From threats to protection technologies

  • 7 years ago Posted in
Building security technologies that allow us to detect sophisticated targeted attacks is a much more complicated task then creating another extension for an anti-virus. It is not just about a new malware on a given PC or mobile device. It is about looking at the cyber landscape on a much larger scale. It involves analyzing not just the separate files but the whole data flow. Distinguishing thousands of patterns, detecting the usual ones and those that shouldn't be there.
Ian Wood, Senior Director Sales Engineering, Northern Europe Commvault, talks through the...
Steven Wood, Director, Solution Consulting (EMEA), OpenText Cybersecurity, discusses the results of...
Alain Sanchez, EMEA CISO, Fortinet, discusses the findings of the company’s recent Global...
Gartner’s leading cybersecurity analysts, Michael Kranawetter and Jie Zhang, discuss the findings...
Dr. Avesta Hojjati, VP of Engineering at DigiCert, explains the thinking behind the creation of the...
Dennis Xu, VP Analyst, KI Leader, Gartner, discusses the coming together of AI and cybersecurity...
James Hodge, GVP & Chief Strategy Advisor at Splunk, discusses the findings of the company’s...
Henrik Davidsson, Head of MSSP Sales EMEA, Check Point Software, explains how the company’s...