über die Bedeutung eines proaktiven Sicherheits- und Risiko-Management-Ansatzes, das Sicherheitsausbringung in Kombination mit automatisierter Bewertung, strategischen Reaktionen auf Vorfälle oder potenzielle Risiken sowie proaktive Überwachung bietet.

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 20. Juni 2013 15.00 bis 15.45 Uhr

Seminario Online McAfee MOVE: seguridad optimizada para entornos virtualizados
Asegura una eficaz gestión y distribución de las soluciones de seguridad para entornos virtuales.

Las soluciones antivirus tradicionales no funcionan bien con una infraestructura virtualizada. McAfee® MOVE AntiVirus ofrece protección antimalware optimizada y avanzada para sus ordenadores de sobremesa y sus servidores virtualizados. Puede elegir una solución eficaz para las plataformas de distintos proveedores o bien una opción sin agente y adaptada para VMware vShield. En cualquiera de los casos, disfrutará de una seguridad flexible y de primera calidad, además de un alto rendimiento.Para facilitar la protección proactiva, integramos información sobre amenazas en tiempo real y unificamos la administración de la seguridad en las infraestructuras física y virtual.

Ver en Español >>

Replay del: Jueves 20 de junio de 2013, de 11h00 a 12h00

Cloud Based Threat Intelligence to Improve Detection Rates and Security Posture
McAfee Labs identifies more than 100,000 new pieces of malware, more than 12,000 new malicious web sites, and 1,000+ new malicious email sites each and every day. With the threat landscape evolving in “Internet Time” it is impossible for standard signature based or standalone heuristic products to keep up with the volume of threats now appearing. The only answer to address this issue is to leverage the cloud and big data technologies contained in McAfee’s Global Threat Intelligence (GTI) system. McAfee GTi is a cloud based, real time reputation service that tracks new and emerging threats from malware, web, email, and network level sources.

Join this webinar on Global Threat Intelligence and discover:
  • The four threat vectors tracked by McAfee Global Threat Intelligence
  • The unique benefits to be realized from cross vector threat correlation
  • The detection improvements available from activating GTI in all McAfee products
  • The built in security and performance features that maximize detection accuracy while minimizing the impact on IT infrastructure
This webinar will cover the unique advantages that GTI can provide in optimizing your enterprise security posture.

View now >>

Recording from Wednesday, June 19th 2013, 2pm BST (3pm CET)

Webinar McAfee Virtualisation
Sécurité, informations sur les menaces et gestion des environnements virtualisés.

Avec les solutions McAfee pour environnements virtualisés, vous profitez des avantages opérationnels de la virtualisation tout en optimisant la sécurité et la conformité de vos serveurs virtuels. Nos solutions intègrent de nouvelles options garantissant protection et efficacité opérationnelle, que vous consolidiez des centres de données, gériez une infrastructure de postes de travail virtuels ou cherchiez à protéger les informations sensibles de vos bases de données.

Voir en Français >>

Date & heure : Mardi 18 Juin 2013, de 11h00 à 12h00

Neue Gefahren fordern neue Sicherheitsstandards:
Endgerätesicherheit der nächsten Generation - vom Chip bis zur Applikation
Referent: Thomas Maxeiner

Erfahren Sie im Rahmen dieses Webcast, wie die neuen McAfee Complete Endpoint Protection-Suites durch ihren mehrstufigen Ansatz getarnte Malware und gezielte Angriffe abwehren.

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 13. Juni 2013 15.00 bis 15.45 Uhr

Countermeasure-Aware Risk Management with McAfee Risk Advisor
Do you find yourself sitting in a war room struggling to answer the question “Do we need to shut down our business and roll out this patch?” when a out-of-band critical patch is released? Do you find yourself deploying several security products not knowing for sure if you are staying ahead of the threat curve? Are you not clear on the RoI from the security investments you have already made?

Watch this webinar on Countermeasure-Aware Risk Management with McAfee Risk Advisor:
  • To learn how to optimize and reduce patching cycles & establish patching priorities
  • To determine which countermeasures you should invest in as threats materialize
  • To see how you can receive up to date threat updates within ePO
  • To know how to have automatic “application awareness” and associate threats to specific applications
  • To quantify the risk of a threat on an asset
Also get to know how to customize your risk profile to best reflect your true risk posture, and perform risk modelling to better understand changes to your risk posture as you introduce new countermeasures in your environment.

