SlideShare a Scribd company logo
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential1
Do you manage software?
Understand your role in cybersecurity defense
Marcelo Pereira, Product Marketing Manager
Tim Davis, Senior Product Marketing Manager
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential2
The Cyber Threat Facing All Of Us
Costs And Consequences Security Incidents and Data Breaches
Extensive downtimeExposure of intellectual property
Damage to brand
and reputation
Theft/exposure of
confidential data
Reduced
productivity levels
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential3
Impact of incidents
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential4
To Watch This Webinar On Demand Register Here
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential5
Security Incidents versus Data Breaches
And the cost of resolving incidents
Over
100,000
security incidents in
2015
From which
3,141
Were confirmed data
breaches
Sources:
“2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
* “2015 Cost of Cyber Crime Study: Global.” Ponemon Institute. October 2015. http://www.ponemon.org/blog/2015-cost-of-cyber-crime-united-states
$21,000
a day*
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential6
Companies Breached In 2016 - Highlights
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential7
“The Key Goal:
Reducing Adversaries Operational Space”
- Cisco
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
Addressing today’s challenges for security
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential8
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential9
Resilience
Detect
RespondRecover
Prevent
Breaches WILL
happen
Prevention:
Reduce the attack
surface for hackers
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential11
“A Rapidly Expanding Attack Surface
Requires an Interconnected and Integrated
Approach to Security”
- Cisco
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential12
The challenge of hitting a moving target
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential13
Role: Information Security
Evangelize security awareness
Conduct vendor risk assessment
Oversee regulatory compliance
Assess security position of infrastructure
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential14
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
Is Security a Priority?
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential15
Role: IT Security
Mitigates the risk of security incidents and breaches
Identifies and responds quickly to incidents
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential16
Dealing with possible security incidents
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential17
The challenge of managing software
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential18
Role: Desktop Management
Preform application risk assessment
Restrict use of unauthorized applications
Remove unused applications
Control Self-Service deployment
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential19
Global Pharmaceutical Company
89% Reduction in the number of apps from
over 3,700 applications to just 400
• Reduced attack surface
• Improved governance
• Streamlined employee choice
• Saved $1,968,000 in labor costs in the first year
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential20
Role: Software Asset Management
Discover software and maintain normalized inventory
Understand application usage trends
Reduce the application footprint
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential21
Chicago Public Schools
Making informed decisions to reduce new software
purchases and negotiate more favorable vendor contracts
• Identified 29,000 different applications installed
• Discovered end of life (EOL) software
• Collaborated with the security team to remediate issues
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential22
Role: Patch Management
Asses and Prioritize patching
Deploy patches and verify
Align with Security policies
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential23
Security Patch Management
Challenges And Misconceptions
• Patch Management = managing deployment of patches
• No synergy between security assessment and patch activities
• Patching Microsoft applications is good enough
• Focus only on the most common non-Microsoft applications
• Relying on vendor information and alerts
CONSEQUENCES:
• Non prioritized patching process
• Waste of resources
• Applications staying unpatched for
months or many times, years
• Business disruption and breaches
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential24
Time To Patch!
Patch Availability On The Day of Disclosure
Source: “Flexera Software Vulnerability Review 2017.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/
81%
92.5%
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential25
How our customer improved their processes
68%
69%
1 staff/day
58%
25%
Daily and
Weekly
Daily and
Weekly
2+ staff/day
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential26
Conclusion
Operationalize people, processes and technology
in an integrated fashion to effectively reduce the
attack surface for cybercriminals and hackers.
Maintain and share accurate inventory data
Streamline and rationalize your portfolio
Conduct risk assessment
Prioritize security patching
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential27
Additional Resources
Visit us online: www.flexerasoftware.com/enterprise/resources
White Papers:
Bridging Vulnerability Management Gaps
On Demand Webinar:
SAM and Security Teams Must Join Forces to Enhance Security
Success Story:
Chicago Public Schools
Reports:
Vulnerability Review 2017
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential28
WE’RE REIMAGINING THE WAY SOFTWARE IS
w w w . f l e x e r a s o f t w a r e . c o m
SOLD SECUREDMANAGEDBOUGHT
North America: 800-809-5659
Europe, Middle East & Africa: +44 (0) 870 873 6300
Asia-Pacific: +61 3 9895 2000
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE

More Related Content

PDF
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
PDF
Flexera Event - The Game Has Changed - Are You Ready?
PDF
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
PDF
Flexera Software's Why
PDF
BDNA joins Flexera
PPTX
Webinar: How Greater Visibility of Software Assets is Saving Chicago Public ...
PDF
SAM and Security Teams Must Join Forces to Enhance Security
PDF
Crafting Your Oracle License, Contract and Vendor Management Strategy
Keeping a Lid on Costs for Cloud Infrastructure and SaaS Applications
Flexera Event - The Game Has Changed - Are You Ready?
Webinar: Take Proactive Control of Your SAP Licensing, Indirect Usage and Ven...
Flexera Software's Why
BDNA joins Flexera
Webinar: How Greater Visibility of Software Assets is Saving Chicago Public ...
SAM and Security Teams Must Join Forces to Enhance Security
Crafting Your Oracle License, Contract and Vendor Management Strategy

