Image 01 Image 02 Image 03 Image 01 Image 02 Image 03 Image 03 Image 03 Image 03 Image 03 Image 03 Image 03 Image 01 Image 02 Image 03 Image 03 Image 03

Webinars On-Demand - page 2

July 11, 2013 | Speakers: George Tubin, Senior Security Strategist, Trusteer and Etay Maor, Senior Product Marketing Manager, Trusteer

New account fraud and account takeover fraud have dramatically increased over the past two years. Today’s criminals use a variety of tactics including malware, phishing, and social engineering to carry out attacks that steal victims’ credentials and personal information. These sophisticated cybercrime techniques easily circumvent current fraud prevention technologies, including authentication and anomaly detection systems.

July 2, 2013 | Speakers: John Kindervag, Principal Analyst at Forrester Research, Inc. and Dana Tamir, Director of Enterprise Security at Trusteer

Phishing and spear-phishing have become top enablers of advanced persistent threats (APTs) and targeted attacks on enterprise organizations. Cybercriminals use sophisticated tricks to steal employees' login credentials or compromise their PCs, gaining an entry point into the enterprise network. Organizations have tried various tools and techniques to prevent these attacks with only limited success.

May 30, 2013 | Speakers: Etay Maor, Trusteer’s Senior Product Marketing Manager and George Tubin, Trusteer’s Senior Security Strategist

With an ever-growing number of vulnerable or infected mobile devices and increased cybercriminal sophistication, protecting the mobile channel has several unique challenges that do not exist in the traditional online channel. Financial institutions should consider holistic fraud prevention and detection approaches to provide coordinated defense across all online channels.

May 29, 2013 | Speaker: Dana Tamir, Director of Product Marketing, Trusteer

Due to a recent rash of Java zero-day vulnerabilities, many security experts recommend removing Java from all systems. But is this really practical advice? Do you really need to remove Java from all enterprise endpoints to be safe from its vulnerabilities? What about other vulnerable applications?

April 11, 2013 | Speakers: Rick Holland, Senior Analyst, Forrester Research, Inc. and Dana Tamir, Director of Product Marketing, Trusteer

Enterprises are losing the battle against advanced malware attacks. New application vulnerabilities are continuously discovered and traditional blacklisting solutions don’t work, while more advanced whitelisting-solutions are unmanageable. How do you overcome the manageability and operational challenges of advanced malware protection?

March 12, 2013 | Speaker: Dana Tamir, Director of Product Marketing, Trusteer

Blacklisting solutions can't effectively detect or prevent exploits that are designed to evade them, while Application Controls have proven complex to deploy and manage. To stop zero-day application exploits and prevent the compromise of enterprise endpoints a new approach is needed.

February 12, 2013 | Speaker: George Tubin, Senior Security Analyst, Trusteer

Current fraud prevention technologies are simply not capable of identifying and preventing Account Takeover attacks and are overloading bank fraud prevention operation teams with unnecessary false positive alerts. To address these state of the art ATO attacks, a new, holistic approach to fraud prevention is needed.

November 07, 2012 | Speaker: Yishay Yovel, Vice President, Marketing, Trusteer

In 2011, nearly 70% of all data breaches involved advanced malware. It is clear that existing network and device security solutions are simply not enough. Trusteer protects hundreds of organizations and millions of end users with a proven approach to combat advanced threats: Application Protection.

October 02, 2012 | Speaker: Yishay Yovel, Vice President, Marketing, Trusteer

At the end of September 2012 the FBI issued a warning to financial institutions noting that fraudsters are now targeting their employees with advanced malware. Criminals have been using variants of Zeus and other advanced malware such as keyloggers and Remote Access Trojans to capture employee credentials and take over corporate endpoints. 

September 13, 2012 | Speakers: Dr. Chenxi Wang, Vice President of Security and Risk, Forrester Research, Yaron Dycian, Vice President of Products, Trusteer

In this educational webinar, guest speaker Dr. Chenxi Wang, Vice President and Principal Analyst serving Security and Risk professionals at Forrester Research, Inc., will discuss the security challenges associated with allowing BYOD access to sensitive data.