PRODUCT UPDATE BULLETIN

Size: px
Start display at page:

Download "PRODUCT UPDATE BULLETIN"

Transcription

1 February 2018 PRODUCT UPDATE BULLETIN WEBROOT SECURITY AWARENESS TRAINING Overview The version 2.0 release of Webroot Security Awareness Training incorporates a variety of enhancements, some as part our ongoing development roadmap, and others a result of direct feedback from MSP partners and business customers. New features in this release Multi-Campaign Scheduling: Increases automation by allowing administrators to schedule a series of education events to be delivered to users at a given site. Executive Campaign Summary Report: This new client-facing report summarizes campaign statistics to clearly demonstrate the value of Security Awareness Training to management and decision-makers. Template Categorization: We have added further template categorization data to help admins filter training content by Region, Country, Tags, or Language. Simplified Domain Validation: We ve removed the need to use the pre-validated, preset addresses. Instead, admins can now validate any address they want to use for a campaign. Improved Customer Trials: Customers can now view previews of any training courses available from within the console. Note: trials will still be limited to the Understanding Malware course, with unlimited phishing simulations. New Courses: We have added seven new cybersecurity training courses and four bonus IT skills courses that cover the primary Microsoft Office applications. We have also readded HIPAA Privacy and Security, as well as new, regionally focused phishing templates for Australia, Ireland, and the UK. Upcoming enhancements: We plan to modify the Global Site Manager console to feature a new Trials page, where administrators can start trials without having to secure a license. Webroot Security Awareness Training enhancements 1.Multi-Campaign Scheduling Our new scheduling feature set, called Programs, allows admins to automate and schedule campaign tasks. Tasks include sending a Welcome to introduce Security Awareness Training or announce to management or employees that a new campaign has been scheduled. Additionally, phishing campaigns and training campaigns can be scheduled and automated. New Program Scheduling

2 To begin a new program, click Programs > Create a new Program. You can then name your program, add a description, and begin scheduling tasks. Optional: you can also use the Reports feature to send campaign summary reports to any address(es) you choose. New Program Scheduling New Program Scheduler with Date Picker

3 New Program Scheduler with Template Selector 2. Executive Campaign Summary Report A new campaign summary report has been added that summarizes phishing campaign metrics into an exportable PDF. The campaign summary report includes Campaign Name, Launch Date/Time, Target Users, Description, Notes (Editable), Clicked/Not Clicked stats, Processed/ Clicked/Visits, graphs, and screenshots of the templates and lures used.

4 3. Template Categorization We ve added a new Categories feature to templates to allow administrators to organize and group templates by any categories they choose to name. This feature is useful for grouping content together by industry, region, type, department, etc. New Categories feature Allows admins to name Categories for easier grouping and selection

5 4. Simplified Domain Validation Previously, we required a pre-set list of administrative addresses to validate a domain for use. We ve changed our domain verification requirements to allow admins to use any valid addresses for verification. New Simplified Domain Validation 5. Improved Customer Trial: Preview All Courses Previously, trial subscriptions only offered preview and use of the Understanding Malware course. Now, all courses can be previewed within the console during a trial. Trial campaigns are still be limited to Understanding Malware as far as the courses admins can run, but you can preview all the courses we offer within the console under Settings > Courseware New previews of all courses 6. Ten New Courses With the new release, we ve added 10 new courses to our ever-growing Security Awareness Training courseware library:

6 Featured Cybersecurity Course 1. Understanding Phishing Length: 8 min (Full) + 3 min / 1 min (Abbreviated) Description: Comprehensive phishing course with an overview of different types of phishing attacks, the risks phishing poses to users and companies, as well as best practices to avoid falling for a phishing attack. Includes real-world scenarios and examples. Compliance Courses: 2. Global Privacy and Data Protection Description: Privacy awareness for the global workforce. Can accompany the GDPR course and covers privacy and data protection from a global vantage point. 3. Freedom of Information Act (FOIA) Description: A UK compliance course that focuses on the UK Freedom of Information Act. 4. Whistleblowing Length: 15 min Description: A UK compliance course that includes an overview of whistleblowing, why it is important, and how you are protected under UK law. 5. Anti-Money Laundering Length: 10 min Description: A UK compliance awareness course around money laundering, what it is, why it s illegal, and how to recognize it.

