Share this: 



Featured Webcasts

Managing Data Breaches
24th May 2016

Watch Now

Presenters Darrin Coulson, Dr. Felix Leder & Robert Arandjelovic discuss SSL-based threats and how Encrypted Traffic Management can help your organization, followed by a Q&A session.


Managing Encrypted Traffic
16th March 2016

Watch Now

Presenters James Stevenson, Andy Shepherd and Robert Arandjelovic discuss the threat posed by Data Breaches today and how the latest network forensics and security analytics technologies can speed up your response and time to remediate.


On-Demand Webcasts

2015 Shadow Data Report

Watch Now

Based on the analysis of over 63M documents, anonymized across the Elastica CloudSOC, the Shadow Data Report provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant. You’ll learn:

  • The most used business collaboration and file sharing apps
  • The types of sensitive data typically at risk in cloud sharing apps
  • Typi8cal techniques used to exfiltrate cloud data


A Clear Path to Cloud Security: From Hybrid to Pure SaaS

Watch Now

It’s clear that the move is on for enterprises to embrace and deploy cloud security services faster than ever before. But what’s driving this move to cloud, what are the benefits, and how do you decide between a pure cloud or hybrid-cloud deployment? In this program, you’ll be hearing from industry experts in cloud security at Gartner and Blue Coat who’ll be offering you key considerations and advice designed to help you to steer your security initiatives to the cloud—from a hybrid model to a pure SaaS deployment—while stepping you through the key decisions you’ll need to make along the way.


Bridge to the Cloud: Blue Coat webinar featuring Forrester

Watch Now

Watch this engaging, two-part webinar, featuring speakers from Forrester Research and Blue Coat, and learn how to tackle the security issues of the cloud. You’ll discover:

  • How to implement a hybrid deployment model that doesn’t compromise on security
  • Forrester’s vendor selection criteria for rock-solid security in the cloud
  • Innovative technologies that empower a secure move to the cloud


A Proactive Approach to Incident Response (APAC)

Watch Now

SANS Institute and Blue Coat will present practical, actionable steps to shorten the time to detect and respond to attacks. Join this webinar of industry experts and see examples of actual attacks, the key processes and technologies can be used to detect intrusions, respond quickly, and to reduce the financial impact.


SANS Institute Webcast: A Proactive Approach to Incident Response

Watch Now

Incident response costs skyrocket every year as the number of breaches increase. Whether it's paying for credit monitoring or credit card reissue, these activities are expensive. They are also brand damaging. Nobody wants to be remembered as the next "largest breach to date.

View this webcast and learn:

  • The differences between manual forensics, basic forensics, and proactive IR, including a case study that highlights those differences
  • Key components needed to achieve the holy grail of proactive IR
  • Actions a business can take to get there


Best Practices from SANS Institute: Eliminating SSL Encrypted Traffic Blind Spots

Watch Now

Gartner believes that, in 2017, more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls. Join us to learn best practices that can help eliminate security blind spots created by your encryption traffic.

See how you can:

  • Shut down the most common delivery mechanism for cyber threats
  • Orchestrate "payloads of interest" to existing defenses
  • Preserve privacy and compliance through policy


Security and Privacy on the Encrypted Network with Securosis

Watch Now

How can you effectively manage encrypted traffic while still addressing complex HR and compliance issues? Start by watching this two-part webinar from Blue Coat and Securosis.

You’ll learn:

  • Why the changing security landscape requires more encryption
  • Top use cases: What to decrypt to protect against data leaks and security threats
  • Solution selection criteria and deployment options
  • Blue Coat’s unique approach to Encrypted Traffic Management (ETM)


SSL Encrypted Traffic Management: Managing Risk Within Financial Institutions

Watch Now

Learn how to protect your financial data against advanced malware—hidden within encrypted traffic—in this 30-minute webcast.


