Hi [[ session.user.profile.firstName ]]

Symantec Enterprise Security - APJ

  • Date
  • Rating
  • Views
  • Official Launch of Symantec Control Compliance Suite 12.0
    Official Launch of Symantec Control Compliance Suite 12.0 Anand Visvanathan, Principal Product Manager, Symantec Recorded: Nov 21 2017 44 mins
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webinar on Tuesday, November 21 to find out what’s new in this release and how it will better help you to:

    Measure and prove compliance with security regulations, mandates, and best practices

    Determine risk and prioritise remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • The Threat Landscape – Cybersecurity Trends in 2017 and Beyond
    The Threat Landscape – Cybersecurity Trends in 2017 and Beyond Nick Savvides, Chief Technology Officer (Pacific and Japan), Symantec Recorded: Nov 14 2017 63 mins
    2017 was a year dominated by costly cyber-attacks, massive data breaches, malicious ransomware, and economic espionage. With cyber-criminals getting bolder, and financial rewards getting bigger, cyber-attacks are now a regular occurrence in the news.

    Join us in this webinar as we review:

    • The threat landscape of 2017
    • Who or what were to blame for these ransomware and cyber-attacks
    • What lessons can security professionals like you take from the year
    • What solutions can help secure you as we move into 2018
  • Information Centric Security – The Convergence of Data Protection Technologies
    Information Centric Security – The Convergence of Data Protection Technologies Michael Timms, Product Manager, Symantec Recorded: Sep 28 2017 60 mins
    Cloud integration is no longer an advantage, but a necessity in today’s business landscape. But with sensitive data constantly shuttling between on-premise servers and third-party cloud services, existing point-based security products can no longer effectively track and secure the ever-flowing stream of information.

    Current data security models rely on hardening your network and data centre, but cloud integration requires data to move beyond the perimeters of your infrastructure – leaving your data exposed and vulnerable.

    In our upcoming “Information Centric Security – The Convergence of Data Protection Technologies” webinar, we discuss:

    •Why the cloud requires a new approach to data security
    •How to bridge the gap between DLP, Cloud and Users
    •How to eliminate key management issues through automation
    •How Symantec Information Centric Security works to protect your data wherever it is

    Join the webinar to gain the latest insights into data security in the cloud generation, and how to protect your sensitive data throughout its life cycle, wherever it may reside.
  • Operationalising Threat Intelligence
    Operationalising Threat Intelligence A.J. Nash, Intelligence Services Manager, Symantec Recorded: Sep 27 2017 58 mins
    Gathering data on cyber threats is one thing – creating useful intelligence out of that data, and then making that intelligence actionable is another. An effective system of gathering, analysing and operationalising threat intelligence can often mean the difference between just in time, and too late. But how do you tame the deluge of data?

    In our upcoming "Operationalising Threat Intelligence" webinar, we discuss:

    - Being proactive vs. reactive
    - Technical vs. adversary intelligence
    - Informational vs. actionable intelligence

    Sign up for our webinar and learn how to operationalise threat intelligence to better protect your organisation from emerging threats.
  • Providing Security and Threat Protection for the Enterprise - Why It Matters
    Providing Security and Threat Protection for the Enterprise - Why It Matters Dr. Hugh Thompson, Chief Technology Officer, Symantec Recorded: Sep 20 2017 31 mins
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    In this webinar learn:

    - How a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    - A proxy based architecture is ESSENTIAL to meeting the needs of the cloud generation, to protect against the increasingly sophisticated web threats targeting your business.
  • Not All Endpoint Protection Platforms Are Created Equal
    Not All Endpoint Protection Platforms Are Created Equal Jamie Cromer, Director of Competitive Intelligence, Enterprise Security Product Management, Symantec Recorded: Sep 7 2017 52 mins
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    - Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    - Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    - Lower your IT burden and reduce complexity with everything built into a single agent

    - Facilitate a painless migration and get your IT staff up-to-speed

    Finally, watch a demo that showcases how Symantec helps stop ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Combatting Advanced Cybersecurity Threats with AI and Machine Learning
    Combatting Advanced Cybersecurity Threats with AI and Machine Learning Nick Savvides, CTO, Pacific and Japan, Symantec Recorded: Sep 5 2017 56 mins
    Fictional AI minds like SkyNet in The Terminator and WOPR in WarGames captured our imaginations in the 1980s. Fast forward to the 21st century and now advanced machine learning (ML) and artificial intelligence (AI) have become a critical component of the cybersecurity landscape.

    Machines learn complex patterns and understand subtle interactions from oceans of diverse security telemetry data, yet cybersecurity is not the first industry to use ML or AI to accelerate innovation and change the way it works.

    In our upcoming ‘Combatting Advanced Cybersecurity Threats with Artificial Intelligence and Machine Learning’ webinar, we discuss how:

    • ML and AI is changing the cyber security industry and why it is important for the future of cybersecurity
    • Big data and predictive models equal smarter protection
    • Symantec uses advanced machine learning – from endpoints to the cloud – to analyse file attributes, behaviours and relationships
    • ML and AI will have to evolve to combat threats against their use
  • The Next Frontier for Cloud Security
    The Next Frontier for Cloud Security Mr Rehan Jalil, SVP & GM, Cloud Security, Symantec Recorded: Aug 29 2017 60 mins
    Welcome to the Cloud Generation – where critical data, applications and infrastructure are shifting to the cloud for increased operational efficiency.

    Employees today are accessing everything from everywhere, sensitive data is constantly on the move, and critical workloads are running on a cloud server, somewhere in the world. How do you manage and contain the huge increase in vulnerabilities caused by moving beyond traditional IT controls?

    In our upcoming ‘The Next Frontier for Cloud Security’ webinar, we discuss how to:

    • Govern access to data, apps, and systems that may reside in the cloud
    • Secure information no matter where it sits or goes
    • Protect against advanced threats in this new environment
    • Minimise risk and ensure compliance as workloads move to the cloud

    Join our webinar and discover how Symantec’s Integrated Cyber Defense Platform protects your users, information, and workloads in the Cloud Generation.
  • Symantec and Deloitte discuss “Trust” and Data Privacy in Australia
    Symantec and Deloitte discuss “Trust” and Data Privacy in Australia Brian Fletcher, Director, Government Affairs, Symantec; Marta Ganko, National Privacy and Data Lead, Risk Advisory, Deloitte Recorded: Aug 17 2017 60 mins
    With the advent of Big Data comes not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data.

    These have given rise to local and regional data protection laws and regulations such as the General Data Protection Regulation (GDPR), a modernisation of data protection laws in the European Union, and the Australian data breach notification law, an amendment to the Privacy Act 1988 (Cth) which introduces a mandatory scheme for eligible organisations and federal agencies to report data breaches.

    Data breach notifications give individuals greater control over their personal data and promote transparency over information handling practices, fostering consumer trust in businesses. The law requires businesses to prepare and assess risks to maintain brand confidence even if an incident becomes the next data breach headline.

    Join this webinar to learn about:

    - New challenges introduced by the Australian mandatory data breach notification law
    - Key steps in the journey towards data privacy compliance
    - How to monitor insider threats
    - How to leverage these regulations to gain trust and ensure great customer experiences

    We look forward to your participation in this free webinar.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Recorded: Aug 3 2017 61 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.

Embed in website or blog