Lancope Hosts Webinar on the 2012 Network Security Threat Landscape
Company's new director of security research to discuss strategies for effectively combating today's most prominent threats
ATLANTA, Aug. 1, 2012 /PRNewswire/ -- Lancope, Inc., a leader in flow-based security and network performance monitoring, will host a complimentary webinar on Wednesday, August 8 at 11:00 a.m. ET / 8:00 a.m. PT to discuss the 2012 computer security threat landscape. The company's newly appointed director of security research, Tom Cross, will outline today's most prominent cyber threats and the various strategies enterprises can adopt to combat them. Those interested in the free webinar can register at: http://www.lancope.com/news-events/webinars/the-2012-computer-security-threat-landscape/.
"The significance and sophistication of computer security threats is growing with each passing year," said Tom Cross, director of security research for Lancope. "Today's enterprises have to worry not only about widespread malware attacks and hacktivism, but also more stealthy, targeted attacks from various parties including unfriendly nation states and corrupt insiders."
In the midst of constantly evolving attackers, motives and techniques, enterprises are requiring more than the standard defense mechanisms of firewalls, antivirus and IDS/IPS. Join this webinar to learn about next-generation techniques and tools such as NetFlow that can significantly improve network security, reliability and integrity without maxing out IT budgets:
WHO: |
Tom Cross, Director of Security Research, Lancope, Inc. |
WHAT: |
"The 2012 Computer Security Threat Landscape" |
WHEN: |
Wednesday, August 8 at 11:00 a.m. ET / 8:00 a.m. PT |
REGISTER: |
http://www.lancope.com/news-events/webinars/the-2012-computer-security-threat-landscape/ |
Webinar attendees will learn how to cost-effectively obtain the end-to-end network visibility and protection needed to remain a step ahead of online attackers. Cross will address questions such as:
- Who are the different groups trying to break into enterprise networks?
- How do they go about breaking in?
- What are their goals?
- What types of strategies are appropriate for combating them?
Discover best practices for effectively addressing: Hacktivism, Insider Threats, Botnets and Malware, Organized Crime and the Advanced Persistent Threat (APT).
Additional security insight from Tom Cross can be found at: http://www.lancope.com/blog/author/tcross/. For information on Lancope's StealthWatch® flow-based monitoring system, go to: http://www.lancope.com/products/.
About Lancope
Lancope, Inc. is a leading provider of flow-based monitoring solutions to ensure high-performing and secure networks for global enterprises. Unifying critical network performance and security information for borderless network visibility, Lancope provides actionable insight that reduces the time between problem identification and resolution. Enterprise customers worldwide, including healthcare, financial services, government and higher education institutions, rely on Lancope to make better network decisions, respond faster to network problem areas and avoid costly outages and downtime — at a fraction of the cost of conventional network monitoring solutions. With Lancope, you can know your network and run your business better. Privately held and venture-backed, Lancope is headquartered in Atlanta, Georgia. For more information, visit www.lancope.com.
©2012 Lancope, Inc. All rights reserved. Lancope, StealthWatch, and other trademarks are registered or unregistered trademarks of Lancope, Inc. All other trademarks are properties of their respective owners.
SOURCE Lancope, Inc.
WANT YOUR COMPANY'S NEWS FEATURED ON PRNEWSWIRE.COM?
Newsrooms &
Influencers
Digital Media
Outlets
Journalists
Opted In
Share this article