Replay Webcast: Blue Coat's SSL Encrypted Traffic Management Solutions

Watch Now

Watch Blue Coat's replay webcast "SSL Encrypted Traffic Management" and, in 30 minutes, learn how you can:

  • Shut down the most common delivery mechanism for cyber threats
  • Orchestrate "payloads of interest" to existing defenses
  • Preserve privacy and compliance through policy


VisionStart Webinar Series: Revolutionize Advanced Threat Protection

Watch Now

The VisionStart webcast series showcase the components of effective Advanced Threat Protection Lifecycle Defense and provide a quick demo to see the process in action including:

  • Blocking and Protecting against all known threats
  • Analyzing and Mitigating threats that get by your perimeter defenses
  • Investigating and Remediating after a breach so you can quickly recover and effectively eradicate the threat


Next-Generation Malware Analysis for Advanced Threat Protection

Watch Now

Security threats keep getting more sophisticated. So should your defenses - and your response to today's advanced threat landscape.The best security is about strengthening your defenses against all threats — known and unknown — and leveraging a global intelligence network to accelerate remediation and resolution.

Watch the Blue Coat webcast on advanced threat protection and in only 20 minutes, you'll learn about:

  • Today's advanced threat landscape and challenges
  • Intro to the Advanced Threat Protection Lifecycle Approach
  • Blue Coat's Content Analysis System and Malware Analysis Appliance
  • Top deployment scenarios


Hidden Risks Series: True Mobile Malware Protection, beyond MDM

Watch Now

90% of enterprises will implement a Mobile Device Management (MDM) solution in the next two years. How many realize that today's MDM solutions do little to protect against malware?

In this webcast series we present important new findings from ESG Research that unveil:

  • The latest trends in mobile computing
  • The top challenges for mobile security
  • The shortcomings of MDM-only solutions
  • What's needed to bridge the mobile malware gap


Securing Financial Data against Targeted Cyber Attacks

Watch Now

Financial institutions with online banking websites have long been the primary targets of financially motivated cyber criminals, but recently crooks have turned their attention to new victims hosting high-volume, large-dollar transactions. Fast becoming the new targets of choice: the Automated Clearing Houses (ACH) of financial transactions in the United States and Single Euro Payments Area (SEPA) credit transfer agencies in Europe.

Topics include:

  • Malware targeting banking and financial services institutions and their customers
  • Financial regulatory environments, including compliance and reporting requirements
  • Beyond compliance – achieving best practices for safeguarding customer data
  • Case Study – SpyEye Banking Trojan


Finding Hidden Threats Within SSL/TLS Network Traffic

Watch Now

More than one-fourth of all traffic inside any organization is encrypted with SSL/TLS. How do you ensure the encryption is hiding only sensitive data and not malware or exfiltration of your data? What steps should you take to ensure your traffic is appropriately monitored and analyzed when users are connecting through the firewall or even internally with the SSL protocol? In this webcast, we describe why and how to use a SSL/TLS decryption and filtering tool to enhance the effectiveness of SIEM collection, Data Loss Prevention, and Intrusion Detection or Prevention Systems.

Embracing Mobility: Liberate Employees to Work Their Way – and Empower Your Business

Watch Now

The growing use of smartphones and tablets along with Bring Your Own Device (BYOD) initiatives are fundamentally changing the game. However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will*. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation— without compromising on security.

* According to a global survey of 1,900 IT and business leaders from the Economist Intelligence Unit (EIU).

Big Data Security Analytics - Implementing Modern Advanced Threat Protection

Watch Now

In this webinar you will learn how to:

  • Defend against malicious web sites and files, unknown and advanced malware, and zero-day threats with post-breach security for retrospective data capture, dynamic analytics, incident response and resolution
  • Detect viruses, malware and botnets missed by traditional security defenses
  • Understand how you can combine advanced web security and malware detonation with Big Data Security Analytics for unbeatable advanced threat protection.
Revolutionize Advanced Threat Protection

Watch Now

Organizations are often blind to the activities of cybercriminals, hactivists and Nation States due to the fact that advanced malware and zero-day attacks fly under the radar of even the most fortified enterprises. As organizations adjust to today's 'post-prevention' world, the inevitability of advanced targeted attacks and security breaches is now an accepted reality. As a result, there is a shift toward cyberattack 'preparedness' and a strong post-breach security posture. With this shift comes a need for full security visibility, security analytics and dynamic threat intelligence.