View now >>

Recording from Wednesday, June 12th 2013, 2pm BST (3pm CET)

Seminario Online McAfee SIEM: información de seguridad y administración de eventos
Nuestro SIEM potente y de alto rendimiento, reúne los datos de los eventos, de las amenazas y de los riesgos para proporcionar la mayor información de seguridad, lograr respuestas rápidas a los incidentes, gestionar los registros de forma sencilla y generar informes de cumplimiento ampliables. En el corazón de nuestra oferta SIEM Enterprise Security Manager consolida, correlaciona, evalúa y da prioridad a los incidentes de seguridad tanto para las soluciones de terceros como para las de McAfee. Como parte del marco Security Connected, McAfee Enterprise Security Manager se integra con McAfee ePolicy Orchestrator (McAfee ePO), McAfee Risk Advisor y McAfee Global Threat Intelligence, y proporciona el contexto necesario para gestionar los riesgos de la seguridad de forma autónoma y adaptativa.

Aproveche nuestra seguridad intrínsecamente inteligente, con el asesoramiento de expertos para que obtenga el mayor rendimiento de su solución de McAfee. Los servicios para soluciones de McAfee emplean las mejores prácticas para proporcionarle el conocimiento contextual, la visibilidad y la información que necesita para entender cómo amenazan a su empresa los eventos de seguridad y los que no son de seguridad.

Ver en Español >>

Replay del: Viernes 7 de junio de 2013, de 11h00 a 12h00

Webinar sull'Enterprise Risk Management & Security Compliance
I prodotti di Enterprise Risk & Compliance Management di McAfee aiutano a minimizzare i rischi di sicurezza IT e non conformita’, e ad automatizzare la gestione della compliance e a ottimizzare la sicurezza. Con il framework McAfee Security Connected, l’Enterprise Risk e Compliance Management raggiunge un nuovo livello di efficienza operativa. Grazie a una singola console di gestione delle attività sulla rete e dei vostri endpoint, è facile rintracciare gap di security & compliance identificando vulnerabilità, misconfigurazioni e contromisure, in modo da proteggere i vostri asset più critici, intensificando l’investimento di security laddove sia più necessario. Con le nostre soluzioni, potete spendere un budget minore sulle operazioni, garantendo allo stesso tempo un livello di sicurezza maggiore unito a un maggiore controllo su attivita’ di audit e review.

Vedere in Italiano >>

Replay dalla : Giovedi, 6 Giugno 2013

Schalten Sie den Sicherheits-Turbo ein:
Verbessern Sie Ihre IT-Sicherheit und Ereignisreaktion durch automatische Netzwerkintelligenz
Referent: Marcus Viertel

Erfahren Sie im Rahmen dieses Webcasts, wie Sie präzise, integrierte Netzwerksicherheit mit einem konsolidierten, intelligenten Überwachungsprogramm kombinieren und hierdurch mehr Bedrohungen erkennen und blockieren sowie eine schnelle Reaktion auf neue Angriffe gewährleisten können.

Jetzt ansehen auf Deutsch >> >>

Donnerstag, den 06. Juni 2013 15.00 bis 15.45 Uhr

McAfee Application Control – zero tolerance for zeroday threats
Advanced persistent threats via remote attack or social engineering make it increasingly difficult to protect your business. At McAfee, safe never sleeps. We work around the clock to find effective ways to help you keep your business secure and productive. Outsmart cyberthugs with McAfee® Application Control software. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that block unauthorized applications and foil advanced persistent threats (APTs) — without labor-intensive lists to manage.

Join this webinar on McAfee Application Control to learn how to:

  • Protect against zero-day and APTs without signature updates
  • Utilize McAfee Global Threat Intelligence™ (McAfee GTI™) to provide reputation of files and applications within enterprise
  • Strengthen security and lower ownership costs with dynamic whitelisting
  • Efficiently control application access with McAfee® ePolicy Orchestrator® (McAfee ePO™) software’s centralized management platform
McAfee Application Control software provides an effective way to block unauthorized applications and code on servers, corporate desktops, and fixed-function devices. This centrally managed whitelisting solution uses a dynamic trust model and innovative security features that thwart advanced persistent threats — without requiring signature updates or labor-intensive list management. Protect systems from unknown, advanced persistent threats with centrally managed whitelisting with McAfee Application Control today.

