Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Insights from an MSP Partner | Jeremy Treister

Egnyte’s Director of MSP Community and Partner Enablement, Eric Anthony, catches up with CMIT Solutions of Chicago’s President, Jeremy Treister, to talk about the advantages and benefits of Egnyte’s MSP program. In this video, Treister discusses some of his favorite features of Egnyte and how they help him keep his users secure. Egnyte is trusted by more than 16,000 content-critical businesses worldwide.

How to threat hunt with mobile EDR

The Lookout Security Platform includes threat hunting capabilities as part of its mobile endpoint detection and response (EDR) solution. Watch Lookout security researcher Apurva Kumar walk through how she uses the Lookout console to investigate a security incident. Learn more about how you can secure your organization with EDR here: lookout.com/products/detection-and-response

Modernizing Government Cybersecurity with Zero Trust

Lookout CEO, Jim Dolce delivered a keynote address at the recent CyberTalks conference. In a time of disruption and uncertainty, cyberattacks have been on the rise and an Executive Order was issued requiring agencies to have a plan for Zero Trust. Learn how agencies can get started on this journey, securing apps, data, and resources, regardless of where they reside. This on-demand video recap provides guidance on how to stay ahead of the complex threat landscape posed by nation-states and other adversaries.

4 Step Guide To Vulnerability Assessment

Vulnerability Assessment is a process that defines, identifies, and prioritizes vulnerabilities in the computer system. Vulnerability assessment provides your organization the necessary knowledge, risk background, and awareness, and makes you react to threats when it comes to the environment. About Indusface: Indusface is a SaaS company that secures critical Web applications of 2000+ global customers using its award-winning platform that integrates Web application scanner, Web application firewall, CDN, and threat information engine.