7 6. Bribery Act Length: 10 min Description: A compliance course focused on the UK-based Bribery Act of IT Skills and Productivity Courses: 7. Start Using Outlook Description: A beginner s guide to Microsoft Outlook. Learn how to manage , calendar, and contacts in Outlook. Watch the full course or select specific skills you want to sharpen. 8. Start Using Word Description: A beginner s guide to Microsoft Word. Learn how to create, edit, and manage Word documents. Watch the full course or select specific skills you want to sharpen. 9. Start Using PowerPoint Description: A beginner s guide to Microsoft PowerPoint. Learn how to make stunning presentations using PowerPoint. Watch the full course or select specific skills you want to sharpen. 10. Start Using Excel Description: A beginner s guide to Microsoft Excel. Learn how to use manage spreadsheets, create formulas and pivot tables. Watch the full course or select specific skills you want to sharpen.

Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Types...

Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding  Types... Overview... 3 Provisioning Sites for Security Awareness Training... 3 Understanding Phishing Simulations... 6 Understanding Email Types... 6 Understanding Programs and Campaign Scheduling... 6 Welcome

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

Rehmani Consulting, Inc. VisualSP 2013 Help Items. SharePoint-Videos.com

Rehmani Consulting, Inc. VisualSP 2013 Help Items. SharePoint-Videos.com Rehmani Consulting, Inc. VisualSP 2013 Help Items SharePoint-Videos.com info@sharepointelearning.com 630-786-7026 Contents Contents... 2 Introduction... 3 VisualSP 2013 Help Ribbon Details... 4 Document

More information

Competitive Matrix - IRONSCALES vs Alternatives

Competitive Matrix - IRONSCALES vs Alternatives Competitive Matrix - IRONSCALES vs Alternatives Traditional Awareness and Training Features IRONSCALES SEG PhishMe Wombat Knowbe4 Sans Institute Simulation & Training Compliance PCI/DSS, HIPAA, GLBA to

More information

VisualSP 2016 Help Items

VisualSP 2016 Help Items Rehmani Consulting, Inc. VisualSP 2016 Help Items http://www.visualsp.com vsp-support@visualsp.com 630-786-7026 Doc Rev 6.2.1 for VSP 5.2.0.0 Contents Contents... 2 Introduction... 3 VisualSP 2016 Help

More information

HIPAA 2017 Compliancy Group, LLC

HIPAA 2017 Compliancy Group, LLC 1 Meet Your Expert Charles Weiselberg Compliancy Group, LLC Director of Customer Service Chuck@compliancygroup.com ENDORSED PARTNER 2 Compliancy Group We simplify compliance so you can confidently focus

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

Microsoft Powerpoint 2015 Advanced Training Manual READ ONLINE

Microsoft Powerpoint 2015 Advanced Training Manual READ ONLINE Microsoft Powerpoint 2015 Advanced Training Manual READ ONLINE If you are searched for the book Microsoft powerpoint 2015 advanced training manual in pdf format, in that case you come on to loyal site.

More information

Know Your Customer. c360 Microsoft Dynamics CRM 4.0 Product Catalog

Know Your Customer. c360 Microsoft Dynamics CRM 4.0 Product Catalog c360 Microsoft Dynamics CRM 4.0 Product Catalog Know Your Customer c360 products extend the functionality and industry focus of Microsoft Dynamics CRM c360 Core Productivity Pack Explorer (CRM Search Engine)

More information

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017 3 Ways to Prevent and Protect Your Clients from a Cyber-Attack George Anderson Product Marketing Director Business October 31 st 2017 Agenda One ounce of prevention is worth a pound of protection 01 Aiming

More information

SPANNING BACKUP for Office 365. Admin Guide

SPANNING BACKUP for Office 365. Admin Guide SPANNING BACKUP for Office 365 Admin Guide Welcome 3 About this guide 3 Audience 3 What s in this guide 3 Configuration 3 Prerequisites 3 Installation 3 Service Overview 4 Licensing 5 Add licenses via

More information

Amit Panchal Enterprise Technology Strategist

Amit Panchal Enterprise Technology Strategist Amit Panchal Enterprise Technology Strategist amitp@microsoft.com Who is Amit Panchal IT Industry Personal Education Executive Experience MORE DEVICES I love my PC, my phone, and my slate. MORE MOBILE

