Loading Events
Find Events

Event Views Navigation

Upcoming Events › Webinar

Events List Navigation

December 2017

Cylance Technical Overview Webinar

December 22 @ 10:00 am - 10:45 am

A quick introduction, followed by a demonstration of the security technology that is revolutionising the endpoint anti-virus/anti-malware industry. Microsoft call it “the only next-generation endpoint technology” and SC Magazine have said “it’s the best endpoint product available with zero negatives”. Come and see for yourselves as we introduce the company and the background of the technology, followed by a live demonstration using some fresh malware (from our Malware Lab), where we also create some live mutations of that malware, and watch…

Find out more »
January 2018

Cylance Technical Overview Webinar

5th January 2018 @ 10:00 am - 10:45 am

A quick introduction, followed by a demonstration of the security technology that is revolutionising the endpoint anti-virus/anti-malware industry. Microsoft call it “the only next-generation endpoint technology” and SC Magazine have said “it’s the best endpoint product available with zero negatives”. Come and see for yourselves as we introduce the company and the background of the technology, followed by a live demonstration using some fresh malware (from our Malware Lab), where we also create some live mutations of that malware, and watch…

Find out more »

Introduction to Cato Networks – Webinar

5th January 2018 @ 11:30 am - 12:15 pm

Networks and security infrastructure are built on top of hardware appliances and connected over Internet or MPLS links. This architecture is costly to own and complex to maintain. Connectivity charges, appliance purchases and upgrades, software updates and vulnerability patching… the list is long and the management overhead is significant. At the same time, the increased use of Cloud resources and mobile devices make networking and security even more challenging. REGISTER  

Find out more »

Cylance Technical Overview Webinar

19th January 2018 @ 10:00 am - 10:45 am

A quick introduction, followed by a demonstration of the security technology that is revolutionising the endpoint anti-virus/anti-malware industry. Microsoft call it “the only next-generation endpoint technology” and SC Magazine have said “it’s the best endpoint product available with zero negatives”. Come and see for yourselves as we introduce the company and the background of the technology, followed by a live demonstration using some fresh malware (from our Malware Lab), where we also create some live mutations of that malware, and watch…

Find out more »

Introducing Kenna: The Fast, Accurate Way to Prioritise Vuln Fixes – Webinar

26th January 2018 @ 10:00 am - 10:45 am

Kenna’s threat processing engine accurately pinpoints the most serious threats to your organisation and enables IT security teams to focus on fixes, instead of spending time manually aggregating vuln data. Kenna has helped customers go from spending as much as 340 hours a month collating vuln alerts in databases/spreadsheets to only 1.5 hours. Join Ignition and Kenna's Security Engineer, Jeff Lenton and EMEA Leader, Trevor Crompton, in a 45 minute webinar where they'll take you through Kenna’s Vulnerability and Risk…

Find out more »
February 2018

Cylance Technical Overview Webinar

2nd February 2018 @ 10:00 am - 10:45 am

A quick introduction, followed by a demonstration of the security technology that is revolutionising the endpoint anti-virus/anti-malware industry. Microsoft call it “the only next-generation endpoint technology” and SC Magazine have said “it’s the best endpoint product available with zero negatives”. Come and see for yourselves as we introduce the company and the background of the technology, followed by a live demonstration using some fresh malware (from our Malware Lab), where we also create some live mutations of that malware, and watch…

Find out more »

Introduction to Cato Networks – Webinar

2nd February 2018 @ 11:30 am - 12:15 pm

Networks and security infrastructure are built on top of hardware appliances and connected over Internet or MPLS links. This architecture is costly to own and complex to maintain. Connectivity charges, appliance purchases and upgrades, software updates and vulnerability patching… the list is long and the management overhead is significant. At the same time, the increased use of Cloud resources and mobile devices make networking and security even more challenging. REGISTER  

Find out more »

Cylance Technical Overview Webinar

16th February 2018 @ 10:00 am - 10:45 am

A quick introduction, followed by a demonstration of the security technology that is revolutionising the endpoint anti-virus/anti-malware industry. Microsoft call it “the only next-generation endpoint technology” and SC Magazine have said “it’s the best endpoint product available with zero negatives”. Come and see for yourselves as we introduce the company and the background of the technology, followed by a live demonstration using some fresh malware (from our Malware Lab), where we also create some live mutations of that malware, and watch…

Find out more »
March 2018

Cylance Technical Overview Webinar

2nd March 2018 @ 10:00 am - 10:45 am

A quick introduction, followed by a demonstration of the security technology that is revolutionising the endpoint anti-virus/anti-malware industry. Microsoft call it “the only next-generation endpoint technology” and SC Magazine have said “it’s the best endpoint product available with zero negatives”. Come and see for yourselves as we introduce the company and the background of the technology, followed by a live demonstration using some fresh malware (from our Malware Lab), where we also create some live mutations of that malware, and watch…

Find out more »

Introduction to Cato Networks – Webinar

2nd March 2018 @ 11:30 am - 12:15 pm

Networks and security infrastructure are built on top of hardware appliances and connected over Internet or MPLS links. This architecture is costly to own and complex to maintain. Connectivity charges, appliance purchases and upgrades, software updates and vulnerability patching… the list is long and the management overhead is significant. At the same time, the increased use of Cloud resources and mobile devices make networking and security even more challenging. REGISTER  

Find out more »
+ Export Events