Webinars

Upcoming Webinars


IoT Tests and Trends: Key Findings from WatchGuard's Threat Lab

Thursday, June 29, 2017
9AM PST, 12PM EST

IoT business is booming, with manufacturers connecting any and every “thing” – cars, cameras, lightbulbs, coffee makers! – to the Internet, to the delight and convenience of consumers. But as pressure grows to release new products faster and faster, we’re all left to wonder: is security really a priority? Needing an answer, WatchGuard’s Threat Lab launched an ongoing project to test some of these connected devices and determine for ourselves how secure they really are.

Join Marc Laliberte, information security threat analyst, and Ben Brobak, technical product manager, on June 29 as they analyze the surprising results of this project and share their best tips for defense.

On-Demand Webinars


Thursday, June 1, 2017
The WannaCry ransomware attack that crippled hundreds of thousands of computer systems has made the threat of ransomware front-page news around the globe. This news should be especially daunting to small to midsize businesses as research shows that these businesses suffer from a greater frequency of successful ransomware attacks than larger organizations. With the stakes – and costs – of a ransomware attack higher than ever, what can small to midsize businesses do to protect themselves? Read more...
Thursday, May 25, 2017
Cloud Security Strategies for SMBs: Top Trends and Tips
Small and midsize businesses are rapidly moving to the cloud to reduce infrastructure costs while gaining scalability and efficiency. Email servers, web servers, customer relationship manager systems, and even file storage are migrating to off-site services such as Salesforce, Microsoft Azure, and Amazon Web Services. In this webinar, WatchGuard will discuss the security implications as SMBs migrate services out of their security perimeter, and the steps that should be taken to ensure their business-critical systems remain secure in the cloud. Read more...
Tuesday, January 31, 2017
When cyber criminals lurk behind every dark corner of your network, where do you look for protection? Having disparate security solutions – from the network, endpoint, and threat intelligence feeds – is no longer enough. There needs to be correlation among these environments, or bad actors are certain to exploit your technology silos. Join Alexandra Lating, Senior Product Marketing Manager, and Marc Laliberte, Information Security Analyst, for a look at the key players needed to defend your network, but more importantly – what happens when you bring them together. Read more...
Thursday, December 15, 2016
2017 is sure to be marked by significant change and innovation within the world of technology. But as technology evolves, cyber threats are all too certain to follow suit. With our best crystal ball firmly in hand, WatchGuard is proud to present our 2017 Security Predictions. Join WatchGuard CTO Corey Nachreiner and his panel of security experts for an exciting, interactive discussion on the upcoming year in network security. They’ll take a look at the top security trends that are the basis for our predictions, along with some key tips and tricks for staying ahead of them. Read more...
Thursday, November 17, 2016
Over 90% of all breaches are enabled by a few hundred commercial exploit kits that hackers share and sell in the black market. The typical IT environment may have thousands of unpatched vulnerabilities, but at any given time, only a small handful of vulnerabilities are being actively exploited. Read more...
Wednesday, October 26, 2016
Organizations across all industries are facing increased pressure from customers, vendors, and employees to offer Wi-Fi access. While offering this service provides significant gains, businesses cannot forget about the critical security measures needed to defend against wireless threats. Join Ryan Orsi, Director of Strategic Alliances, as he delves into the top challenges of deploying enterprise-grade, secure Wi-Fi, and the key solutions within reach of all organizations. Read more...
Thursday, October 13, 2016
New breeds of malware are emerging every day. These network threats can run the gamut from minor bugs, to ransomware programs used to extort money and subject victims to the mercy of their data kidnapper. All malware is unwanted, but which types of malware are the most deadly to the health of your network? Join Corey Nachreiner, CTO, and Marc Laliberte, information security analyst, as they discuss their Top 5 Least Wanted Malware: what they are, and more importantly, how to avoid them. Read more...
Thursday, August 25, 2016