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

DOWNLOAD OR READ : OFFICE 365 SECURITY AND TRUST STANDARD REQUIREMENTS PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : OFFICE 365 SECURITY AND TRUST STANDARD REQUIREMENTS PDF EBOOK EPUB MOBI DOWNLOAD OR READ : OFFICE 365 SECURITY AND TRUST STANDARD REQUIREMENTS PDF EBOOK EPUB MOBI Page 1 Page 2 office 365 security and trust standard requirements office 365 security and pdf office 365 security

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins

Risk Outlook Anti money Laundering and Cybercrime. Steve Wilmott and George Hawkins Risk Outlook Anti money Laundering and Cybercrime Steve Wilmott and George Hawkins Introductions Steve Wilmott, Director of Intelligence and Investigations George Hawkins, Senior Technical Advisor, Risk

More information

VisualSP 2010 Help Items

VisualSP 2010 Help Items Rehmani Consulting, Inc. VisualSP 2010 Help Items http://www.visualsp.com vsp-support@visualsp.com 630-786-7026 Doc Rev 6.2 for VSP 4.7.0.4 Contents Contents... 2 Introduction... 3 VisualSP 2010 Help Ribbon

More information

How to Guide. How to Create Mobile Surveys and Forms START

How to Guide. How to Create Mobile Surveys and Forms START How to Guide How to Create Mobile Surveys and Forms START sales@textlocal.in 040-3085-8603 www.textlocal.in Contents Getting started 3 An introduction to surveys and forms 3 Creating a mobile survey 5

More information

DOWNLOAD OR READ : YOUR OFFICE MICROSOFT ACCESS 2016 COMPREHENSIVE YOUR OFFICE FOR OFFICE 2016 SERIES PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : YOUR OFFICE MICROSOFT ACCESS 2016 COMPREHENSIVE YOUR OFFICE FOR OFFICE 2016 SERIES PDF EBOOK EPUB MOBI DOWNLOAD OR READ : YOUR OFFICE MICROSOFT ACCESS 2016 COMPREHENSIVE YOUR OFFICE FOR OFFICE 2016 SERIES PDF EBOOK EPUB MOBI Page 1 Page 2 your office microsoft access 2016 comprehensive your office for office

More information

mhealth SECURITY: STATS AND SOLUTIONS

mhealth SECURITY: STATS AND SOLUTIONS mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported

More information

Why is Office 365 the right choice?

Why is Office 365 the right choice? Why is Office 365 the right choice? People today want to be productive wherever they go. They want to work faster and smarter across their favorite devices, while staying current and connected. Simply

More information

Maximize your move to Microsoft in the cloud

Maximize your move to Microsoft in the cloud Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3

More information

Word 2016 Training Manual

Word 2016 Training Manual Word 2016 Training Manual If you are looking for the ebook Word 2016 training manual in pdf form, in that case you come on to the faithful site. We presented the complete version of this book in epub,

More information

What is Office 365? Experience Office virtually anywhere.

What is Office 365? Experience Office virtually anywhere. What is Office 365? Experience Office virtually anywhere. Office 365 is a subscription service that keeps you up-to-date with the latest versions of Office applications and other cloud services. The Office

More information

How to Guide. How to create mobile surveys. and forms START

How to Guide. How to create mobile surveys. and forms START 06 and forms How to Guide How to create mobile surveys START sales@textlocal.com 01244 752299 www.textlocal.com 06 and forms How to Guide How to create mobile surveys START sales@textlocal.com 01244 752299

More information

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity 2x 50% 5x Microsoft 365 A complete, intelligent, secure solution to empower employees Unlocks creativity Built for teamwork Integrated for simplicity Intelligent security Inner Loop Files Sites Content

More information

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts Managed Enterprise Phishing Protection Comprehensive protection delivered 24/7 by anti-phishing experts MANAGED ENTERPRISE PHISHING PROTECTION 24/7 expert protection against phishing attacks that get past

More information

LiveMeeting conferencing solution

LiveMeeting conferencing solution LiveMeeting conferencing solution agenda section 1 section 2 section 3 section 4 section 5 section 6 Web conferencing LiveMeeting solution billing options/reporting customer care/slas free trial why Orange

More information

Axis Portal. AXIS Portal Client Support Surveys User Manual

Axis Portal. AXIS Portal Client Support Surveys User Manual Axis Portal Surveys User Manual Client Support 949.809.3605 support@axisportal.com 1 Table of Contents Surveys:... 3 About Surveys:...3 Setting Up Surveys:... 5 Creating Surveys:...5 Survey Questions:...8

