Web 2.0 security in the spotlight

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The Internet has changed. It's no longer just about Web browsing. Today, it's dominated by Web 2.0 applications such as instant messaging, social networking, P2P, voice and video. Standalone URL filtering solutions are no longer sufficient to control these applications and secure your network. You need a secure Web gateway that provides not only URL filtering, but also granular application control and malware prevention. Left uncontrolled, Web browsing and Web 2.0 applications create security and compliance vulnerabilities for your organization such as: * Malware infection (viruses, worms, spyware, rootkits, and more) and SpIM (Spam over IM) which can cause a major drain on productivity and resources. * Information leakage leading to loss of confidential information * e-Discovery and regulatory compliance breaches with out of policy communications and/or limited ability to monitor or retrieve communications Tune in to this FaceTime Webinar for an explanation of these threats and how to effectively counter them with a comprehensive solution that increases your control over the Web and helps decrease operational costs. This Webinar will: * Help you understand the multi-vectored security threats that Web 2.0 technology poses to you and your business * Assist you in preparing for the continuing evolution of the Internet and why a secure Web gateway has become a must-have. * Explain the benefits of consolidating URL filtering, application control and malware prevention on a single appliance to simplify management and get the most out of your budget dollar This Webinar is for: * IT managers wanting to understand the nature of Web 2.0 application behavior and the threats they introduce. * IT users looking to educate themselves on the seachange taking place in the IT security industry. * Anyone wishing to bring themselves up to speed on effective Web browsing and Web 2.0 security technology.


Steve Gold

Infosecurity Magazine

Nishant Jadhav

Senior Product Manager, Facetime Communications

Photo of John Pironti

John Pironti

President at IP Architects, LLC

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.