Large corporations are no longer the primary target for hackers, making network security for small and mid-sized businesses more important than ever before. Ransomware has evolved dramatically over the last few years, but one thing remains the same: it can wreak havoc the likes of which many businesses will never recover from. Join Ben Brobak, Technical Product Manager, and Marc Laliberte, Information Security Analyst, as they take a look at the evolution of Ransomware – and the best ways for businesses to protect themselves. Read more...
Thursday, May 26, 2016
If you can’t see what’s on your network, then you can’t control it. As new technologies emerge each day, so do the associated security threats - are you confident that you can see them before they wreak havoc on your network? 86% of executives aren’t, believing there are gaps in their ability to see what’s really going on inside their network. Read more...
Wednesday, February 3, 2016
The demand for Wi-Fi access is exploding, with 63 percent of all Internet traffic projected to travel over Wi-Fi by 2019. For as much as Wi-Fi can do for your business, organizations that wish to take advantage can NOT forget about security. Join Ryan Orsi, Director of Product Management, and Nick Kelly, Director of Product Marketing, as they discuss the top 7 threats to your wireless network in 2016 and gain powerful insight and tips for protecting your wireless network. Read more...
Thursday, January 14, 2016
Imagine Threats This Year in Information Security
Imagine what will happen this year in information security. Our WatchGuard security experts recently identified a top ten list of security predictions that highlight new and emerging information security trends in 2016 – security threat trends that criminals may deploy using old and new methods to expand reach, exploit users and gain access to valuable data. Read more...
Monday, November 23, 2015
Protecting your remote locations
Worried about hackers breaking in your front door? Don’t be! They are already climbing in your windows. Remote locations are quickly becoming the number one target for cyber criminals. Why not, it’s the fast lane to your company’s most valuable assets, and expanding your company’s footprint often leads to new challenges and blind spots with data security, access, and visibility. WatchGuard is proud to present Biggest Security Blind Spot? — an interactive webinar that will bring distributed enterprise security issues to the surface. Read more...
Monday, October 19, 2015
8 Cyber-Security Tips I learned from The Walking Dead
Monday, October 12, 2015
Network Security, Game of Thrones-Style
Monday, June 22, 2015
Bring Big Data Visibility to Your Network Security
In network security, visibility is protection. That's WatchGuard Dimension. In this on-demand demo, Nick Kelly, Product Manager at WatchGuard Technologies, shows how WatchGuard Dimension gives you: Read more...
Wednesday, May 27, 2015
Just because Wi-Fi usage has outpaced your original plans doesn’t mean it should be the cause of heartbreak and misery. This is your chance to beat the Wi-Fi blues and keep your users from falling into a funk. In this hands-on webinar you’ll learn the top reasons why Wi-Fi networks become slow and unusable—and how to make it right. We’ll cover today’s best practices in Wi-Fi network design, including the latest capacity-planning approach that goes against conventional wisdom. We’ll cover how to: Read more...
Monday, May 18, 2015
What makes your company a hacker target? How do you know if an attack is imminent? What can you do to protect your network and data? Watch as WatchGuard’s Corey Nachreiner discovers his dark side and demonstrates real-world attack methods against servers, clients, and web applications. In this webinar you’ll learn: Read more...
Wednesday, April 15, 2015
The number of ransomware incidents has exploded in the last few years, infecting hundreds of thousands of victims and costing millions of dollars. Read more...
Tuesday, March 31, 2015
Red Carnation's luxury boutique hotels offer guests the best possible hospitality and the most memorable experiences. Getting hacked is not in this 5-star hotel's plans. With years of network security experience, IT Director Andy Evers is graciously extending his hospitality to his peers. Join Andy, along with WatchGuard’s Director of Security Strategy Corey Nachreiner, in a webinar just for hotel IT directors. You’ll learn what you need to know about: Read more...
Wednesday, March 4, 2015
Does Advanced Malware Affect Me? Gauging APTs for SMEs
Cyber criminals are targeting your network with a new generation of advanced malware. Many think they are ready to defend against today’s advanced threats. Are you? Don’t miss this on-demand webinar on the state of advanced malware featuring Corey Nachreiner, CISSP and Director of Security Strategy and Research for WatchGuard. Find out what to do NOW to protect your business. In this webinar you will: Read more...