View now >>

Recording from Wednesday, June 5th 2013, 2pm BST (3pm CET)


 May 2013

 Maggio 2013

 Mayo 2013

 Mai 2013

Continuous RealTime Vulnerability Assessment
Do you struggle with unknown devices appearing on your network and have no way of understanding the security threats they pose? Do virtual machines spinning up without your knowledge give you headaches? Want to embrace BYOD but don’t want to compromise your security? Want to understand which mobile devices are entering your corporate environment?

Join this webinar on Continuous RealTime Vulnerability Assessment to understand how to:

  • Identify and profile devices as they enter your network
  • Understand the risk that unauthorised devices bring to your network
  • Embrace BYOD with confidence by understanding what devices are connecting
  • Understand the vulnerabilities mobile devices within your network are carrying
  • Embark on a RealTime Asset Management Programme
The world of static vulnerability assessment has passed. As organisations embrace virtual environment, mobile devices in the enterprise and BYOD, you need to have immediate visibility into these assets and understand the risk they bring and mitigate accordingly.

View now >>

Recording from Wednesday, May 29th 2013, 2pm BST (3pm CET)

Seminario Online McAfee ePolicy Orchestrator
El software más avanzado para la gestión de la seguridad: entienda, proteja y elabore informes en un tiempo mucho menor

El mundo en el que vivimos ha cambiado. El trabajo ha dejado de ser un lugar; ahora es una actividad que se desarrolla en cualquier ubicación y con cualquier dispositivo. Esto hace que ya no baste con proteger el centro de datos o el perímetro de red. La seguridad debe estar dondequiera que residan los datos, en todos los procesos operativos y empresariales clave. En la actualidad, la complejidad de las actividades comerciales, junto con el volumen y sofisticación de las amenazas, requiere un enfoque distinto de la administración de la seguridad. Cuando conoce las vulnerabilidades y riesgos que afectan a su empresa, necesita una solución de administración que pueda coordinar la respuesta a esta situación y unifique la administración de todos sus dispositivos, redes, datos y soluciones de cumplimiento de normativas.

Ver en Español >>

Replay del: Miércoles 29 de mayo de 2013, de 11h00 a 12h00

Webinar McAfee ePolicy Orchestrator
Véritable fondement de la gestion de la sécurité McAfee, la plateforme McAfee ePO apporte aux clients des solutions de sécurisation de pointe integrées à leur infrastructure d'entreprise afin d'accroître la visibilité sur leur environnement, de gagner en efficacité et de renforcer leur niveau de protection.

Voir en Français >>

Date & heure : Vendredi 24 Mai 2013, de 11h00 à 12h00

The Top Five Reasons to Upgrade to ePolicy Orchestrator 5.0
Today, more than ever, IT organizations are taking a strategic approach to security—consolidating security portfolios to reduce complexity, investing in next-generation technologies to improve protection, and integrating with existing IT assets to streamline processes. Building on the foundation of the world’s best security management platform, ePolicy Orchestrator extends on its key messages of unification, extensibility, and scalability in response to customer demand…come hear and see precisely how.

Join this webinar on ePO 5.0 as you:

  • See what trends are keeping security practitioners up at night
  • Hear about the real-world problems McAfee ePO 5.0 solves, and why your customers want it
  • Learn the top five things you need to know (and your customers will ask) about ePO 5.0
You will also get a sneak preview into where McAfee is going with security management, and why your customers are so excited about it.

View now >>

Recording from Wednesday, May 22nd 2013, 2pm BST (3pm CET)

McAfee Data Loss Prevention 9.3
In an increasingly connected world, your data gets around - often many times without your knowledge. The good news? McAfee Data Loss Prevention delivers the highest levels of protection for sensitive data, while greatly reducing the cost and complexity of safeguarding business-critical information.

