The Future of Security – Connecting Endpoint and Network for Better Protection

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

To paraphrase the famous book and film: security is no country for old men. Tradition in some industries may be acceptable but in security, tradition can lead to weaknesses that can be exploited by cyber criminals. Innovation is the key – this is certainly the route taken by the attackers.

Cybercriminals have been making huge amounts of money from UK businesses using advanced tools like “Angler”, “Nuclear” and “Magnitude” that link web, network, and endpoint technologies in single hosted platform, and that are constantly updated with the latest zero day exploit techniques. Meanwhile most UK companies are still protecting themselves with firewalls, endpoint antivirus products, email and web filters that aren’t even slightly integrated, and that they haven’t changed for years.

But now there is a new approach that synchronizes network and endpoint protection to provide better security. This allows organisations to deal more effectively with sophisticated threats because the next-generation firewall on the network side is directly sharing threat intelligence with the next-generation endpoint security. This enables faster detection of threats, automatic isolation of infected devices, and rapid problem resolution.

Join us for this webinar, where a panel of experts will explore this hot topic and discover what it could mean for your company.  Join the conversation as the panel discusses:

  • What exactly is synchronized security? 
  • What are the advantages in protection of synchronizing network and endpoint security?
  • How to best deploy synchronized security – what is this likely to mean  in practical terms
  • How you can articulate the benefits of synchronizing security across your organization?


Richard Beck

Head of Cyber Security, QA

    Stephen Pritchard

    Moderator, Infosecurity Magazine

      John Shaw

      Vice President, Product Management, Sophos

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.