Wednesday, February 18, 2015
Standalone industrial devices and proprietary networks used to be isolated from the outside world—or were simply too obscure to be a target. Not anymore. Industrial networks are now connected elements in the Internet of Things, and they have “hack me” written all over them. Your outdated security practices can put these systems—and even lives—at risk. Do you have industrial control or SCADA networks in these industries? Read more...
Wednesday, February 4, 2015
In Criminal Minds, things can get messy before the serial killer gets busted. In our version, the crime is less bloody, but no less harrowing. The perp is an advanced persistent threat (APT) and the victim is your network. The APT is stealthy, underhanded—and deadly. But our intrepid investigator is on the case. Join WatchGuard's Peter McNaull as he profiles this advanced malware threat, reveals its nasty upbringing, and walks you through how the crime went down. Our intrepid investigator will explain: Read more...
Thursday, January 29, 2015
The kill chain was designed to stop hackers at every step of an advanced network attacks. But the traditional kill chain is getting rusty. Kill Chain 3.0 makes sure you have the right layers of defense for today's sophisticated, multi-step hacks. Our expert panel will walk you through the traditional kill chain lifecycle, and show what needs to change so you can defend your organization at every step. You'll learn: Read more...
Wednesday, December 17, 2014
Encrypted Internet traffic is exploding Is your firewall slamming on the brakes? Mid-sized and distributed enterprises are about to hit some hard new realities: Double the amount of encrypted traffic in North America alone1 (thank you, Edward Snowden) Data usage of 52GB of data per person, per month1 Streaming video traffic that’s 15 times today’s level2 Find out what’s in the road ahead. Read more...
Wednesday, December 10, 2014
For 2015, WatchGuard security expert Corey Nachreiner has identified 5 security trends you shouldn't worry about-and 5 you should. From government policies to business practices to new technologies, Corey will help you gain some perspective around network security for the coming year. We can’t promise it will all be rainbows and unicorns. But if you're going to look to expert predictions for guidance, wouldn't it be nice to know what NOT to worry about? Read more...
Wednesday, December 3, 2014
2014 Security Predictions Retrospective
Behind every educated prediction is a pattern. And while WatchGuard’s security expert may not have a crystal ball, he has a great view of the trends and patterns that have led us to our current situation—and that inform the future. Join us as we put Corey Nachreiner on the hot seat to defend 2013’s predictions for 2014. We’ll find out what Corey’s biggest worries were then, and if those same threats should still be influencing your decisions. Some questions Corey covers: Read more...
Wednesday, November 19, 2014
Your network security is wrapped up so tight it’s hermetically sealed. Until a high-value employee takes work home. Suddenly, home office leaks are springing and you don’t have enough fingers to hold back the flood: Read more...
Thursday, November 6, 2014
Cyber Monday means great online deals. Many workers are expected to spend some time at work shopping online for the holidays. But excessive shopping activity can bring your network to a screeching halt—not to mention the threats from iffy bargain websites that can tempt unwary shoppers. In less time than you’ll spend standing in a holiday checkout line, our webinar and live demo will show you how to protect your network before the cyber-frenzy begins: Read more...
Thursday, October 30, 2014
Network segmentation is clouded with myths. It’s complicated. It’s misunderstood. And it can be deadly if you get it wrong. (Just ask any major retailer that has experienced a breach lately.) It’s time to clear up the myths and get the facts. In this in-depth webinar, we’ll walk through the most common myths around network segmentation: Read more...
Wednesday, October 22, 2014
Does this sound familiar? Employees hit “download” and then go to lunch while they wait for important files. Or, your last video conference sounded like an Elmer Fudd convention. Join WatchGuard’s Brendan Patterson and Ben Brobak for a webinar full of practical techniques to manage network bandwidth: Read more...
Wednesday, September 3, 2014