More information

User Interface Document version

User Interface Document version User Interface Document version 1.6 2018 Table of contents 1 General information 1.1 General technical remarks 1.2 User interface composition 1.3 Profile settings 1.4 Structure of the main menu 2 User

More information

Quick Start Guide. Contents: Creating a project Managing and editing a project Viewing a project/assessment results

Quick Start Guide. Contents: Creating a project Managing and editing a project Viewing a project/assessment results Quick Start Guide Contents: Creating a project Managing and editing a project Viewing a project/assessment results This document is designed to help you quickly administer assessments in the CEB TalentCentral

More information

DOWNLOAD OR READ : MICROSOFT OFFICE 2019 THIRD EDITION PDF EBOOK EPUB MOBI

DOWNLOAD OR READ : MICROSOFT OFFICE 2019 THIRD EDITION PDF EBOOK EPUB MOBI DOWNLOAD OR READ : MICROSOFT OFFICE 2019 THIRD EDITION PDF EBOOK EPUB MOBI Page 1 Page 2 microsoft office 2019 third edition microsoft office 2019 third pdf microsoft office 2019 third edition Microsoft

More information

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Sophos. Allan Widell Channel Account Executive. 24. August 2017 Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security

More information

JV WEBINAR PROCESS CHECKLIST

JV WEBINAR PROCESS CHECKLIST WEBINAR PROCESS CHECKLIST QUALIFICATIONS / IDENTIFICATION (prior to starting any projects) Create Person / Opportunity Record If Key person uses a create two person records. Note in Key persons record

More information

Word 2016 Training Manual

Word 2016 Training Manual Word 2016 Training Manual Microsoft Office 2016 (Office 15) Editable Courseware for Trainers, Training Providers, Consultants, and HR Managers. In Learn Microsoft Office 2016 Training Excel, Word, and

More information

MESSAGING SECURITY GATEWAY. Solution overview

MESSAGING SECURITY GATEWAY. Solution overview MESSAGING SECURITY GATEWAY Solution overview April 2017 CONTENTS Executive Summary...3 The case for email protection and privacy... 3 Privacy in email communication... 3 LinkedIn Phishing Sample...4 Messaging

More information

ClientNet Admin Guide. Boundary Defense for

ClientNet Admin Guide. Boundary Defense for ClientNet Admin Guide Boundary Defense for Email DOCUMENT REVISION DATE: Feb 2012 ClientNet Admin Guide / Table of Contents Page 2 of 36 Table of Contents OVERVIEW... 3 1 INTRODUCTION... 3 1.1. AUDIENCE

More information

AFC Compliance Careers

AFC Compliance Careers AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

Come see what you re missing... Sign up for a free trial! Go to

Come see what you re missing... Sign up for a free trial! Go to Management Software What are you looking for in volunteer management software? Intuitive interface Customized volunteer profiles Desktop and mobile online volunteer portals Reporting on hours, outputs,

More information

MARKOMI Marketing Automation Tool. User s Guide Version: 2.0

MARKOMI Marketing Automation Tool. User s Guide Version: 2.0 MARKOMI Marketing Automation Tool User s Guide Version: 2.0 MARKOMI Table of contents I Table of contents What is Markomi?... 1 Purpose of this guide... 1 How to get Markomi... 1 Create a bizhub Evolution

More information

A User Guide. Besides, this Getting Started guide, you ll find the Zoho Campaigns User Guide and many other additional resources at zoho.com.

A User Guide. Besides, this Getting Started guide, you ll find the Zoho Campaigns User Guide and many other additional resources at zoho.com. A User Guide Welcome to Zoho Campaigns! This guide will help you create and send your first email campaign. In addition to sending an email campaign, you ll learn how to create your first mailing list,

More information

MICROSOFT OFFICE 2013 SPECIALIST With Windows 10

MICROSOFT OFFICE 2013 SPECIALIST With Windows 10 Overview MICROSOFT OFFICE 2013 SPECIALIST With Windows 10 Microsoft Office 2013 training includes a variety of courses designed to teach individuals of all skill levels about using all of the Office 2013

More information

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Security Awareness Compliance Requirements. Updated: 11 October, 2017

Security Awareness Compliance Requirements. Updated: 11 October, 2017 Security Awareness Compliance Requirements Updated: 11 October, 2017 Executive Summary The purpose of this document is to identify different standards and regulations that require security awareness programs.

