<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

VIDEO: Remote Workforce Roundtable Interview with Jeff Marshall

The full interview with Jeff Marshall, Chief Information Security Officer (CISO) at Datashield. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

VIDEO: Remote Workforce Roundtable Interview with Greg Foss

The full interview with Greg Foss, Senior Threat Researcher at VMware Carbon Black an endpoint protection focused cybersecurity solutions provider. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

VIDEO: Remote Workforce Roundtable Interview with Randy Scadden

The full interview with Randy Scadden, Senior Global Sales Engineer at Proofpoint an enterprise email security focused cybersecurity solutions provider. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

VIDEO: Remote Workforce Roundtable Interview with Shawn O'Brien of RSA

The full interview with Shawn O'Brien, Regional Vice President: Netwitness Threat Detection and Incident Response - Americas at RSA Security. Focus of the interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

VIDEO: Remote Workforce Roundtable Interview with Paul Jakobsen of Proofpoint

The full interview with Paul Jakobsen, North American Channel Manager at Proofpoint an enterprise email security focused cybersecurity solutions provider. The interview is around the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

Malwarebytes Overview

The ever-changing threat landscape that enterprise infrastructure endpoints face requires a comprehensive solution to discover, categorize, and respond to both old and new threats. Malwarebytes delivers dynamic endpoint security to combat this. It provides the following features to discovering and responding to cyber threats:

VIDEO: Remote Workforce Roundtable Interview with Amy Blackshaw of RSA Security

The full interview with Amy Blackshaw, CISSP, the Director of Product Marketing at RSA Security. We focus on the recent shift to a remote workforce due to the COVID-19 pandemic. Topics of the interview include the marketing hype, addressing a remote workforce and moving forward with the Coronavirus implications.

VIDEO: Remote Workforce Roundtable Pt. 2 - Endpoint Security & EDR

In part one of our Remote Workforce Roundtable, we spoke to the larger cybersecurity trends at hand with remote working and security vulnerabilities. This time I sat down with Greg Foss from VMware Carbon Black for a more endpoint-focused discussion on remote work.

The Benefits of NGAV and EDR for Remote Users

In this new remote workforce world we now find ourselves in, the threat landscape has shifted once more. For many organizations this if the first time that they find their workers outside the comfort of the office and its security safeguards and thrust into the unknown of the home office life. This shift opens new areas of vulnerability to organizations that they have not had to face before. The change to a remote workforce is stretching security professionals and requires that they are able to maintain the same level of protection remotely that they had previously been providing within the office environment for their users.

What is Tanium Threat Response and How Does it Work?

Malicious actors attack an end-user device every 30 seconds and their arsenal of hacking tools is growing increasingly sophisticated and hard to detect. 

    Related Posts