Hi [[ session.user.profile.firstName ]]

Symantec

  • Date
  • Rating
  • Views
  • A Step-By-Step Approach For Endpoint Detection & Response
    A Step-By-Step Approach For Endpoint Detection & Response Scott Hardie, System Engineer, Symantec Recorded: May 18 2017 31 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
    2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Kevin Haley, Director of Product Management for Symantec Security Technology and Response Recorded: May 16 2017 61 mins
    2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT devices.

    This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.

    Get the facts in this highly respected research report and learn why:

    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates

    •One in 131 emails contained a malicious link or attachment – highest rate in five years

    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom

    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends and learn steps you can take to improve your security posture in 2017.
  • Symantec IT Management Suite 8.1 & Ghost Solution Suite 3.2 Launch
    Symantec IT Management Suite 8.1 & Ghost Solution Suite 3.2 Launch Damon Covey, Director of Solutions Product Management, Symantec Recorded: May 16 2017 60 mins
    Symantec IT Management Suite 8.1 and Ghost Solution Suite 3.2 are here!

    We will discuss and demo some of the cool new features such as streamlined processes for updating Windows 10 and Office 365, peer-to-peer content distribution, Mac profile management, and much more!

    We will also have a panel of ITMS 8.1 early adopter customers who have already upgraded to IT Management Suite to share their experiences so you can learn all the do's and don'ts of a successful upgrade.

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.1 and Ghost Solution Suite 3.2!

    Please join us for a special webcast on Tuesday, May 16 to learn how these new solutions will make your life easier.
  • Don't Cry Over WannaCry Ransomware
    Don't Cry Over WannaCry Ransomware Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services Recorded: May 15 2017 39 mins
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • The NIST Cybersecurity Framework (CSF): A Federal Use Case
    The NIST Cybersecurity Framework (CSF): A Federal Use Case Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec Recorded: Apr 27 2017 51 mins
    Considered the gold standard for cybersecurity, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is being utilized by the Federal Government agencies to reduce risk.

    Key Learning Objectives:

    •Overview of the NIST CSF

    •How the NIST CSF is currently being used by the Federal Government to compliment The Federal Information Security Management Act (FISMA )

    •Possible future use cases

    Join this webcast for a review on best practices for the NIST CSF being utilized by Federal, State and Local Government
  • Easy Ways to Improve Your Security Posture
    Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec Recorded: Apr 20 2017 28 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 4 of 5: Easy Ways To Improve Your Security Posture

    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
  • The Power of the Proxy
    The Power of the Proxy Timothy Chiu is a Senior Director of Product Marketing for Symantec Recorded: Apr 10 2017 17 mins
    Have you wondered why security companies use proxy technology?

    Listen to our recorded webinar on the “Power of the Proxy” and find out:

    - Why proxy architecture is the most secure technology available on the network

    - How it enables the most advanced security products available today, including Symantec’s Secure Web Gateway products.
  • Zero-Day Attacks and What To Do About It?
    Zero-Day Attacks and What To Do About It? Chris Candaffio, System Engineer, Symantec Recorded: Mar 23 2017 32 mins
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management
    Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management David Finn, Health IT Officer, Symantec and Bob Chaput, Chief Executive Officer, Clearwater Compliance Recorded: Mar 14 2017 59 mins
    Healthcare organizations continue to make headlines as the target of cyberattacks, ransomware threats and the source of large data breaches. Yet according to the latest “Healthcare IT Security and Risk Management Study” conducted by HIMSS Analytics, while investments are being made and more focus is being placed around cyber security, it is still viewed as IT problem, rather than as a business risk management issue.

    Join us for the “Operationalizing Cybersecurity in Healthcare” webinar as we reveal findings from the study and what healthcare leaders can do to address these gaps and shift their organization from a tactical and reactive mindset to a robust and sustainable risk-management program.

    During this webinar, we will also discuss:

    • How IT, Security, Business, and Clinical leaders are approaching cybersecurity readiness and the role it has as part of their risk management strategy

    • What’s driving the decisions on where cybersecurity investments are being made

    • Critical steps to achieving a comprehensive cybersecurity strategy

    Register Today
  • Risk Insight – An Actionable Approach For Your Security Posture
    Risk Insight – An Actionable Approach For Your Security Posture Marcelo Oliveira, Sr. Director of Product Management, Symantec Recorded: Mar 3 2017 23 mins
    Determining the effectiveness of your security posture is fraught with challenges. You have products in place, but how do you make sense of all the data. And how do you balance the day-to-day operations with the need to proactively improve your security posture?

    Learn how Risk Insight can help you gain the insight you need:

    · Communicate to executive leadership a 360 degree view of your security posture compared to your industry peers

    · Investigate using granular data analysis to identify your most vulnerable endpoints, riskiest users, and more

    · Utilize automated reports from data already available in your environment

    In addition we’ll show you Risk Insight in action, with a demo that showcases the power of the analytics and the simplicity of the interface.

    Watch On-Demand Any Time

Embed in website or blog