Webcasts
Featured Webcasts
![]() |
Mail Threat Defense
Presenters Thomas Quinlan & Robert Arandjelovic examine the challenges of traditional email-based security, and how organizations can supplement those defenses to deal with the most sophisticated threats.
|
![]() |
Cloud Data Control – The Key to Secure Cloud Adoption
The debate rages: Which is more secure, the datacenter or the cloud. In part, this depends on what policies and procedures companies use to protect data in transit to the cloud and how they store their data at rest in the cloud. This SC Virtual Conference looks at best practices to ensure data is secure in the cloud and SaaS environments. Presented by Gerry Grealish
|
![]() |
SANS Institute What Works: Inspecting Encrypted Traffic with the Blue Coat SSL Visibility Appliance
Many companies think they face a difficult choice: Do you get full visibility into the security threats hiding in your encrypted traffic, or do you keep your networks running at full speed? Get solid advice and real results from a real-world company. Watch the webcast that shows how a global media company overcame the dilemma using the Blue Coat SSL Visibility Appliance.
|
![]() |
ProxySG+Audit
Blue Coat recently acquired Elastica, the leading cloud access security broker (CASB) technology startup, and has integrated Elastica's shadow IT visibility and reporting capabilities with an Intelligence data feed to ProxySG/SWG appliances, providing policy-based access control over shadow IT. Watch the webinar that shows you how it works together to help you cut the risk and regain control over shadow IT.
|
![]() |
2015 Shadow Data Report
Based on the analysis of over 63M documents, anonymized across the Elastica CloudSOC, the Shadow Data Report provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant. You’ll learn:
|
Webcast Featuring Gartner
![]() |
A Clear Path to Cloud Security: From Hybrid to Pure SaaS
It’s clear that the move is on for enterprises to embrace and deploy cloud security services faster than ever before. But what’s driving this move to cloud, what are the benefits, and how do you decide between a pure cloud or hybrid-cloud deployment? In this program, you’ll be hearing from industry experts in cloud security at Gartner and Blue Coat who’ll be offering you key considerations and advice designed to help you to steer your security initiatives to the cloud—from a hybrid model to a pure SaaS deployment—while stepping you through the key decisions you’ll need to make along the way.
|
On-Demand Webcasts
![]() |
Bridge to the Cloud: Blue Coat webinar featuring Forrester
Watch this engaging, two-part webinar, featuring speakers from Forrester Research and Blue Coat, and learn how to tackle the security issues of the cloud. You’ll discover:
|
|
![]() |
A Proactive Approach to Incident Response (APAC)
SANS Institute and Blue Coat will present practical, actionable steps to shorten the time to detect and respond to attacks. Join this webinar of industry experts and see examples of actual attacks, the key processes and technologies can be used to detect intrusions, respond quickly, and to reduce the financial impact.
|
|
![]() |
SANS Institute Webcast: A Proactive Approach to Incident Response
Incident response costs skyrocket every year as the number of breaches increase. Whether it's paying for credit monitoring or credit card reissue, these activities are expensive. They are also brand damaging. Nobody wants to be remembered as the next "largest breach to date. View this webcast and learn:
|
|
![]() |
Best Practices from SANS Institute: Eliminating SSL Encrypted Traffic Blind Spots
Gartner believes that, in 2017, more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls. Join us to learn best practices that can help eliminate security blind spots created by your encryption traffic. See how you can:
|
|
![]() |
Security and Privacy on the Encrypted Network with Securosis
How can you effectively manage encrypted traffic while still addressing complex HR and compliance issues? Start by watching this two-part webinar from Blue Coat and Securosis. You’ll learn:
|
|
![]() |
SSL Encrypted Traffic Management: Managing Risk Within Financial Institutions
Learn how to protect your financial data against advanced malware—hidden within encrypted traffic—in this 30-minute webcast.
|
|
![]() |
Replay Webcast: Blue Coat's SSL Encrypted Traffic Management Solutions
Watch Blue Coat's replay webcast "SSL Encrypted Traffic Management" and, in 30 minutes, learn how you can:
|
|
![]() |
Next-Generation Malware Analysis for Advanced Threat Protection
Security threats keep getting more sophisticated. So should your defenses - and your response to today's advanced threat landscape.The best security is about strengthening your defenses against all threats — known and unknown — and leveraging a global intelligence network to accelerate remediation and resolution. Watch the Blue Coat webcast on advanced threat protection and in only 20 minutes, you'll learn about:
|
|
![]() |
Hidden Risks Series: True Mobile Malware Protection, beyond MDM
90% of enterprises will implement a Mobile Device Management (MDM) solution in the next two years. How many realize that today's MDM solutions do little to protect against malware? In this webcast series we present important new findings from ESG Research that unveil:
|
|
![]() |
Securing Financial Data against Targeted Cyber Attacks
Financial institutions with online banking websites have long been the primary targets of financially motivated cyber criminals, but recently crooks have turned their attention to new victims hosting high-volume, large-dollar transactions. Fast becoming the new targets of choice: the Automated Clearing Houses (ACH) of financial transactions in the United States and Single Euro Payments Area (SEPA) credit transfer agencies in Europe. Topics include:
|
|
![]() |
Embracing Mobility: Liberate Employees to Work Their Way – and Empower Your Business
The growing use of smartphones and tablets along with Bring Your Own Device (BYOD) initiatives are fundamentally changing the game. However, 76% of IT leaders see security as a barrier to enabling employees to choose their own devices, technology and applications at will*. You have the unique opportunity to empower your organization by helping it embrace the new possibilities of mobility and its promise of collaboration, productivity, and innovation— without compromising on security. * According to a global survey of 1,900 IT and business leaders from the Economist Intelligence Unit (EIU). |
|
![]() |
Big Data Security Analytics - Implementing Modern Advanced Threat Protection
In this webinar you will learn how to:
|
|
![]() |
Revolutionize Advanced Threat Protection
Organizations are often blind to the activities of cybercriminals, hactivists and Nation States due to the fact that advanced malware and zero-day attacks fly under the radar of even the most fortified enterprises. As organizations adjust to today's 'post-prevention' world, the inevitability of advanced targeted attacks and security breaches is now an accepted reality. As a result, there is a shift toward cyberattack 'preparedness' and a strong post-breach security posture. With this shift comes a need for full security visibility, security analytics and dynamic threat intelligence. |



