Hi [[ session.user.profile.firstName ]]

Symantec Enterprise Security - APJ

  • Date
  • Rating
  • Views
  • Phishing Readiness: People can be the weakest link Phishing Readiness: People can be the weakest link Mr Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Sep 22 2016 38 mins
    Technology has become so integrated into our lives that messaging has become a habitual action. Unfortunately, this lack of mindfulness allows attackers to circumvent even the strongest cybersecurity technologies and defenses, through phishing emails and malicious hyperlinks.

    In an organisation, people are often the weakest link in the chain of cyber-security. Even the most conscientious employee may fall victim to a well-crafted phishing email, which can appear legitimate to untrained eyes.

    Join our upcoming webinar and learn about:
    -Why individuals fall victim to cyber-attacks
    -How to measure each employee’s susceptibility
    -How to identify individuals/departments most at risk
    -How smarter, individualised training helps

    Turn your weakest links into your strongest defenders against cyber-attacks today.
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Intelligent Endpoint Security: Why Taking A Modern Approach Matters Robert Westervelt, Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec Recorded: Aug 18 2016 61 mins
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • What makes a Next Gen SOC? What makes a Next Gen SOC? Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Jul 21 2016 52 mins
    As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

    In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

    Join our upcoming webinar and learn about:

    - Core requirements for a Next Gen SOC
    o Flexible Log Collection
    o Big Data Processing
    o Advanced Analytics
    o Real-Time Intelligence
    - SOC-centric services: Incident Response and Advanced Intelligence
    - SOC operating models – Building your own SOC, Operating Models & Extending Services
    - Developing the next generation of security professionals
  • How secure is your Office 365 deployment? How secure is your Office 365 deployment? Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec Recorded: Jun 16 2016 59 mins
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Consider these statistics from IDC:

    • Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
    • Over 90% of threats to enterprises emanate from email
    • 65% of threats go undetected for weeks/months

    IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

    Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Learn how to enhance your Office 365 security to:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication

    Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
  • Symantec 2016 Internet Security Threat Report (APJ) Symantec 2016 Internet Security Threat Report (APJ) Peter Sparkes, Senior Director, Cyber Security Services – Asia Pacific & Japan Recorded: May 26 2016 55 mins
    It’s an unfortunate truth: cyber crime has become part of our daily lives. Even though mega-breaches no longer surprise us, it’s still essential to be vigilant and protect your organization.

    Attend this much-anticipated webinar for an analysis on the 2016 cyber threats from the newly released Symantec Internet Security Threat Report.

    Get the latest research on cyber threats including:

    • Why zero-day vulnerabilities are becoming commodities
    • How ransomware is expanding to new targets such as smartphones, Mac and Linux systems
    • Why 78% of all legitimate websites are putting your end users at risk

    Register now for the latest analysis of APJ cyber threats and specific steps you can take to improve your security posture in 2016.
  • Website Security Threat Report 2016 – Key insights and recommendations Website Security Threat Report 2016 – Key insights and recommendations Jeff Barto – Symantec Trust Strategist Recorded: May 26 2016 58 mins
    Presenting the key insights of Symantec's Website Security Threat Report 2016 - Our annual report on the latest cybercrime trends and developments. Join this webinar to learn:

    · Why today’s web threats and data breaches are bigger and more aggressive than ever before
    · How the industry is responding to new vectors of attack
    · The future big topics for website security
    · Best practice tips and recommendations
  • Dridex: The Financial Threat Clogging Our Mailboxes Dridex: The Financial Threat Clogging Our Mailboxes Orla Cox, Director Security Response, Symantec and Dick O'Brien, Senior Information Developer, Symantec Recorded: May 5 2016 31 mins
    Dridex is one of the most persistent and prevalent threats facing organizations today. Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.

    Join this webcast as we discuss:

    •Dridex propagation methods, in particular its massive spam campaigns.
    •How Dridex attempts to steal banking information.
    •Guidance on how to protect against Dridex infections

    (This webinar is sponsored and brought to you by Symantec.)
  • Demystifying Insider Threat Demystifying Insider Threat Kenneth Durbin,Unified Security Practice Manager for Symantec and Tom Blauvelt,Security Architect for Symantec Recorded: Mar 10 2016 59 mins
    What is “Insider Threat?” The term Insider Threat means different things to different people. We’ll walk you through the three types of Insider Threat as defined by the Carnegie Mellon CERT; Insider Sabotage, Theft of Intellectual Property, and Fraud, and provide real world examples of each.

    We'll explain how Insider Threat impacts individuals, both personally and professionally, the economy, business and National Security.

    Most important will explore how to defend against Insider Threat with a focus on the best in class solutions Symantec provides to help you win the battle.

    By attending this webcast you will learn:

    - What is Insider Threat?
    - Why we all should care about this threat
    - Solutions to defend against Insider Threat
  • Addressing The Skills Gap In Your Cyber Security Team Addressing The Skills Gap In Your Cyber Security Team Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec Recorded: Feb 23 2016 43 mins
    As the cyber threats in the business world evolve, so do the demands on your IT security specialists and their expertise. However it is widely acknowledged that finding, attracting and retaining the skilled talent needed to build and maintain a solid cyber security team presents its own challenges.

    Skilled professionals are in high demand, so attrition is rife, but there is also a fundamental shortage of the number of cyber security experts available to respond to the evolving threat landscape and protect our businesses.

    In this webinar, Peter Sparkes will explore the skills gap in the different stages of a security programme and provide recommendations on:

    • How to create and operationalise a robust cyber security team
    • How to build and upskill existing talent
    • Approaches to address the skills gap in different stages of your security programme
    • Different methods of sourcing skilled security professionals

    (This webinar is sponsored and brought to you by Symantec.)
  • Strategies for the Inevitable Breach (Jointly Presented with Gartner) Strategies for the Inevitable Breach (Jointly Presented with Gartner) David Allott, APJ Enterprise Security, Symantec/ Sid Deshpande, Principal Research Analyst, Gartner Recorded: Jan 21 2016 57 mins
    Today’s cybercriminals employ sophisticated tactics to infiltrate target organizations, customizing attacks to bypass security defenses and achieve their goals. Despite organizations investing in the best prevention technologies, today’s security products are largely not integrated, and security teams are scrambling to ‘connect the dots’ and uncover these threats.

    Join this webinar jointly presented by Gartner and Symantec as we discuss:
    -Latest developments across the threat landscape and why security mindsets are changing.
    -The security framework and complementary technologies needed for effective advanced threat defense.
    -How to strengthen your security strategy using Symantec’s Advanced Threat Protection.

Embed in website or blog