Imago Techmedia Ltd is registered in England and Wales under Company No. 04865455. VAT No. GB 843 8456 01
Registered Office: Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Business Address: Imago Techmedia, 2C Bedford House, Fulham Green, 69-79 Fulham High Street, London, SW6 3JW, United Kingdom
Imago Techmedia is a subsidiary of Clarion Events Limited
SentinelOne is a pioneer in delivering zero-touch endpoint security to help business secure their assets with speed and simplicity. It unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial-intelligence, behavioural analysis and intelligent automation to enable organizations to minimize their time to protection.
Rise of the EMPIRE Wed 4th Oct 11:40 - 12:10
Rise of the EMPIRE
Dealing with today’s cyber threats requires a fundamentally different approach. In recent attacks such as the DNC hack and the wide spread attack uncovered by Kaspersky Labs in over 40 countries, we've seen the increased use of fileless attack vectors, which can easily bypass legacy AV. The truth is, legacy AV and other prevention-only solutions simply don’t cut it. Today’s advanced malware, exploits, and stealthy insider attacks will blow right by most static prevention solutions in a fraction of the time it takes to get updated with the latest threat signatures, and even then sometimes they won't work.
Time / Place
Wed 4th Oct 11:40 to 12:10
Psychology Behind Digital Ransom Notes Thu 5th Oct 12:20 - 12:50
Psychology Behind Digital Ransom Notes
Ransom Notes were used through the ages as a means to scare and cohort subject to pay, and in the digital age are massively used in Ransomware situations. Join Eran as he reviews the report prepared for SentinelOne by Dr. Lee Hadlington, from De Montfort University, explaining the evolution of ransom notes, what psychological "tricks" are used to increase payment chances.
Time / Place
Thu 5th Oct 12:20 to 12:50
The 4-Minute Guide to Enterprise Security Threats
SentinelOne has compiled a list of the most damaging tools and techniques that are commonly seen in the wild. Learn how they are used to attack the enterprise and steal sensitive data and how traditional security tools can do little to stop them
The 4-Minute Guide to Enterprise Security Threats.pdf 160.70 kB
Protection Against Ransomware. Guaranteed.
SentinelOne Establishes $1M Cyber Threat Protection Guarantee. The company transforming endpoint security announce a cyber threat protection guarantee, providing customers with financial protection in the event of a successful ransomware attack.
Brochure-Ransomware-Vertical-Online.pdf 514.80 kB
Next Generation Endpoint Protection Buyer's Guide
Introducation into today's security landscape, covering: A New Approach to Endpoint Security Evaluating Next Gen Endpoint Protection Vendors Why SentinelOne?
Buyer's Guide - SentinelOne.pdf 1.86 MB
Enterprise Protection Platform for PCI DSS & HIPAA Compliance
Description of how SentinelOne's EPP software satisfies the application of PCI DSS 3.1 Requirements 5 & HIPAA Security Rule requirement 164.308(a)(5)(ii)(B) & decreases organisational risk by evaluating malware based on system behaviour
Enterprise Protection Platform for PCI DSS & HIPAA Compliance WP.pdf 2.76 MB
ESG Solution Showcase
ESG Solution Showcase of The SentinelOne Endpoint Protection Platform, September 2015
ESG-Solution-Showcase-SentinelOne Platform WP.pdf 679.73 kB
Ransomware is Here: What you can do about it
Overview whitepaper on Ransomware covering: Current techniques Shotgun strategies How ransomware works What can you do if you're infected
Ransomware is Here What you can do about it WP.pdf 1.26 MB
Replacing Antivirus, and Doing it Right A CISO Perspective
As cyber threats grow in diversity and sophistication, AV-based protection offers less effective protection for organisations creating a pressing need to replace existing signature-based endpoint protection software with a more advanced solution
SentinelOne Replacing AV a CISO Perspective WP.pdf 799.87 kB
The Wicked Truths About Malware & Exploits
In today's cyber threat landscape, not all attacks are created equal...
The Wicked Truths About Malware & Exploits WP.pdf 925.12 kB