How can you continue to use Windows XP computers securely after April 2014?

Share this article:
Unknown Targeted Attacks - Stopping malware at the endpoint
Unknown Targeted Attacks - Stopping malware at the endpoint

Click here to register


Date:
Monday, September 9, 2013
Time: 12 p.m. PT / 3 p.m. ET

  • Windows XP is scheduled for “End of Life” in April 2014 yet XP is still the 2nd most widely used PC operating system in the world—estimates suggest that nearly 40% of PCs are still running XP.
  • Many organizations cannot move from XP by April 2014 due to application compatibility issues, cost, staffing resources and other issues.
  • The most significant issue facing organizations with XP PCs is operating securely when there are no more security patches from Microsoft.
  • There is now an alternative that allows organizations to move from XP on their own timeline, while staying secure using XP on into the future: ExtendedXP from Arkoon.

 

This webinar will begin with Adam Robb, an industry leading IT security consultant with IPSS, Inc., discussing the security issues that organizations are facing when they are using XP after the Windows support ends including the anticipated threats of cyber criminals and the challenges of retaining regulatory compliance. Adam will also analyze the support and compliance options that organizations that are going to be using XP through 2014 and beyond may have available.

Then the presentation will shift to a description and analysis of one security support option for Windows XP users - ExtendedXP (EXP).  Bob Foley and Fayce Daira will provide an overview and technical description of EXP that combines the active real-time protection of a customized StormShield EXP Agent running at the Endpoint with the EXP Monitoring Service for monitoring and reporting on vulnerabilities to provide enhanced protection of XP and related applications – on into the future.

Bob and Fayce will present how subscribers to the EXP service will benefit both from proactive protection against unpatched vulnerability exploitation on the protected computer and from a service that will warn them of any newly identified vulnerabilities, keep them informed on the effectiveness of their infrastructure proactive protection system and, if appropriate, provide a new updated template for PC protection and make recommendations about any other necessary measures that need to be taken. 

Last, the implications for XP using organizations maintaining regulatory certification by using EXP as a compensating control will be discussed and examined.

Featured Speakers:

Adam Robb, IT security consultant, IPSS, Inc.
Robert N. Foley,
President, Matrix Global Partners, Inc.
Faycal Daira, CTO, CISSP Matrix Global Partners, Inc.

Sponsored by:
Matrix

Headquartered in Indianapolis, Indiana Matrix Global Partners, Inc. (Matrix) is a national leader in information security solutions, integration and professional and managed services.  Matrix offers a complete line of security and SIEM technologies and, as the exclusive distributor in the Americas for the award-winning StormShield security products, Matrix products and support are provided through direct sales and a partner/reseller sales and support organization.  www.MatrixGP.com.

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

WordPress security simplified — Six easy steps for a more secure website

WordPress is the most-used content management system (CMS) in the world. More than 60 million websites, or 22.9% of the internet, use WordPress for content creation.

Reducing cyber risk in industrial control systems with advanced network segmentation

The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework.

How to use crowd-sourced threat intelligence to stop malware in its tracks

Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those within a particular industry.