Hi [[ session.user.profile.firstName ]]

Symantec Enterprise Security - APJ

  • Date
  • Rating
  • Views
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Recorded: Aug 3 2017 61 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Mega Breaches: How to mitigate your risks using Data-Centric Security?
    Mega Breaches: How to mitigate your risks using Data-Centric Security? Heidi Shey, Senior Analyst, Forrester and Nico Popp, Senior Vice President, Information Protection, Symantec Recorded: Jul 25 2017 57 mins
    What steps are you taking to minimise your risk of becoming a data breach victim? In this webinar, Symantec and a guest speaker from Forrester share best practices to proactively protect your critical data with data-centric security.

    Get advice on preventing data breaches from these industry experts:

    • Guest Speaker Heidi Shey, Senior Analyst, Forrester. Heidi serves Security & Risk Professionals with solutions for data security and privacy. She also researches sensitive data discovery, data loss prevention, cybersecurity, customer-facing breach response and more.

    • Nico Popp, Senior Vice President, Information Protection, Symantec. Nico is the former CTO of VeriSign Security Services where he led efforts to develop new products and services for Trust Services and Identity Protection.

    Join these authorities as they explain how a holistic approach to data security and identity puts you back in control.
  • Integrating Threat Isolation with SWG and SMG (1:00pm SGT)
    Integrating Threat Isolation with SWG and SMG (1:00pm SGT) Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass Recorded: Jul 13 2017 32 mins
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Power of The Proxy
    Power of The Proxy Timothy Chiu, Senior Director, Product Marketing Recorded: Jul 6 2017 30 mins
    The reality & one of the biggest challenges for IT today is that there’s a complex user definition – there are now many options for connectivity via multiple types of devices, and the truth is, there is a lack of security for many of these new devices both on premise and in the cloud.

    The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in remote or distributed offices, or are concerned about the increasing number of cyber threats you are reading about in the headlines, join us for this session to better understand what it means to be a proxy, why that’s so important today, and how that plays against what our competitors are saying about us.

    Register for our webinar ‘Power of The Proxy’ today!
  • Protect Against Ransomware
    Protect Against Ransomware Adam Licata, Senior Product Marketing Manager, Symantec; Damon Covey,Director of Product Management, Symantec Recorded: Jun 22 2017 56 mins
    Ransomware attacks are on the rise and wreaking havoc like never before. Attend this webinar to find out some of the key things you can do to greatly reduce the chance of Ransomware ever becoming an issue for your organization. We will discuss how to set up a strong defense across email, web, endpoints, and workloads.

    Join us for this free session today!
  • Dealing with Skills Gap in Cyber Security
    Dealing with Skills Gap in Cyber Security Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan Recorded: Jun 15 2017 61 mins
    As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.

    A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.

    To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:

    •Create and operationalise a robust cyber security team
    •Build and upskill existing talent
    •Address the skills gap in different stages of your Cyber Security programme
    •Source skilled security professionals differently

    (1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture
    SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Kirk Gibbons, System Engineer, Symantec Recorded: May 30 2017 30 mins
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join us to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape
    2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Peter Sparkes, Senior Director, Cyber Security Services, Symantec Recorded: May 23 2017 54 mins
    2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.

    Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:

    • Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    • One in 131 emails contained a malicious link or attachment – highest rate in five years
    • Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
    • CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.

    Register for the Symantec 2017 Internet Security Threat Report Webinar today.
  • Don't Cry Over WannaCry Ransomware
    Don't Cry Over WannaCry Ransomware Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services Recorded: May 15 2017 39 mins
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • What’s New in Symantec IT Management Suite 8.1?
    What’s New in Symantec IT Management Suite 8.1? Damon Covey, Director of Product Management, Symantec Recorded: Apr 20 2017 58 mins
    Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.

    Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
    • How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
    • Dealing with Windows 10 cumulative updates
    • Handle large updates in bandwidth constrained environments
    • Support for AWS Marketplace, Mac application metering and profile management
    • Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
    • Enhanced support for Ghost Solution Suite
    • Network discovery support via Simple Network Management Protocol v3
    • Off-box data migration and much more


    We look forward to having you for this live session.

Embed in website or blog