Cyber criminals are targeting your network with a new generation of advanced malware. Many think they are ready to defend against today’s advanced threats. Are you? Don’t miss this on-demand webinar on the state of advanced malware featuring Corey Nachreiner, CISSP and Director of Security Strategy and Research for WatchGuard. Find out what to do NOW to protect your business. In this webinar you will: Read more...
Tuesday, August 5, 2014
If you're an IT security pro, chances are you’ve recently spent some quality time with your CEO. Maybe for the first time ever. The Target breach has put network security on the board room agenda for CEOs. Are you sure you and your team are ready to deliver top-notch security? Make sure by joining this webinar with guest Forrester Research, Inc. Analyst John Kindervag and WatchGuard Director of Security Strategy Corey Nachreiner. You’ll walk away with key tips to ensure you and your CEO are on the same page, working together to successfully secure your organization...and your careers. Read more...
Wednesday, June 18, 2014
Security breaches are costing businesses millions and the C-suite – their jobs. Target thought they were ready to defend against today’s advanced malware? Are you? Read more...
Thursday, April 17, 2014
Watch Mike Rothman, Corey Nachreiner, Patrick Kelley, John Stengel, and discussion attendees talk about the rapidly evolving nature of APTs and new security technologies that protect against them. Read more...
Wednesday, April 16, 2014
If you’re looking at throughput as a measure of performance, you’re missing the mark. Unified threat management solutions run layers of services that inspect all traffic to guard your network against blended threats. So if you’re just looking at throughput as a measure of performance, you’re thinking about performance all wrong. You need to see how modern security appliances perform while running with a full load. Read more...
Monday, March 31, 2014
Learn to Overcome the Key Network Security Issues Facing Mid-Sized Organizations
You face the same concerns as larger organizations, including mobile devices, increasing threats with more tools to mitigate them, and desire to reap the benefits of virtualization and the cloud. Read more...
Thursday, March 20, 2014
Fill out the brief form below to watch this free on-demand webinar.
Watch this webinar and hear from Corey Nachreiner, Director of Security Strategy and Research for WatchGuard Technologies, about the rise in POS malware. Read more...
Wednesday, February 26, 2014
The home office. One of the weakest links to your company's most valuable assets. Intellectual property (IP). For today's enterprises, it is more valuable than money, capital or labor - but it is also more vulnerable. Where it is often most vulnerable is in the home offices of high-value employees, who have sensitive data in their email, but generally have no end-point security. Read more...
Thursday, February 20, 2014
Over a decade ago, malware primarily entered our networks through malicious emails containing nasty attachments. However, the threat landscape has evolved quite a bit over the past five years. Today, the Web is the battleground. While email remains a substantial vector of attack (especially targeted phishing emails), a large majority of today’s network assaults happen via web traffic. In fact, one common blackhat technique combines web applications flaws and client software exploits into a "one-two punch" web attack. Read more...
Thursday, February 20, 2014
Fill out the brief form below to watch this free on-demand webinar.
Is your consumer credit card data safe? Watch this free webinar to learn how small and medium-sized businesses are at particular risk for data theft. Brendan Patterson, Sr. Product Manager at WatchGuard Technologies explains what's new in version 3.0 and how Unified Threat Management (UTM) can help your business meet the PCI DSS requirements without breaking your budget. Read more...
Wednesday, February 5, 2014
UTM or Not to UTM In this WatchGuard webinar, learn why UTM is a big market that is growing at twice the speed of the network security market as a whole. No surprise, it's the benefits. Read more...
Tuesday, January 21, 2014
Class Is in Session
Cursive. Long division. Capture the flag. Not everything you learned in school has delivered a strong return on investment. When it comes to managing IT security for an educational institution however, it pays to make honor roll. Read more...
Wednesday, December 18, 2013
2014 Security Predictions: Defending Against Future Digital Disasters
Is a Hollywood-level hack just around the corner? Will malware get meaner and more destructive? Are criminals becoming cyber kidnappers and what does that mean? Is there any good news? Read more...
Thursday, September 19, 2013
Better Security Without the Risk: The Integrated DLP Solution
