Webinars targeted to software security professionals
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.
The reality & one of the biggest challenges for IT today is that there’s a complex user definition – there are now many options for connectivity via multiple types of devices, and the truth is, there is a lack of security for many of these new devices both on premise and in the cloud.
The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in remote or distributed offices, or are concerned about the increasing number of cyber threats you are reading about in the headlines, join us for this session to better understand what it means to be a proxy, why that’s so important today, and how that plays against what our competitors are saying about us.
Register for our webinar ‘Power of The Proxy’ today!
Ransomware attacks are on the rise and wreaking havoc like never before. Attend this webinar to find out some of the key things you can do to greatly reduce the chance of Ransomware ever becoming an issue for your organization. We will discuss how to set up a strong defense across email, web, endpoints, and workloads.
As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.
A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.
To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:
•Create and operationalise a robust cyber security team
•Build and upskill existing talent
•Address the skills gap in different stages of your Cyber Security programme
•Source skilled security professionals differently
(1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.
Join us to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:
•Why tighter integration between the network and endpoint improves security posture
•How new REST APIs help orchestrate a rapid response at the endpoint
•What the future plans are for new APIs, integrations, and global threat intelligence
Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.
2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.
Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:
• Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
• One in 131 emails contained a malicious link or attachment – highest rate in five years
• Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
• CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000
Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.
Register for the Symantec 2017 Internet Security Threat Report Webinar today.
Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.
Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
• How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
• Dealing with Windows 10 cumulative updates
• Handle large updates in bandwidth constrained environments
• Support for AWS Marketplace, Mac application metering and profile management
• Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
• Enhanced support for Ghost Solution Suite
• Network discovery support via Simple Network Management Protocol v3
• Off-box data migration and much more
We look forward to having you for this live session.
All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.
Join us to learn what can be done to block exploit attacks on day zero:
• What behaviors and techniques are used to block attacks
• Why exploit prevention plays a critical part in endpoint protection
• How Memory Exploit Mitigation works
Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.
With the advent of Big Data came not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data. This gave rise to the General Data Protection Regulation (GDPR), a modernisation and harmonisation of data protection laws in the European Economic Area.
The GDPR gives individuals greater control over their personal data, while also streamlining regulation and fostering consumer trust in businesses. However, with implementation just around the corner in 2018, over 90% of businesses are still underprepared for compliance within the next two years(1).
Join this webinar to learn about:
•What GDPR entails and what the timelines are
•Who's who in the protection of personal data
•Business concerns with the GDPR
•Key steps of the journey towards GDPR compliance
•How Symantec Control Compliance Suite Assessment Manager (CCS AM) can help your organisation with GDPR compliance
Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be impacted again.
Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:
•What are your options if you’re targeted by a ransomware attack
•Why Symantec Endpoint Protection 14 can address ransomware better than other solution
•How Symantec technologies work together for maximum protection
And if that wasn't enough, watch Symantec Endpoint Protection 14 in action. We will share a demo with you that showcases the power of its advanced technologies.
Are you aware of the changes Microsoft introduced for providing updates to Windows 10 and Office 365? These changes for feature and cumulative updates and roll-ups have caused confusion and additional complexity for many enterprises.
Join our webinar to learn:
- What these changes are
- How these changes can impact managing your environment, especially for patch management
- How IT Management Suite will simplify keeping Windows 10 and Office 365 up to date