• Managed Detection and Response (MDR) - Secon Cyber

    265 views 1 year ago
    There is a need to monitor for threats and especially for those that have bypassed preventative security systems such as anti-virus or firewall. Should these be detected then there needs to be a timely remediation.

    The solution to this is managed detection and response. Secon Cyber’s Managed Detection and Response services provides.

    Find out more: https://seconcyber.com Show less
    Read more
  • This item has been hidden
  • Uploads Play all

    • Webinar: Web and Email Security with Forcepoint - Duration: 58 minutes.

      • 2 days ago
      With practices such as extensive cloud migration, BYOD, and remote work trending, IT security experts are having to face enormous challenges. These revolutionary changes are forcing organisations t...
    • Webinar: Understanding email security with Egress - Duration: 52 minutes.

      • 6 days ago
      Gartner published its ‘Market Guide for Email Security’ in June 2019. In it, Gartner explores how large-scale migration to cloud email platforms (primarily O365) has necessitated a strategic shift ...
    • Webinar: DevSecOPs with Checkmarx - Duration: 31 minutes.

      • 1 week ago
      Many organisations today are in the process of transitioning to a DevOps-centric approach, but don't want to leave security behind. In order to build security in from the beginning of the software ...
    • Webinar: The Impossible Puzzle of Cybersecurity with Sophos - Duration: 36 minutes.

      • 2 weeks ago
      Based on the results of an independent survey, the session explores explores the impossible puzzle organisations face when it comes to stopping cyber threats, including:

      • The percentage of organi...
    • Webinar: Insider Threat Forensics with ObserveIT - Duration: 36 minutes.

      • 1 month ago
      With three million records stolen every day, Insider Threats are quickly becoming the greatest cyber security risk organisations face today. In the event of a breach, it’s essential to be able to ...
    • Webinar: Firewall Replacement with Cato Networks - Duration: 53 minutes.

      • 1 month ago
      One of the most common questions Cato Networks hear from their customers is, "Can we replace our on-premise firewalls with Cato's firewall-as-a-service?" Peter Lee, the Cato Sales Engineer presenti...
    • Webinar: Cyber Resilience for Email with Mimecast - Duration: 57 minutes.

      • 1 month ago
      Over 90% of threats enter organisations through an email, so proper email security is necessary to keep yourself protected. In addition, migration to the cloud and Office 365 exposes your organisat...
    • Webinar: Leveraging IAM to Protect Against Data Breach Threats with My1Login - Duration: 40 minutes.

      • 1 month ago
      No one wants a data breach on their watch. Around 80% of data breaches are due to passwords, so protecting these passwords is imperative to keeping your organisation safe.

      My1Login's single sign-...
    • Webinar: The Future of Authentication with Yubico - Duration: 24 minutes.

      • 1 month ago
      We all know that passwords do not work. For many years, ubiquitous phishing attacks, brute forcing, and credential stuffing using reused passwords has shown that organisations should not rely on pa...
    • Webinar: Software Defined Perimeter with Pulse Secure - Duration: 10 minutes.

      • 1 month ago
      Join Secon Cyber and our partner Pulse Secure for this webinar on how Pulse SDP enables you to allow workers to access resources, regardless of location, time, or device. Its Zero Trust "Verificati...
    • Webinar: Insider Threat Investigation with ObserveIT - Duration: 28 minutes.

      • 1 month ago
      If you’ve conducted an Insider Threat investigation using traditional security tools such as SIEMs or DLPs, you know it can be a long (and painful) journey to figure out who did what. From sifting ...
    • Webinar: Can't stop, won't stop. How to actually prevent email breaches with Egress - Duration: 50 minutes.

      • 1 month ago
      People cause data breaches every day. That simple statement hides layers of complexity, compliance issues, and stress for CISOs and their security teams. While we may be able to ‘logically’ explain...
    This item has been hidden
  • Popular uploads Play all

    This item has been hidden
to add this to Watch Later

Add to

Loading playlists...