Updates & Activities
Sailpoint: Empowering Online in the Time of Covid-19
When teaching and learning turns digital, whether it is new student enrolments, staff moving faculties, or changing roles between students and staffs – does your institution know who has access to what, should they have access, and how are they using their access?
Join SailPoint for a webinar and hear from Tommy Hor, Chief IT Officer of National University of Singapore of how NUS is teaching remotely and securely.
Register at: https://sailpoint.zoom.us/…/regis…/WN_TGKEoAMQTGOVFZQZVQHFSw
Bluedog: Cybersecurity Monitoring for All
Studies show that hackers attack every 39 seconds on average of 2,244 times a day and 68% of business leaders feel their cybersecurity risks are increasing (IBM and University of Maryland), which makes cybersecurity important. However, these solutions come at a lofty price.
Bluedog Security Monitoring offers an enterprise grade network monitoring solution that is simple and affordable. They bring high quality technology, support and service to the small to medium business, helping protect their business from cyber threats.
For Bluedog, security is about people, not technology. They are dedicated to keep attackers away with their exceptional machine learning to stop attacks at the early age and with their fully staffed Security Operation Center (SOC) that monitors, detects, alerts and take action 24/7/365.
Let Bluedog take control of your cybersecurity at an affordable price.
STORAGECRAFT FBR-FREE 30 DAY TRIAL
StorageCraft File Backup and Recovery with Backup Analyzer makes it easy and efficient to back up critical organizational data that is stored on laptops, workstations, and home computers. This solution also makes it easy for remote users to find and recover individual files and folders from the web-based interface.
REQUEST YOUR 30-DAY FREE TRIAL NOW AT: https://goto.storagecraft.com/Global-EMEA-Ongoing-FBREvalua…
Sophos Webinar: Save up to 70% with SD-WAN
SD-WAN offers a whole host of benefits for distributed organizations, but the main pull is that it is a MUCH lower cost solution than MPLS (the traditional solution). And guess what? XG Firewall now comes with integrated SD-WAN!
If you would like to find out more about the benefits of SD-WAN, how it works and how XG Firewall can enable your SD-WAN goals, join us for a webinar on September 22, 2020, 2:30PM SGT.
• Distributed organizations & MPLS
• Introduction to SDWAN
• SDWAN architectures
• Sophos SDWAN advantages
• Use cases
• Q & A
Register at: https://bit.ly/2DFZ0z6
Sophos Webinar: The ABC’s of New Normal
Most if not all of the companies have crossed the ‘working from home’ or ‘remote working’ bridge. Accelerated by COVID-19, we have quickly adapted to this new setup. In light of this new norm, companies are also studying the possibility of having this as a permanent solution.
Join us as Sophos shares in this webinar the significance of incorporating cybersecurity to align with your business strategy and how we can help you prepare for this new change.
The new normal
Security measures when working remotely
Security in a box
Register now at https://bit.ly/355XSQF
Fortanix: A New Vendor of ITSDI
Encryption and authentication are some of the ways to adhere to the Data Privacy Act of 2012 in protecting Personal Identifiable Information (PII). To ensure data is protected throughout the lifecycle, data must be encrypted. Traditional encryption solution only secures data at rest and in motion, leaving it vulnerable in use.
The Fortanix Runtime Encryption® can protect data in use, delivering full security protection all through the life cycle of the data. It creates a portable security envelope that runs signed applications in completely protected states and protects applications even if the infrastructure is compromised.
Partnering with Fortanix, we have strengthened our commitment in order to meet the demands of the ever-changing cybersecurity threat landscape by providing a holistic approach to cyber security. This enables organizations to stay ahead of cyber threats and threat actors.
With ITSDI, cybersecurity is made easy.
Symantec has been a part of ITSDI for 5 years and we will always be grateful to our partners & principal for the fruitful journey together. ITSDI’s distributor agreement with Broadcom has ended last June 8, 2020, but our goal of keeping cyberspace safe and free still remains the same. If you wish to continue with Symantec, our technical team can still support you. Our account managers can also discuss our other solutions in case you want to check other alternatives.
Rest assured that all of our products have their own strength and positioning in the market which gives us the chance to serve more clients and be on top of cybersecurity issues. We have updated our portfolio which includes world class solutions for endpoint protection, EDR, DLP, email security, web security, encryption, multi-factor authentication, managed security, threat intelligence, incident response, identity access, privilege access, threat analytics, and much more. Therefore, we remain strong and committed in making cybersecurity easy. Please take a look at our product portfolio for the updated solutions that we are currently carrying.
SOPHOS: MAKE SWITCH TO INTERCEPT X
To stop modern threats, you need endpoint protection that makes use of the very latest defenses such as machine learning and anti-ransomware protection. Join us this August 12, 2020 and learn how Sophos Intercept X can help your business be protected against all treats.
ARCTIC SECURITY: FREE SECURITY POSTURE REPORT
Arctic Security is offering a complimentary service whereby they will give interested organizations a report showing their security posture. Their objective is help organizations to improve their overall cyber hygiene through Arctic Security Victim Notification Service.
Here is the link on how to register and get a report for this service – https://arcticsecurity.com/check
McAfee: MVISION Your Cybersecurity
As more businesses are shifting to cloud, threats and vulnerabilities are increasing as well.