View this webinar on DLP and learn about:

  • The new cool features in the latest DLP 9.3 release
  • How to stay ahead of threats without guesswork or trial and error
  • Use cases on leveraging the synergy between the different McAfee Data Protection technologies
Don't miss the opportunity to hear from data protection experts on how to protect your data in the modern organization!

View now >>

Recording from Wednesday, May 15th 2013, 2pm BST (3pm CET)

Webinar sulle Soluzioni di Intrusion Prevention di McAfee (IPS)
Registrati ora per conoscere le tecniche più comuni di attacco mirato e come si possono contrastare i tentativi di furto di dati sensibili e critici da parte di hacker e di organizzazioni criminali grazie all’implementazione del Next Generation Network Intrusion Prevention da McAfee.

Vieni a scoprire come combattere gli attacchi mirati con il Next Generation Network IPS:

  • Decostruzione di una minaccia persistente avanzata.
  • La necessità di un nuovo paradigma di prevenzione degli attacchi attacco.
  • I nuovi requisiti di settore per il Network IPS.
  • Il Next Generation Intrusion Prevention System.

Vedere in Italiano >>

Replay dalla : Giovedi, 6 Maggio 2013

How ePO can deliver real-time information across thousands of systems in seconds
Threats travel across the globe in seconds. The difference between a successful attack and a successful defence, depends largely on timing. Traditional management reports what’s happened in the past. How can protection be implemented, and security be managed with any accuracy, when the management system uses old data. How can McAfee Real Time for ePO change this and allow you to view up-to-the-minute information?

View this webinar on Realtime for ePO to learn:

  • How do I know how much protection I have right now?
  • How do I know what’s happening now, not an hour ago or yesterday?
  • How can I fix problems instantly and know they have been fixed instantly?
  • When is historic data useful?
  • How can I retrieve information instantly?
  • How can I respond to events immediately?
  • What is Real Time for ePO and how can it help?
  • How is Real different from traditional management architecture?

View now >>

Recording from Wednesday, May 8th 2013, 2pm BST (3pm CET)

Motivation, threats and malware – and a guide to NextGen Endpoint Security.
What does your endpoint look like today? How has malware evolved to evade traditional endpoint solutions? Think about how your approach to malware has changed over the last 5 years. The endpoint has been redefined; the motivation behind attacks has changed; the threat landscape has evolved.

Join this webinar on Endpoint Security to:

  • Learn how malware has evolved
  • See how signatures have become less and less relevant in fighting malware
  • Hear about how advanced persistent threats and rootkits have changed the threat landscape
  • Understand the four phases of every attack and how these can be combatted
  • Hear about how McAfee NextGen Endpoint can help you fight the war against malware
Traditional signature-based anti-virus protection is 20 year old technology. It should be the last line of defence, yet within many organizations it is the only line of defence against malware. Learn how to evolve your approach using NextGen Endpoint Security from McAfee.

View now >>

Recording from Wednesday, May 1st 2013, 2pm BST (3pm CET)


 April 2013

 Aprile 2013

 Abril 2013

 Avril 2013

Putting SIEM into Action
SIEM has long been the central analytics console for security. With the right solution and a solid implementation, SIEM provides actionable intelligence – immediately alerting security teams about possible breaches. As SIEM has gotten smarter, a key question has arisen – why is it still a passive solution? Why doesn’t it do something about everything it sees? Well, now it does.

This webcast will cover new practices to shorten time to respond, stop attacks in their tracks, and obtain continuous situational awareness through new active remediation capabilities in McAfee ESM – McAfee’s leading SIEM solution.

Join this webinar on putting SIEM into action as you:
  • Gain a clear understanding of new active remediation capabilities of McAfee’s SIEM
  • Obtain simple operational processes to put these capabilities into action immediately
  • Learn how to stop common attack scenarios faster and with more precision
Don’t miss this opportunity to turn actionable intelligence into intelligent action.

View now >>

Recording from Wednesday, April 24th 2013, 2pm BST (3pm CET)

Webinar McAfee SIEM: gestion des événements et des informations de sécurité
Une sécurité efficace commence par une visibilité en temps réel sur toutes les activités de l'ensemble des systèmes, réseaux, bases de données et applications.

