Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Beyond Next Gen: Best Practices for Future Ready Security

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

When it comes to defending against the full range of known and unknown threats, there is no silver bullet, yet vendors are quick to claim their latest technology is the answer to all your security problems.

What’s more, a raft of myths exist about what next-gen security actually is, making it extremely tough to pick through the marketing FUD to find the solution that will deliver the best protection.

The fact is, there is no one solution that fits for all. While various techniques bring impressive new capabilities to the fight against threats, if implemented in silos they cannot combat the huge volume and variety of modern risks. Therefore, an integrated, multi-layered approach to threat defense covering endpoint, network, web, email and hybrid cloud is vital for maximum protection with minimum impact on performance.

In this webinar we will:

  • Debunk the myths surrounding next-gen endpoint security
  • Highlight the strengths and weakness of today’s advanced threat-protection techniques
  • Explore why a cross-generational and multi-layered approach to security is a must


Jay Abbot

Managing Director, Falanx Cyber Defence

    Simon Edwards

    Director, SE Labs

      Michael Hill

      Deputy Editor , Infosecurity Magazine

      James Walker

      Cyber Security Consultant, Trend Micro

        Brought to You by