What's hot (20)

PPTX
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
PPTX
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
PDF
Webinar- How Software License Optimization Empowers IT Procurement
PPTX
Webinar: What's New In FlexNet Manager Suite 2018 R1
PDF
7 Things You Need to Know for Your Cloud-First Strategy
PPTX
Flexera Software Toolcase for the ITAM Review Tools Day
PDF
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
PPTX
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
PPTX
Using Automated Policies for SaaS Governance and Compliance
PDF
GDPR is Here. Now What?
PDF
How to Keep your Atlassian Cloud Secure
PDF
Cisco Connect 2018 Singapore - Do more than keep the lights on
PDF
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
PPTX
Flexera New York Tools Day
PPTX
Having Trouble Managing All Your Cloud Services? We Know!
PPTX
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PPTX
Secure Data Sharing in OpenShift Environments
PDF
Software License Optimization Managed Services from Flexera Software
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Webinar- How Software License Optimization Empowers IT Procurement
Webinar: What's New In FlexNet Manager Suite 2018 R1
7 Things You Need to Know for Your Cloud-First Strategy
Flexera Software Toolcase for the ITAM Review Tools Day
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
Using Automated Policies for SaaS Governance and Compliance
GDPR is Here. Now What?
How to Keep your Atlassian Cloud Secure
Cisco Connect 2018 Singapore - Do more than keep the lights on
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
Flexera New York Tools Day
Having Trouble Managing All Your Cloud Services? We Know!
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Secure Data Sharing in OpenShift Environments
Software License Optimization Managed Services from Flexera Software
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Ad

Similar to Do You Manage Software? Understanding Your Role in Cybersecurity Defense (20)

PDF
Six Steps to Secure Access for Privileged Insiders & Vendors
PDF
Security and Data Breach
PPTX
Cisco Security as a foundation for SP Digitization
PDF
5 Mobile App Security MUST-DOs in 2018
PDF
Application Security in a DevOps World
PDF
Protecting What Matters Most – Data
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Vetting Mobile Apps for Corporate Use: Security Essentials
PDF
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
PDF
Responding to the Pandemic: Information Security and Technology Trends
PDF
Top 6 Web Application Security Best Practices.pdf
PPTX
Understanding Your Attack Surface and Detecting & Mitigating External Threats
PDF
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
PDF
Solving for Compliance: Mobile app security for banking and financial services
PDF
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
PDF
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
PPTX
Alfresco Virtual DevCon 2020 - Security First!
PDF
Implementing a Security Management Framework
PDF
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
PDF
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Six Steps to Secure Access for Privileged Insiders & Vendors
Security and Data Breach
Cisco Security as a foundation for SP Digitization
5 Mobile App Security MUST-DOs in 2018
Application Security in a DevOps World
Protecting What Matters Most – Data
Making Security Work—Implementing a Transformational Security Program
Vetting Mobile Apps for Corporate Use: Security Essentials
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Responding to the Pandemic: Information Security and Technology Trends
Top 6 Web Application Security Best Practices.pdf
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Solving for Compliance: Mobile app security for banking and financial services
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Alfresco Virtual DevCon 2020 - Security First!
Implementing a Security Management Framework
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
3 Enablers of Successful Cyber Attacks and How to Thwart Them
Ad

More from Flexera (15)

PDF
Make Smarter Cloud Decisions at Every Step of Your Journey
PDF
The Practical Approach for End-to-End SaaS Management
PPTX
The Role of In-House & External Counsel in Managing Open Source Software
PDF
Addressing Open Source Risks During M&A: A Legal View
PPTX
Webinar: What's New In FlexNet Manager Suite 2018 R1
PPTX
Open Source Security - It can be done easily.
PDF
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
PPTX
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
PDF
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
PPTX
10 Steps to Simplify your Windows 10 Migration
PDF
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
PDF
Cybersecurity Strategy Must Include Software License Optimization
PDF
Webinar: The Power of Normalized Inventory
PPTX
Windows 10 One Year Later: What’s Holding You Back?
PDF
Webinar: What's New in FlexNet Manager Suite 2016
Make Smarter Cloud Decisions at Every Step of Your Journey
The Practical Approach for End-to-End SaaS Management
The Role of In-House & External Counsel in Managing Open Source Software
Addressing Open Source Risks During M&A: A Legal View
Webinar: What's New In FlexNet Manager Suite 2018 R1
Open Source Security - It can be done easily.
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
10 Steps to Simplify your Windows 10 Migration
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Cybersecurity Strategy Must Include Software License Optimization
Webinar: The Power of Normalized Inventory
Windows 10 One Year Later: What’s Holding You Back?
Webinar: What's New in FlexNet Manager Suite 2016