McAfee® Enterprise Security Manager offre à votre entreprise une connaissance précise et en temps réel du contexte situationnel, ainsi que la vitesse et l'évolutivité requises pour identifier les menaces critiques, y répondre intelligemment et assurer une surveillance constante de la conformité.

De plus, l'intégration avec McAfee Global Threat Intelligence™ (McAfee GTI™) et le logiciel McAfee® ePolicy Orchestrator® (McAfee ePO™) vous permet de détecter les menaces, de les mettre en corrélation et d'appliquer les mesures correctives nécessaires en quelques minutes dans l'ensemble de votre infrastructure informatique.

Voir en Français >>

Date & heure: Mercredi 24 Avril 2013, de 11h00 à 12h00

Countering Malware and Bots
It seems that every security vendor is talking about malware today, how it is growing, and how you need to do something about it. But those words often come with little in the way of working solution. Nor do most of the vendors explain which are the most effective approaches to defend against advanced malware and why.

Join this webinar on advanced malware to learn:
  • Why current security approaches often miss advanced malware
  • Which layering techniques are effective and when
  • Best practices on investigating malware
  • Proof that a network security solution today is effective against advanced malware
It is not a question of whether or not your organization will be attacked by advanced malware – it probably is under attack already. The question is what will you do about it? Can you afford to pass up an opportunity to learn about the best approaches to this problem?

View now >>

Recording from Wednesday, April 17th 2013, 2pm BST (3pm CET)

Webinar sulla gestione delle informazioni e degli eventi di sicurezza (SIEM)
McAfee Security Information and Event Management fornisce una soluzione integrata di intelligence per la sicurezza, grazie all’archiviazione, consolidazione e correlazione di informazioni ed eventi provenienti dai log di security. A fronte delle complessità di gestione della sicurezza aziendale e delle esigenze di compliance, McAfee SIEM unisce visibilità sullo stato generale di sicurezza della propria infrastruttura, protezione da minacce di tipo Insider e furto di dati, all’efficienza e livello di prestazioni migliori sul mercato.

Vedere in Italiano >>

Replay dalla : Giovedi, 11 Aprile 2013

McAfee Asset Manager – Continuous Monitoring
Can anyone here say for a fact that they know how many assets are currently connected to the network? How about 10 minutes ago, can you? Or how about the amount of BYOD and mobile assets that try to connect to your network on a daily basis?

Join this webinar on McAfee Asset Manager and you will:
  • Learn about the gap that exists between the perceived vs. the actual security of the network
  • See how to overcome this gap using real-time visibility and get real-time awareness on every device, physical or virtual, fixed or mobile, managed or unmanaged
  • Hear about the continuous monitoring mechanism for providing real-time visibility
  • Have the opportunity to explore the solution and view the product demo
Today more than ever, your network is at risk. The amount of unknown assets such as BYOD, mobile and uncontrolled assets are increasing on a daily basis exposing your network to more risks every day. When that happens, you need to have a tool alerting, locating and profiling these assets the minute they pop up to understand the change they bring to your security posture.

View now >>

Recording from Wednesday, April 10th 2013, 2pm BST (3pm CET)

Getting the Most out of Security Connected from McAfee
As attacks have become more complex, so has security. To address the ever-evolving threat landscape, organizations have implemented a host of technologies to block, detect and manage security on the network, at the endpoint and throughout the enterprise. While this has increased our defences, it has also created silos of security management that slow down response times and increase cost.

This webcast will cover how organizations can meaningfully leverage Security Connected at McAfee to not only lower complexity, but improve the defences they already have. Security Connected at McAfee is continually evolving, and now with key integrations between endpoint, network and security management, with a small amount of operational planning, organizations can realize the benefits of a truly integrated security architecture.

Join this webinar on Security Connected as you:
  • Gain a clear understanding of Security Connected at McAfee
  • Learn Simple operational processes to gain maximum benefit from Security Connected
  • Understand how Security Connected, combined with some small customizations, can detect and stop even the most stealthy attacks
Don’t miss this opportunity to end security management chaos.

View now >>

Recording from Wednesday, April 3rd 2013, 2pm BST (3pm CET)

No webinars found

 

 Back to top