How can you continue to use Windows XP computers securely after April 2014?

Share this article:
Unknown Targeted Attacks - Stopping malware at the endpoint
Unknown Targeted Attacks - Stopping malware at the endpoint

Click here to register


Date:
Monday, September 9, 2013
Time: 12 p.m. PT / 3 p.m. ET

  • Windows XP is scheduled for “End of Life” in April 2014 yet XP is still the 2nd most widely used PC operating system in the world—estimates suggest that nearly 40% of PCs are still running XP.
  • Many organizations cannot move from XP by April 2014 due to application compatibility issues, cost, staffing resources and other issues.
  • The most significant issue facing organizations with XP PCs is operating securely when there are no more security patches from Microsoft.
  • There is now an alternative that allows organizations to move from XP on their own timeline, while staying secure using XP on into the future: ExtendedXP from Arkoon.

 

This webinar will begin with Adam Robb, an industry leading IT security consultant with IPSS, Inc., discussing the security issues that organizations are facing when they are using XP after the Windows support ends including the anticipated threats of cyber criminals and the challenges of retaining regulatory compliance. Adam will also analyze the support and compliance options that organizations that are going to be using XP through 2014 and beyond may have available.

Then the presentation will shift to a description and analysis of one security support option for Windows XP users - ExtendedXP (EXP).  Bob Foley and Fayce Daira will provide an overview and technical description of EXP that combines the active real-time protection of a customized StormShield EXP Agent running at the Endpoint with the EXP Monitoring Service for monitoring and reporting on vulnerabilities to provide enhanced protection of XP and related applications – on into the future.

Bob and Fayce will present how subscribers to the EXP service will benefit both from proactive protection against unpatched vulnerability exploitation on the protected computer and from a service that will warn them of any newly identified vulnerabilities, keep them informed on the effectiveness of their infrastructure proactive protection system and, if appropriate, provide a new updated template for PC protection and make recommendations about any other necessary measures that need to be taken. 

Last, the implications for XP using organizations maintaining regulatory certification by using EXP as a compensating control will be discussed and examined.

Featured Speakers:

Adam Robb, IT security consultant, IPSS, Inc.
Robert N. Foley,
President, Matrix Global Partners, Inc.
Faycal Daira, CTO, CISSP Matrix Global Partners, Inc.

Sponsored by:
Matrix

Headquartered in Indianapolis, Indiana Matrix Global Partners, Inc. (Matrix) is a national leader in information security solutions, integration and professional and managed services.  Matrix offers a complete line of security and SIEM technologies and, as the exclusive distributor in the Americas for the award-winning StormShield security products, Matrix products and support are provided through direct sales and a partner/reseller sales and support organization.  www.MatrixGP.com.

Share this article:
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

Life after a data breach: Identifying and containing advanced threats at the ...

Compromise can happen in seconds and containment can take weeks. For enterprises, it's no longer a matter of if you will be breached, but rather a matter of when.

Big Data - Your secret weapon in the war against cyber crime

Right now, Web attackers are amassing a global arsenal of knowledge and resources that is allowing them to expanding their reach well beyond financial services to virtually every industry, everywhere.

The one-man SOC: Habits of highly effective security practitioners

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key.