More information

Maintain Data Control and Work Productivity

Maintain Data Control and Work Productivity DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud

More information

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at Thanks! Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at jim@stickleyonsecurity.com Don t forget to checkout Stickley on Security and learn about our

More information

IBM Planning Analytics

IBM Planning Analytics Software Consulting Training Support Budgeting & Forecasting Modelling Analysis Reporting IBM Planning Analytics On Premises. On Cloud. IBM Worldwide Business Analytics Partner of the Year 2011, 2012,

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

ANTICIPATE. MITIGATE. PROTECT.

ANTICIPATE. MITIGATE. PROTECT. ANTICIPATE. MITIGATE. PROTECT. FROM ESSENTIAL NEWS AND EXPERT ANALYSIS TO TOOLS THAT HELP YOU MAP YOUR STRATEGIES, BLOOMBERG LAW: PRIVACY & DATA SECURITY DELIVERS. Stay Connected #BloombergLaw @BloombergLaw

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Science, Technology, Engineering, and Math Revised Summer 2014 Division Implemented Fall 2014 Textbook Update Fall 2017

Science, Technology, Engineering, and Math Revised Summer 2014 Division Implemented Fall 2014 Textbook Update Fall 2017 Butler Community College Karen Waddell Science, Technology, Engineering, and Math Revised Summer 2014 Division Implemented Fall 2014 Textbook Update Fall 2017 COURSE OUTLINE Advanced Computer Applications

More information

Training Tracker 6. PC Edition. Copyright Computer Directions, LLC

Training Tracker 6. PC Edition. Copyright Computer Directions, LLC Training Tracker 6 PC Edition Copyright 2014-2016 Computer Directions, LLC Contents What is Training Tracker?... 3 Getting Started... 4 The People Tab... 4 Overview... 4 Adding People... 5 Editing People...

More information

WebOffice TM Getting Started Guide

WebOffice TM Getting Started Guide USER GUIDE WebOffice WebOffice TM Getting Started Guide This WebOffice Getting Started Guide will help you setup your intranet site so that you may start using it right away and make it a key part of your

More information

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com

More information

BT Web Conferencing Quick Start Service

BT Web Conferencing Quick Start Service BT Web Conferencing uses Microsoft Live Meeting 2005 to provide you with the ability to collaborate with colleagues by sharing information and ideas online and in real time. BT s Quick Start service enables

More information

State of the Phish 2016

State of the Phish 2016 State of the Phish 2016 1 Introduction & Overview In October 2015, Wombat Security acquired ThreatSim, bringing together two of the leading simulated phishing attack tools. ThreatSim has historically prepared

More information

Discover IceWarp Server Do Amazing Things Together. Now compatible with: OS X El Capitan, ios 9, Outlook 2016

Discover IceWarp Server Do Amazing Things Together.   Now compatible with: OS X El Capitan, ios 9, Outlook 2016 Discover IceWarp Server 11.4.1 Do Amazing Things Together New TeamChat collaboration tool for teams & projects New WebDocuments for online editing of Office files WebAdmin white labeling for truly personalized

More information

Achieve more with 15 Productivity Tips for Office

Achieve more with 15 Productivity Tips for Office Achieve more with 15 Productivity Tips for Office Mission Worldview Strategy Ambitions How do you empower your mobile workforce? Can my employees be productive outside the office? How do we stay productive

More information

Microsoft Office 365 Administration Inside Out Inside Out Microsoft

Microsoft Office 365 Administration Inside Out Inside Out Microsoft Microsoft Office 365 Administration Inside Out Inside Out Microsoft We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on

More information

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across

More information

Webcasting. Features. Event Plus Webcast. Use the internet to deliver your message and expand your reach. Basic package.

Webcasting. Features. Event Plus Webcast. Use the internet to deliver your message and expand your reach. Basic package. Webcasting Use the internet to deliver your message and expand your reach Webcasting is a cost effective conferencing solution that enables you to communicate and deliver a consistent message via the internet

More information

Microsoft Office Excel Beginners Manuals READ ONLINE

Microsoft Office Excel Beginners Manuals READ ONLINE Microsoft Office Excel Beginners Manuals READ ONLINE Excel Training for Beginners - Udemy - Learn to Invoke the Power of Microsoft Excel in easy to follow stages. Office Productivity. Microsoft Excel 2010

More information

Attract Connect Grow!