Data breaches are on the rise–and all businesses are vulnerable to attacks and data loss. With an average cost of $136 per exposed data record, organizations can't afford to let sensitive information leave their corporate networks. Read more...
Tuesday, July 23, 2013
Get the latest updates on this year's biggest cyber threats and how you can protect your network, in a live webinar from WatchGuard.
You're half way through 2013, but there are more threats on the way-from mobile malware to BYOD, virtualization threats and new cyberlaw, plus the potential of digitally-delivered death. In this on-demand webinar from WatchGuard, find out how our 2013 predictions stacked up, and what you need to do to keep your network, applications, and data safe. Read more...
Thursday, July 11, 2013
Are You a Target?
What makes your company a potential target? How can you know if your network is being set up for an attack? What can you do to protect your network and data once you've been targeted? Read more...
Tuesday, June 18, 2013
Click play on the video below to watch this free on-demand webinar.
The good news: Employees are happier and more productive when they use their own devices. The challenge for IT? Keeping wireless networks safe despite the fact that personal devices and apps open the door to data loss and threats. Read more...
Friday, May 3, 2013
Staying ahead of threats isn't easy. New, blended threats emerge every day, while the cloud, BYOD, and Web 2.0 open up new attack vectors. Point solutions can't protect your organization—even next-generation firewalls can't keep up. Read more...
Wednesday, April 3, 2013
Click play on the video below to watch this free on-demand webinar.
Managing the IT systems for any educational institution is no small feat. First you have a user base that ranges from students to faculty. You have a network that's spread over a large area. And you need to bring control and security into an environment that encourages intellectual freedom. So how do you find a balance? Read more...
Thursday, March 14, 2013
Click play on the video below to watch this free on-demand webinar.
Securing sensitive data takes on a whole new meaning when you're talking about healthcare information. Compliance mandates, like HIPAA and HITECH, call for broad security measures to ensure that healthcare data is accessible-and safe. Read more...
Thursday, March 7, 2013
Click play on the video below to watch this free on-demand webinar.
The proliferation of smart mobile devices like tablets, smartphones and notebooks is driving the BYOD explosion and putting ever-increasing demands on wireless networks. Organizations want to harness the productivity gains these devices provide, but without putting network assets at risk. Read more...
Tuesday, February 19, 2013
Click play on the video below to watch this free on-demand webinar.
It's a brand new year for cyber criminals—and there's a whole new list of threats. From mobile malware to Man-in-a-Browser, the game to exploit your network has changed. The challenge? Protecting your network for what's coming next. Read more...
Tuesday, February 19, 2013
Click play on the video below to watch this free on-demand webinar.
Today's retailers need to connect to multiple locations, however a distributed network leaves them wide open to attacks. Each retail location is a potential threat vector that can give hackers access to credit card data-creating a security and risk nightmare. Read more...
Thursday, January 10, 2013
Click play on the video below to watch this free on-demand webinar.
It's happening. Smartphones, tablets and personal devices are entering the corporate network, creating new security risks. The challenge is to support the productivity BYOD offers, while staying in control of security — and your company's data. Read more...
Friday, December 28, 2012
Click play on the video below to watch this free on-demand webinar.
The security landscape is littered with many confusing buzzwords. The bottom line is the corporate network must be secure, significant security risks must be minimized, and employees must be productive. This is where Unified Threat Management comes in (and, yes, it is a buzzword). Read more...
Thursday, December 20, 2012
Click play on the video below to watch this free on-demand webinar.
Join WatchGuard Technology's Vice President of Corporate Strategy & Marketing, Dave Taylor, as he discusses the "6 Dirty Secrets of Security Breaches." Read more...

About WatchGuard

WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle. Why buy WatchGuard? Find out here.

 

GET IN TOUCH

  • Global Headquarters
    505 Fifth Avenue South, Suite 500
    Seattle, WA 98104, United States
  • Phone
    1.800.734.9905 US & Canada