Featured
Endpoint Protection for Evolving Cyber Threats
Andrew Murphy, Product Marketing Director and Tyler Moffitt, Sr. Security Analyst
Today, businesses of all sizes are under constant attack. According to an ESG Research Report, 79% of organizations experienced a ransomware incident in one year. Combine that with IT teams that are managing more software, more devices and more dependencies and you can understand why security is complex.
At OpenText Cybersecurity, we simplify security, and it starts with protecting the endpoint. Webroot Endpoint Protection, now available in Secure Cloud, harnesses the power of cloud computing and real-time machine learning to continuously monitor and adapt endpoint defenses.
Join Product Marketing Director, Andrew Murphy, and Sr. Security Analyst, Tyler Moffitt, as they discuss:
• The current threat landscape and cyber risks you need to be aware of
• How our endpoint protection provides ease-of-use, time savings, and low system resource usage
• How organizations are leveraging Webroot Endpoint Protection to build cyber resilience
We look forward to having you join us!
All episodes
-
Simplified Security with Secure Cloud
Andrew Murphy and Sam Kumarsamy (OpenText Cybersecurity Product Marketing Directors)
Growing IT stacks and therefore the increasing number of security software are posing serious challenges for all IT and InfoSec teams globally. The battle with complexity in IT is getting more intense as newer and more sophisticated attack vectors appear for which better and/or more security solutions are needed. Many organizations are therefore looking for vendors who can supply multiple security solutions under one roof for easier management and higher productivity.
OpenText Secure Cloud (formally known as Zix Secure Cloud) combines best-in-class solutions with simplicity to help you do more with less -- less budget, fewer vendors to manage, less worry. Whether your organization needs to securely work remotely, alleviate IT workload, or migrate to the cloud with confidence, we make it possible to give your employees all the tools they need to succeed.Join OpenText Cybersecurity’s Director of Product Marketing for Secure Cloud, Andrew Murphy and Sam Kumarsamy, Product Marketing Director for Webroot as they answer questions and discuss:
• The legacy and new offerings in Secure Cloud to break the cyber threat cycle
• How to achieve greater cyber resilience while minimizing risk
• How you can reduce cost and complexity in your environment -
Reducing Your Cyber Risk with DNS Protection
John Hart, IT Security Specialist/Consultant & EntrepreNerd @ Nerds On Site + Sam Kumarsamy and Jonathan Barnett @ OpenText
Although we have a lot to thank Paul Mockapetris for since the invention of the domain name system (DNS) in 1983, we must remember that DNS was not designed with security in mind. And since then, bad actors have been trying to exploit this in numerous ways. DNS is designed to be invisible, so it is easy to overlook DNS security as a priority. However, a vulnerable DNS leaves your organization susceptible to risk. DNS attacks are on the rise, and the cost of a successful DNS attack can exceed more than $1 million (Dark Reading). Adopting DNS protection allows you to stop threats early, reduce the risk of malware infection to your network and endpoints and maintain privacy.
Join John Hart, IT Security Specialist/Consultant & EntrepreNerd at Nerds On Site and OpenText Cybersecurity Product Marketing Director, Sam Kumarsamy as well as Sr. Product Manager, Jonathan Barnet to review:
• The gaps in understanding DNS security and challenges businesses face with DNS
• How a robust DNS filtering solution can drastically reduce the number of compromises, infections and associated remediation costs
• Why DNS protection is a critical part of building cyber resilienceThe insights shared will help you understand the need for DNS filtering and guide you on next steps.
-
Your First Line of Defense: Security Awareness Training
Sam Kumarsamy, Product Marketing Director and Guy Greenbaum, Sr. Product Manager
82% of all breaches involve a human element (2022 Verizon Data Breach Investigation Report). The weakest link in your cyber resilience strategy is your own end users. But it doesn’t have to be. Well-trained users reduce these incidents, resulting in reduced costs related to lost productivity and system downtime. With Webroot Security Awareness Training, businesses can empower their employees to identify and report scams, avoid risks, fulfill regulatory compliance requirements, and help prevent cyberattacks with regular training as part of the layered defense approach to become cyber resilient.
Join Product Marketing Director, Sam Kumarsamy, and Sr. Product Manager, Guy Greenbaum, as they dive into:
• The risks associated with user error and the trends in social engineering and phishing
• How security education can boost your bottom line
• Our commitment to delivering engaging, interactive training with Webroot Security Awareness TrainingPeople are the first line of defense against cyber threats, so educating them should be a major priority at your organization.
-
Endpoint Protection for Evolving Cyber Threats
Andrew Murphy, Product Marketing Director and Tyler Moffitt, Sr. Security Analyst
Today, businesses of all sizes are under constant attack. According to an ESG Research Report, 79% of organizations experienced a ransomware incident in one year. Combine that with IT teams that are managing more software, more devices and more dependencies and you can understand why security is complex.
At OpenText Cybersecurity, we simplify security, and it starts with protecting the endpoint. Webroot Endpoint Protection, now available in Secure Cloud, harnesses the power of cloud computing and real-time machine learning to continuously monitor and adapt endpoint defenses.
Join Product Marketing Director, Andrew Murphy, and Sr. Security Analyst, Tyler Moffitt, as they discuss:
• The current threat landscape and cyber risks you need to be aware of
• How our endpoint protection provides ease-of-use, time savings, and low system resource usage
• How organizations are leveraging Webroot Endpoint Protection to build cyber resilienceWe look forward to having you join us!