Hi [[ session.user.profile.firstName ]]

Symantec

  • Date
  • Rating
  • Views
  • Prevent Malware Attacks by Adding the Power of Web Isolation
    Prevent Malware Attacks by Adding the Power of Web Isolation Gerry Grealish, Senior Director – Product Marketing, Cloud Security, Symantec Recorded: Sep 19 2017 31 mins
    Web Isolation gives you safe access to uncategorized and potentially risky websites, without risk of malware infection.

    This powerful category of technology, predicted by Gartner to be adopted by 50% of enterprises by 2021. Web Isolation creates a secure execution environment between end-users and the web, sending only a safe visual stream to users’ browsers.

    Since no code is actually executed on endpoint machines, Symantec Web Isolation eliminates web-borne threats from ever reaching their devices.

    Find out how Symantec is integrating Web Isolation with other products in its Web and Cloud Security portfolio to keep you safe from ransomware and other advanced threats.

    Register Today
  • Prevent Malware Attacks by Adding the Power of Web Isolation
    Prevent Malware Attacks by Adding the Power of Web Isolation Gerry Grealish, Senior Director – Product Marketing Cloud Security, Symantec Recorded: Sep 14 2017 31 mins
    Web Isolation gives you safe access to uncategorized and potentially risky websites, without risk of malware infection.

    This powerful category of technology, predicted by Gartner to be adopted by 50% of enterprises by 2021. Web Isolation creates a secure execution environment between end-users and the web, sending only a safe visual stream to users’ browsers.

    Since no code is actually executed on endpoint machines, Symantec Web Isolation eliminates web-borne threats from ever reaching their devices.

    Find out how Symantec is integrating Web Isolation with other products in its Web and Cloud Security portfolio to keep you safe from ransomware and other advanced threats.

    Register Today
  • Responding to Healthcare Data Breaches with the NIST Cybersecurity Framework
    Responding to Healthcare Data Breaches with the NIST Cybersecurity Framework Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Sep 12 2017 55 mins
    Part 5 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    A cybersecurity event is occurring in you hospital. What do you do? Will you be prepared and can you quickly and efficiently take action or simply stand by and watch it unfold? The ability to respond to a cyberattack in a timely fashion is incredibly important, especially for healthcare organizations that house loads of personally identifiable information that is critical to their care delivery mission.



    In this webinar, taking place September 12 at 1pm eastern, we will explore the RESPOND function of the NIST CSF and what tools and processes healthcare organizations need in order to minimize impact during a cyber incident. 



    Webinar attendees will learn:

    •The different aspects of the RESPOND function of the NIST CSF, along with which activities security experts believe to be the most important.

    •A detailed look at all the categories of the RESPOND function and how they work in harmony with other parts of the NIST CSF.

    •The most important controls and solutions available to have in place when an incident does occur.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 6-7 https://resource.elq.symantec.com/LP=4235
  • Smart Governance: Defining Your IT Strategy
    Smart Governance: Defining Your IT Strategy Route Fifty | Underwritten by: Symantec Recorded: Aug 31 2017 55 mins
    Now more than ever, IT leaders are dealing with changing policies, new and varying risks, increasing demands and restricted budgets, but they must continue to operate their information technology services responsibly and with transparency. Strong IT governance is an integral component for state governments across the country in tackling today’s challenges while also innovating for the future.

    During this digital viewcast, we’ll speak with state technology officials about how to build and execute a strategic IT governance framework that allows for agility, provides secure and efficient services, modernizes processes and technologies, optimizes resources and ultimately ensures mission success.


    Click "Attend" to confirm your registration.
  • Extend Content & Malware Analysis Beyond ProxySG to Email & Double Your Security
    Extend Content & Malware Analysis Beyond ProxySG to Email & Double Your Security Alan Hall, Content & Malware Analysis, Symantec & Yvonne Dresser, Messaging Gateway, Symantec Recorded: Aug 31 2017 48 mins
    Symantec recently extended Content & Malware Analysis’s advanced threat protection capabilities to Messaging Gateway, Symantec’s on-premises email security solution. With this integration, Content & Malware Analysis adds additional value by bringing threat analysis, blocking, and remediation to the email channel.


    Join Symantec product team members from Messaging Gateway and Content & Malware Analysis to get an overview of Messaging Gateway and learn how this combined solution addresses today’s latest email borne threats through:
    •Advanced scanning and sandboxing to detect and block malicious files and URLs
    •In-depth threat analysis and summary dashboard-level visibility
    •Threat correlation analysis across Symantec Endpoint Protection, Proxy SG and Messaging Gateway

    Don't miss this great opportunity to speak with our product experts and get your questions answered!
  • Comprehensive Protection and Visibility into Advanced Email Attacks
    Comprehensive Protection and Visibility into Advanced Email Attacks Nirav Shah, Manager, Product & GTM Strategy, Symantec & Naveen Palavalli, Director, Product & GTM Strategy, Symantec Recorded: Aug 30 2017 49 mins
    The latest version of the Symantec Cloud Email Security solution provides the strongest protection against Business Email Compromise with new, automated impersonation controls.

    In addition, this release offers the deepest visibility into targeted & advanced attacks with advanced email security analytics that now includes insights into both clean and malicious emails with 60+ data points on each email.

    Join this webcast to learn more about these new capabilities in and see them in action! Find out how Symantec Cloud Email Security can help you:

    • Defend your business from Business Email Compromise, spear phishing, spoofing attacks, and other scams

    • Accelerate response to targeted and advanced email attacks with more visibility than ever into email threats

    • Quickly correlate and respond to threats by exporting advanced email security analytics to your Security Operations Center
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments
    Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec Recorded: Aug 22 2017 34 mins
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
  • Detecting a Healthcare Breach with the NIST Cybersecurity Framework
    Detecting a Healthcare Breach with the NIST Cybersecurity Framework Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Aug 17 2017 55 mins
    Part 4 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it.

    In this webinar, we’ll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they’ve been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.

    We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes.

    It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 5-7 https://resource.elq.symantec.com/LP=4235
  • Using IT Management Suite to Optimize Content Distribution and Updates
    Using IT Management Suite to Optimize Content Distribution and Updates Tomas Chinchilla, Product Manager, Enterprise Security Products, Symantec Recorded: Aug 16 2017 60 mins
    One of the newest features in Symantec IT Management Suite is peer-to-peer downloading which helps optimize content distribution by utilizing the endpoint to periodically check for updates among endpoints nearby and automatically download new content to stay up to date.

    This new functionality provides a scalable distribution model that utilizes the endpoint to supplement the ITMS infrastructure, minimizing the impact on network bandwidth without requiring any changes to network or security configuration.

    Join this webinar on August 16 to learn more about how peer-to-peer downloading works and the best practices for using it in your environment.
  • Providing Security and Threat Protection for the Enterprise - Why It Matters
    Providing Security and Threat Protection for the Enterprise - Why It Matters Dr. Hugh Thompson, Chief Technology Officer, Symantec Recorded: Aug 10 2017 31 mins
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    In this webinar learn:

    - How a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    - A proxy based architecture is ESSENTIAL to meeting the needs of the cloud generation, to protect against the increasingly sophisticated web threats targeting your business.

Embed in website or blog