Attract Connect Grow! Email Marketing from Constant Contact Attract Connect Grow! Email Marketing Turns Website Visitors into Customers and Current Customers into Repeat Business. Constant Contact, Inc. 1601 Trapelo Road, Suite

More information

ISACS AT: Template Lesson Plan

ISACS AT: Template Lesson Plan ISACS AT: Template Lesson Plan International Small Arms Control Standards Assessment Tool United Nations Institute for Disarmament Research (UNIDIR) 2015 1 ABOUT THIS PROJECT 1. BACKGROUND The International

More information

Sql Injection Attacks And Defense

Sql Injection Attacks And Defense We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer, you have convenient answers with sql injection attacks

More information

ISE North America Leadership Summit and Awards

ISE North America Leadership Summit and Awards ISE North America Leadership Summit and Awards November 6-7, 2013 Presentation Title: Presenter: Presenter Title: Company Name: Embracing Cyber Security for Top-to-Bottom Results Larry Wilson Chief Information

More information

Trial Account Quick Start Guide

Trial Account Quick Start Guide Trial Account Quick Start Guide Version 5.2 April 2015 Edition 2002-2015 ICS Learning Group 1 Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of

More information

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. About Us The world s most popular integrated Security Awareness Training and Simulated

More information

Autodesk, Inc. Revit 2014

Autodesk, Inc. Revit 2014 Autodesk, Inc. Revit 2014 Rich Mitrenga, Business Development Manager O&M 2014 COBie Challenge for Designers 1 product description Autodesk Revit software is specifically built for Building Information

More information

Sircon Producer Manager User Guide

Sircon Producer Manager User Guide Sircon Producer Manager User Guide A Guide to Setting Up and Using Education Credentials September 2016 Version 7.7 Introduction Contents Introduction... 3 Configuring Education Credentials... 5 Set Up

More information

Before Installing PCLaw 8.20

Before Installing PCLaw 8.20 What s New in PCLaw Version 8.20 Before You Download This Version of PCLaw - Important Notices Before you download and install PCLaw version 8.20, review the following checklist: I have done a FULL SYSTEM

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

WELCOME TO MYNEWSDESK!

WELCOME TO MYNEWSDESK! WELCOME TO MYNEWSDESK! We want to make you an expert user of Mynewsdesk in the shortest possible time, and make it easy for you to see the positive results you can achieve from effective and well thought

More information

PROTECTING PHI WITH BOX HEALTH DATA FOLDERS POLICIES AND GUIDELINES

PROTECTING PHI WITH BOX HEALTH DATA FOLDERS POLICIES AND GUIDELINES PROTECTING PHI WITH BOX HEALTH DATA FOLDERS POLICIES AND GUIDELINES March 15, 2018 Table of Contents Introduction 2 Key points to remember:... 2 Applying for a BHDF... 2 Box Security Settings 3 Folder

More information

Student. ChoiceU.com User Guide 8/22/2017

Student. ChoiceU.com User Guide 8/22/2017 Student ChoiceU.com User Guide 8/22/2017 TABLE OF CONTENTS Overview... 2 Account Overview... 3 Logging into choiceu.com... 3 Retrieving your username or password... 4 Updating your Preferences... 5 ChoiceU.com

More information

How to choose the right approach to analytics and reporting

How to choose the right approach to analytics and reporting SOLUTION OVERVIEW How to choose the right approach to analytics and reporting A comprehensive comparison of the open source and commercial versions of the OpenText Analytics Suite In today s digital world,

More information

My Top 5 Formulas OutofhoursAdmin

My Top 5 Formulas OutofhoursAdmin CONTENTS INTRODUCTION... 2 MS OFFICE... 3 Which Version of Microsoft Office Do I Have?... 4 How To Customise Your Recent Files List... 5 How to recover an unsaved file in MS Office 2010... 7 TOP 5 FORMULAS...

More information

NASDAQ BWISE ACADEMY COURSE CATALOG

NASDAQ BWISE ACADEMY COURSE CATALOG NASDAQ BWISE ACADEMY COURSE CATALOG 1 MANUAL TITLE HERE Copyright 2014, The NASDAQ OMX Group, Inc. All Rights Reserved. Q14-NUMBER. DATE TABLE OF CONTENTS 1 NASDAQ BWISE ACADEMY COURSE CATALOG 4 1.1 Introduction

More information

Service Provider View of Cyber Security. July 2017

Service Provider View of Cyber Security. July 2017 Service Provider View of Cyber Security July 2017 Quick Stats Caribbean and LatAm: 3 rd largest population of Internet Users You Are Here Visualization from the Opte Project of the various routes through

