Armis Webinar Series

Learn more about visibility and security for unmanaged and IoT devices

Armis is excited to release a series of webinars - live and on-demand - that will help you with the day-to-day challenges and risks associated with unmanaged and IoT devices. While we work remotely, we hope to enable continued learning and sharing by virtually bringing the cybersecurity experts to you. So grab a cup of coffee or your favorite beverage and check out a topic or two that’s of interest. If your schedule changes and you can't make it live, no problem. Register today and you will be provided the On Demand link to watch at your convenience.

MEDICAL DEVICE SECURITY VULNERABILITIES AND DISCLOSURES

Hosted by ACCE

Live on Tuesday, April 28 at 12pm EST / 9am PST

When it comes to medical devices, poor cybersecurity poses risks to patient safety and puts millions at risk. How do companies like Armis find the vulnerabilities that affect billions of devices across the globe? What do you do with information that could be used for sinister means? Join to learn how Armis finds these vulnerabilities and how they safely communicate them to manufacturers, governmental institutions and the public at large.

Register

WINNING THE CYBERSECURITY BATTLE IN HEALTHCARE

Hosted by SC Media

Live Wednesday, April 29 at 10:30am EST / 7:30am PST

Medical device security is critical to patient safety and hospital operations. We have seen the increasing ransomware attacks, as well as recent identified exploits, such as URGENT/11, showcase the need to secure and manage these devices. The increase in connected medical devices (as well as any device in a hospital) provides a promise of new levels of care and efficiency - a promise can only be delivered if all devices are secure. These connected devices have provided a new attack landscape for bad actors - and a challenge to HDO cybersecurity professionals.

In this session, join cybersecurity expert Chris Dobrec, Vice President Product Marketing at Armis as he weighs in on best practices for medical device security, and how to protect your organization from the exploit of medical devices and more.

Register

ARMIS+CISCO ISE: BETTER THREAT DETECTION & RESPONSE FOR UNMANAGED & IOT DEVICES

Hosted by Armis

Tuesday, May 5 at 1PM EST / 10AM PST

Enterprises today are struggling with an onslaught of vulnerable unmanaged and IoT devices. Why are these devices vulnerable? They lack built-in security, they are difficult or impossible to update, and they can’t host security agents, making it difficult or even impossible for traditional security products to tell you when they’ve become compromised.  

By using Armis together with Cisco ISE, you can obtain automated threat detection and response for unmanaged and IoT devices. When Armis detects a threat, it informs Cisco ISE which can then automatically quarantine the malicious device to neutralize the threat. Join our webinar to learn how our joint solution can: 

  • Complement your existing Cisco ISE deployment 
  • Automate quarantine for risky or malicious devices 
  • Provide advanced threat detection and response

Register

COMPREHENSIVE ASSET INVENTORY

Hosted by Armis

Wednesday, May 6 at 2PM EST / 11AM PST

Can you accurately say how many devices you have and if they are secure?

Getting a unified and comprehensive IT asset inventory is still a major issue—and pain—for every organization. From managed to unmanaged to IoT devices, from virtual machines to clouds, with data strewn across different systems. For devices in your environment and in your airspace—on your network and remote—can you accurately identify all you have? What is your source of truth? Most companies don’t have this, and this leaves them exposed to compliance, vulnerability, and security issues.

Join Joe Lea VP Product Management, and Chris Dobrec, VP Product Marketing at Armis to learn how the Armis agentless device security platform brings you comprehensive visibility into all the assets you have by combining data from your network with other existing IT security and management systems to create one source of truth for all your assets—hardware, software, cloud— so you can:

  • Discover every IT asset in your environment
  • Identify risks, vulnerabilities, and gaps in your security posture
  • Automate and enforce security policies so you stay protected

Register

ARMIS+CHECK POINT: VISIBILITY & SECURITY FOR UNMANAGED & IOT DEVICES

Hosted by Armis

Thursday, May 7 at 1PM EST / 10AM PST

Armis and Check Point provide a new way forward to tackle the growing threat of vulnerable unmanaged and IoT devices. Our platform’s advanced device visibility and monitoring and Check Point’s policy management and security gateways reduce your risk exposure without disrupting business operations. Join our webinar to learn how we can enable you to:

  • Create policies automatically for any unmanaged and IoT device
  • Detect and respond quickly to vulnerabilities and threats
  • Arm security teams with comprehensive device information

Register

DEVICE SECURITY FOR CISCO MERAKI: FAST, SIMPLE, AND AGENTLESS

Hosted by Armis

Wednesday, May 13 at 1PM EST / 10AM PST  

Armis uses your existing Meraki infrastructure to create a detailed asset inventory, to analyze device behavior continuously for risks and threats, and to block suspicious or malicious devices automatically. And with no agents or additional hardware to deploy, our integration can be up and running in minutes. Join our webinar to learn how our joint solution provides you with:

  • Complete asset inventor of every device - managed, unmanaged, IoT and more
  • Deep device behavior insights so for more effective risk management
  • Advanced threat detection and response to find and stop threats and attacks

Register

AGENTLESS DEVICE SECURITY FOR PALO ALTO NETWORKS

Hosted by Armis

Thursday, May 14 at 1PM EST / 10AM PST

Our integration with Palo Alto Networks Cortex allows Armis to discover and profile every device, to analyze device activity for anomalous behavior and, through integration with Palo Alto firewalls, to block suspect devices automatically. Join our webinar to learn how our joint solution enables you with:

  • Complete asset inventor of every device - managed, unmanaged, IoT and more
  • Deep device behavior insights so for more effective risk management
  • Advanced threat detection and response to find and stop threats and attacks

Register

BEST PRACTICES FOR MEDICAL DEVICE SECURITY

Hosted by Health IT Security

Live on Thursday, May 14 at 1PM EST / 10AM PST

Advances in medical device technology help you deliver top-notch care, but who’s making sure those devices are healthy too? Hidden inside things like MRI and x-ray machines, infusion pumps and patient monitors are vulnerabilities that can put patients at risk.

These devices have no built-in security controls, they’re impossible to update without arduous recertification, and they can’t host agents traditional endpoint security products require. 

Join Armis to learn about vulnerabilities like URGENT/11 that bad actors can use to take control of critical medical equipment. We’ll discuss real-world threats to devices and provide you best practices to secure your connected medical devices and keep your patients safe.  

Register


ASSET INVENTORY: HOW SECURITY TEAMS GET A COMPREHENSIVE VIEW OF IT, IoT, OT AND MORE

Hosted by Cybersecurity Insiders

Live webinar on Thursday, May 21 at 2pm EST / 11am PST

How would you feel if you could get a comprehensive asset inventory across your entire environment - offices, remote locations, manufacturing floors; even off prem devices? All great security programs and compliance frameworks start with comprehensive and accurate asset inventory. And in a world of exploding devices, you need a full accounting of all your devices whether they be IT, IoT, OT, or even medical devices.

Join Chris Dobrec, VP Product Marketing of Armis, and Holger Schulze, founder and CEO of Cybersecurity Insiders, for this live webinar as they explore the challenges that security teams face when building a comprehensive and accurate view of all the assets in their environment.

Register  

Have our blog posts sent to your inbox.