How can you continue to use Windows XP computers securely after April 2014?

Share this article:
Unknown Targeted Attacks - Stopping malware at the endpoint
Unknown Targeted Attacks - Stopping malware at the endpoint

Click here to register


Date:
Monday, September 9, 2013
Time: 12 p.m. PT / 3 p.m. ET

  • Windows XP is scheduled for “End of Life” in April 2014 yet XP is still the 2nd most widely used PC operating system in the world—estimates suggest that nearly 40% of PCs are still running XP.
  • Many organizations cannot move from XP by April 2014 due to application compatibility issues, cost, staffing resources and other issues.
  • The most significant issue facing organizations with XP PCs is operating securely when there are no more security patches from Microsoft.
  • There is now an alternative that allows organizations to move from XP on their own timeline, while staying secure using XP on into the future: ExtendedXP from Arkoon.

 

This webinar will begin with Adam Robb, an industry leading IT security consultant with IPSS, Inc., discussing the security issues that organizations are facing when they are using XP after the Windows support ends including the anticipated threats of cyber criminals and the challenges of retaining regulatory compliance. Adam will also analyze the support and compliance options that organizations that are going to be using XP through 2014 and beyond may have available.

Then the presentation will shift to a description and analysis of one security support option for Windows XP users - ExtendedXP (EXP).  Bob Foley and Fayce Daira will provide an overview and technical description of EXP that combines the active real-time protection of a customized StormShield EXP Agent running at the Endpoint with the EXP Monitoring Service for monitoring and reporting on vulnerabilities to provide enhanced protection of XP and related applications – on into the future.

Bob and Fayce will present how subscribers to the EXP service will benefit both from proactive protection against unpatched vulnerability exploitation on the protected computer and from a service that will warn them of any newly identified vulnerabilities, keep them informed on the effectiveness of their infrastructure proactive protection system and, if appropriate, provide a new updated template for PC protection and make recommendations about any other necessary measures that need to be taken. 

Last, the implications for XP using organizations maintaining regulatory certification by using EXP as a compensating control will be discussed and examined.

Featured Speakers:

Adam Robb, IT security consultant, IPSS, Inc.
Robert N. Foley,
President, Matrix Global Partners, Inc.
Faycal Daira, CTO, CISSP Matrix Global Partners, Inc.

Sponsored by:
Matrix

Headquartered in Indianapolis, Indiana Matrix Global Partners, Inc. (Matrix) is a national leader in information security solutions, integration and professional and managed services.  Matrix offers a complete line of security and SIEM technologies and, as the exclusive distributor in the Americas for the award-winning StormShield security products, Matrix products and support are provided through direct sales and a partner/reseller sales and support organization.  www.MatrixGP.com.

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Vendor Webcasts

Sign up to our newsletters

More in Vendor Webcasts

The impact of endpoint data growth on corporate visibility & compliance

id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?

Security in the new mobile ecosystem

A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.

Guidance on migration to SHA-2

Google has advised that Chrome will gradually sunset SHA-1 cryptography, which is used in the signing process of SSL certificates.