Hi [[ session.user.profile.firstName ]]

Symantec

  • Date
  • Rating
  • Views
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security
    Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering, Information Protection at Symantec Recorded: Jun 22 2017 57 mins
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Protecting Your Sensitive Data
    Protecting Your Sensitive Data Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jun 16 2017 2 mins
    Protecting Sensitive Data in the Cloud: In this short video learn how Proxy and DLP enables information security on prem or in the cloud.
  • Comparing Next Generation Firewalls to Proxy
    Comparing Next Generation Firewalls to Proxy Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jun 16 2017 3 mins
    Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure
  • Taking Proxy to the Cloud
    Taking Proxy to the Cloud Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jun 16 2017 3 mins
    This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service.
  • Proxy Essentials
    Proxy Essentials Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jun 16 2017 3 mins
    This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.
  • Google Docs and the Future of Phishing Scams
    Google Docs and the Future of Phishing Scams Vikram Thakur, Technical Director Security Response and Ulf Mattsson (Atlantic BT) Recorded: Jun 8 2017 60 mins
    When the Google Docs phishing scam spread across the network in early May, it showed what a sophisticated phishing email looks like. It did not ask for a user's password and in some cases, it came from contacts the user already knew. What made this scam so hard to spot and what can we expect to see in the future when it comes to phishing attacks?

    Join this panel of experts to learn:
    - Latest trends in phishing scams
    - How to spot a phishing email from a mile away
    - Recommendations on how to avoid becoming a victim

    Moderator:
    - David Morris, Pioneer in Cybersecurity

    Speakers:
    - Phil Richards, CSO of Ivanti Software
    - Vikram Thakur, Technical Director, Security Response Team at Symantec
    - Sean Hittel, Principal Security Engineer at Netskope
  • Using the NIST Cybersecurity Framework to Identify Protected Health Information
    Using the NIST Cybersecurity Framework to Identify Protected Health Information Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Vishal Gupta, VP, Engineering/Product Management, Symantec Recorded: Jun 1 2017 62 mins
    Part 2 of 7: The NIST Cybersecurity Framework Healthcare Webinar Series

    Of the 16 critical infrastructure sectors, healthcare is the only one yet to adopt a formal cybersecurity framework. That may be about to change.

    Join Symantec on June 1 for the second webinar in our series around how healthcare organizations can adopt the NIST Cybersecurity Framework (CSF).

    In this webinar – Using the NIST CSF to Identify Protected Health Information (PHI) – we will look at the Identify function, knowing that you cannot protect what you don’t know you have.

    Healthcare organizations need to identify digital systems, what data they hold, how it is used, and what value it holds before they can make the right decisions on how to protect it under their Risk Management program.

    This webinar will look at technical and administrative controls that reflect your mission and operations and why it must be the first step in protecting your sensitive data and patient information.

    During this webinar we will:

    -Discuss how to successfully implement an asset and risk management strategy that incorporates all of your hardware, software, and data to gain complete visibility of your organization’s assets

    -Provide a practical guide for healthcare organizations to navigate through the 5 categories within the Identify function

    On-Demand Webinar Series:
    - Part 1 of 7: Demystifying NIST Cybersecurity Framework for Healthcare Series http://bit.ly/Part10209WebinarNIST

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 3-7 https://resource.elq.symantec.com/LP=4235
  • A Step-By-Step Approach For Endpoint Detection & Response
    A Step-By-Step Approach For Endpoint Detection & Response Scott Hardie, System Engineer, Symantec Recorded: May 18 2017 31 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
    2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: May 16 2017 61 mins
    2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT devices.

    This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.

    Get the facts in this highly respected research report and learn why:

    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates

    •One in 131 emails contained a malicious link or attachment – highest rate in five years

    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom

    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends and learn steps you can take to improve your security posture in 2017.
  • Symantec IT Management Suite 8.1 & Ghost Solution Suite 3.2 Launch
    Symantec IT Management Suite 8.1 & Ghost Solution Suite 3.2 Launch Damon Covey, Director of Solutions Product Management, Symantec Recorded: May 16 2017 60 mins
    Symantec IT Management Suite 8.1 and Ghost Solution Suite 3.2 are here!

    We will discuss and demo some of the cool new features such as streamlined processes for updating Windows 10 and Office 365, peer-to-peer content distribution, Mac profile management, and much more!

    We will also have a panel of ITMS 8.1 early adopter customers who have already upgraded to IT Management Suite to share their experiences so you can learn all the do's and don'ts of a successful upgrade.

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.1 and Ghost Solution Suite 3.2!

    Please join us for a special webcast on Tuesday, May 16 to learn how these new solutions will make your life easier.

Embed in website or blog