Webinars targeted to software security professionals
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.
Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be impacted again.
Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:
•What are your options if you’re targeted by a ransomware attack
•Why Symantec Endpoint Protection 14 can address ransomware better than other solution
•How Symantec technologies work together for maximum protection
And if that wasn't enough, watch Symantec Endpoint Protection 14 in action. We will share a demo with you that showcases the power of its advanced technologies.
Are you aware of the changes Microsoft introduced for providing updates to Windows 10 and Office 365? These changes for feature and cumulative updates and roll-ups have caused confusion and additional complexity for many enterprises.
Join our webinar to learn:
- What these changes are
- How these changes can impact managing your environment, especially for patch management
- How IT Management Suite will simplify keeping Windows 10 and Office 365 up to date
There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.
ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.
Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
2017 will see even more IoT devices introduced into business networks, along with an increasingly mobile workforce enabled by cloud applications and services. This rapid evolution of the workplace necessitates a re-look at where the security industry should focus on, in the ongoing battle against cybercriminals.
As 2016 comes to an end, our Security Intelligence team have compiled a list of the top security predictions for 2017 and beyond.
Attend our ‘Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead’ webinar and join our discussion of the upcoming threat landscape.
In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?
Attend this webcast to hear from 451 Research Security Analyst, Adrian Sanabria as he takes a closer look at the state of the market for Endpoint Protection. Symantec’s, Director of Security Response, Kevin Haley, joins Adrian, as he discusses the latest developments with Symantec Endpoint Protection 14 and it gives hope to customers trying to navigate this changing market.
Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.
Key Learning Objectives:
•What is the state of the industry for Endpoint Protection technology
•Why machine learning is not enough
•Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.
So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.
We will explain how Symantec technology addresses this approach and how you will benefit from:
•Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
•Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
•Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.
This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.
Join our upcoming webinar and learn about:
•The importance of workflow for Incidence Response
•How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
•How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
•The integrated incident response process that supports security incident investigation and remediation
•The follow up actions required to close an incident
Technology has become so integrated into our lives that messaging has become a habitual action. Unfortunately, this lack of mindfulness allows attackers to circumvent even the strongest cybersecurity technologies and defenses, through phishing emails and malicious hyperlinks.
In an organisation, people are often the weakest link in the chain of cyber-security. Even the most conscientious employee may fall victim to a well-crafted phishing email, which can appear legitimate to untrained eyes.
Join our upcoming webinar and learn about:
-Why individuals fall victim to cyber-attacks
-How to measure each employee’s susceptibility
-How to identify individuals/departments most at risk
-How smarter, individualised training helps
Turn your weakest links into your strongest defenders against cyber-attacks today.
Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.
Join us for an interactive discussion and learn more about:
• How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection
• What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack
• Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems
• How risk assessment plays a role in strengthening your security to preempt future attacks
As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.
In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.
Join our upcoming webinar and learn about:
- Core requirements for a Next Gen SOC
o Flexible Log Collection
o Big Data Processing
o Advanced Analytics
o Real-Time Intelligence
- SOC-centric services: Incident Response and Advanced Intelligence
- SOC operating models – Building your own SOC, Operating Models & Extending Services
- Developing the next generation of security professionals
Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.
Consider these statistics from IDC:
• Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
• Over 90% of threats to enterprises emanate from email
• 65% of threats go undetected for weeks/months
IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.
Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.
Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.
Learn how to enhance your Office 365 security to:
• Shield Email From Phishing, Sophisticated Malware and Spam
• Neutralize Advanced Threats and Targeted Attacks
• Safeguard Your Sensitive Data
•Control Access with Strong Authentication
Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!