Join us this August 20, 2020 from 2pm to 4PM and learn how Mcafee can help you evolve your business confidently by leveraging security solutions purpose-built with transformation in mind.
Mr. Raphael Anton Orpilla, Security Architect of McAfee will discuss Cloud Workload Security.
Awesome raffle prizes await!
To register: https://bit.ly/3eOORwy
Skybox Webinar: Leveraging Skybox to Demonstrate ISO 27000 Compliance
Depending on industry governance requirements, organizations must adhere to specific security compliance frameworks such as NIST, ISO, PCI and others. One way that organizations of different types and sizes are shielding themselves is by adhering to the Security Information Standard (ISO) 27000 which is focused on Information Security Management System (ISMS). The ISO27000 cyber security standard helps you manage the confidentiality, integrity and availability of your assets.
In this session, we will look into the high-level understanding of these two ISO domains and how Skybox can provide the context and help track your adherence to your ISMS. Attend this workshop delivered by their Technical Director, Rahim Malek to:
• Understand ISO 27001/2 and ISO 27005
• Use Skybox to develop the process to comply and maintain adherence to the standard
• Demonstrate Skybox ISO dashboards and reporting
Register here: https://bit.ly/3jHhyzd
Skybox Webinar: Integrating Microsoft Endpoint Security
Today’s enterprises are challenged with managing the security of complex networks that are distributed across physical and virtual environments. These environments are evolving at a rapid rate, potentially leaving them exposed and prone to attack. Organizations need the ability to intelligently merge asset and vulnerability data from multiple sources to create a single source of truth to manage all vulnerabilities.
Skybox has partnered with Microsoft to provide its enterprise console for Microsoft Defender. With Skybox and MDATP, customers can develop an enterprise vulnerability management program and utilize the exposure metric to prioritize vulnerabilities.
Join us on 22nd July at 1 pm SGT / 10 am BST for this 30-minute technical workshop “Integrating Microsoft Endpoint Security” delivered by Skybox Security’s Senior Technical Director, David Schyschow as he demonstrates:
• The use of WMI mechanisms to deliver an offline assessment of air-gapped environments
• How to gain full visibility of vulnerabilities using OS-based components
• Build easy-to-read yet comprehensive data acquisition dashboards
• Leverage the untapped data within your patch management systems such as SCCM and WSUS
This session is aimed at users who have experience in vulnerability management and a basic understanding of PowerShell. Register Now.
Cyberbit Webinar: Using MITRE ATT&CK As Your Cybersecurity Training Framework
In the last decade, MITRE ATT&CK framework has become the de-facto taxonomy for categorizing attacker techniques, often used by organizations for evaluating the effectiveness and coverage of threat detection platforms.
Cybersecurity leaders have recently begun to map their training programs to MITRE to make sure Blue Teams are best prepared to respond to most attacks they encounter in real-life.
Can MITRE be used both as an attack mapping and a training asset?
In this webinar, we will present practical ways to use MITRE as a training framework, from the eyes of a cybersecurity instructor. This webinar is intended for cybersecurity leaders and practitioners, rethinking their training programs.
Join our webinar on Thursday, July 30th at 10:30 AM CET | 2 PM India | 4:30 PM HK, to learn:
• The fundamentals of MITRE ATT&CK
• How you can start using MITRE ATT&CK Enterprise, to develop playbooks and refine your cybersecurity training program
• Where in your training planning is it better NOT to use MITRE ATT&CK but alternative standards
Click here to sign up for the webinar.
Digicert Webinar: Secure Your Remote Workforce
COVID-19 has changed the security landscape as we know it. As more employees have been working from home, this has created a need to secure your remote workforce more than ever, and to rethink current security practices within the organisation. I would like to invite you to DigiCert Secure your remote workforce webinar on July 15th July at 2:30pm (SGT) where DigiCert CTO, Jason Sabin and Brian Trzupek, SVP of Emerging Markets Products, will discuss:
– Authenticating employees to corporate services
– Sending signed and encrypted emails
– Securely signing important business documents
You can register for the webinar here.
Fortanix Data Security Expert Webinar Series
You are invited to attend the Fortanix Data Security Expert Webinar series, where Fortanix subject matter experts will conduct a demonstration of how to implement multi-cloud data security capabilities such as key management, encryption, tokenization and secrets management for AWS, Azure, and GCP. According to Gartner, 70% of enterprise businesses are adopting either a hybrid cloud or a multi-cloud strategy to drive business agility. Based on the Cloud Threat Report 2019 released by Oracle and KPMG, 71% of data now in the public cloud is “sensitive”. As workloads and sensitive data move to the cloud, customers need a way to control and centrally manage their cryptographic keys, secrets, and tokens in order to secure the public cloud deployments that are driving their digital transformation. This webinar will include discussion of the following security considerations associated with the implementation of public cloud within your enterprise infrastructure:
Managing data security for hybrid cloud deployment models.
Multi-Cloud Key management in AWS, Azure and GCP.
Hardware Security Module (HSM) architectures for public cloud.
Database encryption options for public cloud.
Steps in migrating the data security of on-premises applications to public cloud services.