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
KodekX | Application Modernization Development
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Per capita expenditure prediction using model stacking based on satellite ima...
GamePlan Trading System Review: Professional Trader's Honest Take
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
KodekX | Application Modernization Development
The AUB Centre for AI in Media Proposal.docx
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Advanced Soft Computing BINUS July 2025.pdf
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Electronic commerce courselecture one. Pdf

Do You Manage Software? Understanding Your Role in Cybersecurity Defense

  • 1. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential1 Do you manage software? Understand your role in cybersecurity defense Marcelo Pereira, Product Marketing Manager Tim Davis, Senior Product Marketing Manager
  • 2. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential2 The Cyber Threat Facing All Of Us Costs And Consequences Security Incidents and Data Breaches Extensive downtimeExposure of intellectual property Damage to brand and reputation Theft/exposure of confidential data Reduced productivity levels
  • 3. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential3 Impact of incidents Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 4. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential4 To Watch This Webinar On Demand Register Here
  • 5. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential5 Security Incidents versus Data Breaches And the cost of resolving incidents Over 100,000 security incidents in 2015 From which 3,141 Were confirmed data breaches Sources: “2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ * “2015 Cost of Cyber Crime Study: Global.” Ponemon Institute. October 2015. http://www.ponemon.org/blog/2015-cost-of-cyber-crime-united-states $21,000 a day*
  • 6. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential6 Companies Breached In 2016 - Highlights
  • 7. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential7 “The Key Goal: Reducing Adversaries Operational Space” - Cisco Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html Addressing today’s challenges for security
  • 8. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential8 WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 9. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential9 Resilience Detect RespondRecover Prevent Breaches WILL happen
  • 11. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential11 “A Rapidly Expanding Attack Surface Requires an Interconnected and Integrated Approach to Security” - Cisco Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 12. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential12 The challenge of hitting a moving target WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 13. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential13 Role: Information Security Evangelize security awareness Conduct vendor risk assessment Oversee regulatory compliance Assess security position of infrastructure
  • 14. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential14 Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html Is Security a Priority?
  • 15. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential15 Role: IT Security Mitigates the risk of security incidents and breaches Identifies and responds quickly to incidents
  • 16. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential16 Dealing with possible security incidents Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 17. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential17 The challenge of managing software WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 18. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential18 Role: Desktop Management Preform application risk assessment Restrict use of unauthorized applications Remove unused applications Control Self-Service deployment
  • 19. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential19 Global Pharmaceutical Company 89% Reduction in the number of apps from over 3,700 applications to just 400 • Reduced attack surface • Improved governance • Streamlined employee choice • Saved $1,968,000 in labor costs in the first year
  • 20. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential20 Role: Software Asset Management Discover software and maintain normalized inventory Understand application usage trends Reduce the application footprint
  • 21. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential21 Chicago Public Schools Making informed decisions to reduce new software purchases and negotiate more favorable vendor contracts • Identified 29,000 different applications installed • Discovered end of life (EOL) software • Collaborated with the security team to remediate issues
  • 22. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential22 Role: Patch Management Asses and Prioritize patching Deploy patches and verify Align with Security policies
  • 23. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential23 Security Patch Management Challenges And Misconceptions • Patch Management = managing deployment of patches • No synergy between security assessment and patch activities • Patching Microsoft applications is good enough • Focus only on the most common non-Microsoft applications • Relying on vendor information and alerts CONSEQUENCES: • Non prioritized patching process • Waste of resources • Applications staying unpatched for months or many times, years • Business disruption and breaches
  • 24. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential24 Time To Patch! Patch Availability On The Day of Disclosure Source: “Flexera Software Vulnerability Review 2017.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/ 81% 92.5%
  • 25. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential25 How our customer improved their processes 68% 69% 1 staff/day 58% 25% Daily and Weekly Daily and Weekly 2+ staff/day
  • 26. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential26 Conclusion Operationalize people, processes and technology in an integrated fashion to effectively reduce the attack surface for cybercriminals and hackers. Maintain and share accurate inventory data Streamline and rationalize your portfolio Conduct risk assessment Prioritize security patching
  • 27. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential27 Additional Resources Visit us online: www.flexerasoftware.com/enterprise/resources White Papers: Bridging Vulnerability Management Gaps On Demand Webinar: SAM and Security Teams Must Join Forces to Enhance Security Success Story: Chicago Public Schools Reports: Vulnerability Review 2017
  • 28. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential28 WE’RE REIMAGINING THE WAY SOFTWARE IS w w w . f l e x e r a s o f t w a r e . c o m SOLD SECUREDMANAGEDBOUGHT North America: 800-809-5659 Europe, Middle East & Africa: +44 (0) 870 873 6300 Asia-Pacific: +61 3 9895 2000 WATCH THIS WEBINAR ON DEMAND REGISTER HERE