More information

Workshare Professional 10. Getting Started Guide

Workshare Professional 10. Getting Started Guide Workshare Professional 10 Getting Started Guide Introducing Workshare Professional 10 Workshare is dedicated to helping professionals compare, protect and share their documents. New features Compare Excel

More information

NASDAQ BWISE ACADEMY COURSE CATALOG

NASDAQ BWISE ACADEMY COURSE CATALOG NASDAQ BWISE ACADEMY COURSE CATALOG 1 MANUAL TITLE HERE Copyright 2014, The NASDAQ OMX Group, Inc. All Rights Reserved. Q14-NUMBER. DATE TABLE OF CONTENTS 1 NASDAQ BWISE ACADEMY COURSE CATALOG 4 1.1 Introduction

More information

Intro to Capture the Flag

Intro to Capture the Flag Intro to Capture the Flag Talk for General Audience: Why Capture the Flag (CTFs) Matter. Synopsis: CTFs are one example of a gamified learning environment. Gamified ecosystems pose many benefits to professional

More information

Google Docs.

Google Docs. Useful for collaborating on documents, spreadsheets and presentations Creating a Google Account After going to the URL above you will need to log into a Google Account or create an account by clicking

More information

Enhanced Threat Detection, Investigation, and Response

Enhanced Threat Detection, Investigation, and Response Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution

More information

fi360 Toolkit: Quick Start Guide Updated August 27, 2014

fi360 Toolkit: Quick Start Guide Updated August 27, 2014 fi360 Toolkit: Quick Start Guide Updated August 27, 2014 Introduction 2 Navigating the Toolkit 3 My Clients 4 Investment Analyzer 6 My Models 7 My Proposals 8 Settings 9 Admin Account Section 10 Individual

More information

Microsoft Power Point 2018 Training Manuals

Microsoft Power Point 2018 Training Manuals Microsoft Power Point 2018 Training Manuals If searching for the book Microsoft power point 2018 training manuals in pdf format, then you've come to the loyal website. We present full release of this book

More information

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v17

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v17 Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v17 For Sophos Customers Document Date: October 2017 Contents ii Contents Reports... 4 Basics...4 Reports Navigation... 6 Dashboards...

More information

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT

IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT www.iia.org.sg IIA Academy YOUR PARTNER IN PROFESSIONAL DEVELOPMENT IIA Academy Professional Development To support you in your career progression as an internal auditor, we have adopted the IIA Global

More information

1

1 The New for Midsize Businesses Plus Desktop Apps Web Apps Mobile Simple IT o All services work together o No servers to set up o is always up-to-date o Use on 5 devices/user o Everything you need in one

More information

SalonVision Configuration Guide

SalonVision Configuration Guide SalonVision Configuration Guide A Guide For SalonVision Live Data Integration I SalonVision Online Booking Configurations Table of Contents Part I Introduction 1 Part II Envision Setup 2 1 Setup Program

More information

Symantec Protection Suite Add-On for Hosted Security

Symantec Protection Suite Add-On for Hosted  Security Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money

More information

Office 365 Business The Microsoft Office you know, powered by the cloud.

Office 365 Business The Microsoft Office you know, powered by the cloud. Office 365 Business The Microsoft Office you know, powered by the cloud. Power your business with the best-in-class productivity tools from Microsoft the applications you know, always up-to-date and accessible

More information

PeopleAdmin 7 THE BASICS USER MANUAL V. I

PeopleAdmin 7 THE BASICS USER MANUAL V. I PeopleAdmin 7 THE BASICS USER MANUAL V. I Acknowledgements In June 2014, University of Arkansas Human Resources partnered with representatives from the Office of Equal Opportunity and Compliance, the Office

More information

MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY

MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY 19 MAY 2016 MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY CHRIS FURLOW PRESIDENT RIDGE GLOBAL cfurlow@ridgeglobal.com www.ridgeglobal.com ABOUT RIDGE GLOBAL Ridge Global is the risk management

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

Advanced Reporting in the Online Report Designer Administration Guide

Advanced Reporting in the Online Report Designer Administration Guide SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014 CUSTOMER Advanced Reporting in the Online Report Designer Administration Guide Content 1 Change History....3 2 Overview....4

More information

Storage Made Easy. SoftLayer

Storage Made Easy. SoftLayer Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on

More information