Hi [[ session.user.profile.firstName ]]

Symantec Enterprise Security - APJ

  • Date
  • Rating
  • Views
  • Get all your questions on GDPR answered
    Get all your questions on GDPR answered Sunil Choudrie, Giampiero Nanni, Robert Arandjelovi, Alexander Peters, Ramses Gallego Recorded: Apr 24 2018 60 mins
    Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.

    The discussion will enable you to successfully prepare for the GDPR by:

    • Understanding its full implications for your organisation
    • Identifying and tracking personal data, wherever it may be
    • Implementing cyber security to protect your data systems
    • Detecting and responding effectively to security breaches
    • Building a GDPR compliance program for the long term

    Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
  • 2018 Internet Security Threat Report. The Latest Threat Trends Explained.
    2018 Internet Security Threat Report. The Latest Threat Trends Explained. Peter Sparkes, Senior Director, Cyber Security Services, Symantec Recorded: Apr 12 2018 61 mins
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Peter Sparkes as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Unpacking the Hype: What do the new privacy laws really mean to your business?
    Unpacking the Hype: What do the new privacy laws really mean to your business? Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan Recorded: Mar 20 2018 60 mins
    With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 now in effect, many Australian businesses and government agencies are starting to take action to ensure their data protection and breach response plans are up to date and comply with the new scheme. However, knowing how to avoid the higher penalties and reputational damage caused by data breaches is a tough challenge for any business.

    Don't miss this opportunity to join Symantec's privacy expert Brian Fletcher, Director, Government Affairs, Symantec, Asia Pacific and Japan to learn more about the new laws and what you can do to ensure your business is not making headlines for all the wrong reasons.

    " Hear about new challenges introduced by the Australian mandatory data breach notification laws and the wide reaching General Data Protection Regulation (GDPR)
    " Learn about key steps in the journey towards privacy compliance and why most Australian businesses have approached privacy wrong
    "Understand how these regulations can enable you to gain trust and enhance customer experiences
  • Securing the Cloud Generation: Who’s Using My Cloud
    Securing the Cloud Generation: Who’s Using My Cloud John Cunningham, VP - Cloud Security APAC, Symantec Recorded: Mar 6 2018 43 mins
    Do you know who’s using your cloud?

    Organisations around the world are embracing cloud solutions like Office 365 at a breakneck pace, but online collaborative platforms can leave an unprepared organisation vulnerable to cyber-attacks. Who is accessing your cloud applications? Are they truly authorised users, and are they conducting illegitimate activities?

    Without sufficient visibility, detection and protection, it can be easy for a cyber-criminal, or rogue employee to slip through the cracks – and when they do, your sensitive data won’t be their only target. Cyber-criminals have been known to load partial payloads for ransomware attacks, access email accounts for targeted phishing campaigns, host malware on SharePoint, and more.

    On 6 March 2018, Symantec will be hosting the ‘Securing the Cloud Generation: Who’s Using My Cloud’ webinar. Join our speaker and panel of experts as they discuss:

    •The state of today’s cloud security landscape
    •How to detect unauthorised access or risky user activity
    •How to protect your cloud from cyber threats

    Sign up for the webinar now, and gain critical insights on cyber security in the era of cloud applications and services.
  • The 5 Essentials of Every Next-Gen SOC
    The 5 Essentials of Every Next-Gen SOC Peter Sparkes, Senior Director, Cyber Security Services, Symantec Recorded: Feb 27 2018 57 mins
    Every cybersecurity organisation is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritisation

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • Learn how Proxy Plays a Critical Role in Protecting Your Enterprise
    Learn how Proxy Plays a Critical Role in Protecting Your Enterprise Timothy Chiu - Senior Director of Product Marketing, Symantec Recorded: Feb 6 2018 32 mins
    Solving the most sophisticated security challenges requires an advanced approach that is built upon a proxy-based architecture. This approach allows you to leverage best of breed security technologies to provide a safe and confident cloud and network experience.

    Symantec secure web gateway solutions deliver strong proxy-based security in the form factor your organisation needs: on-premises appliance, virtual appliance, in the cloud, or in a unified hybrid combination of these solutions.

    The solution’s unique proxy architecture allows it to effectively monitor, control, and secure traffic to ensure a safe web and cloud experience.

    In this webinar learn:
    • Why Proxy architecture is more important than ever as a critical security component of your network
    • How a web proxy can serve as a platform for advanced threat detection and data protection
    • Why pre-filtering your sandbox with proxy architecture is a smart move for both your SOC and your bottom line
  • Threat Hunting: A Proactive Approach to Cybersecurity
    Threat Hunting: A Proactive Approach to Cybersecurity Karl Vogel, Worldwide Solution Architect Recorded: Dec 12 2017 59 mins
    Traditional network security products often only kick in when a threat strikes, allowing you to react quickly and effectively to breaches. But every second that is spent identifying and reacting to a breach is another second that the attacker can make off with sensitive data.

    But why react when you can act? With Symantec Security Analytics, your IT security team will be able to proactively search for hidden threats and potential gaps across your network, endpoint and servers, to identify and remove advance threats before they can launch an attack.

    Key benefits of Symantec Security Analytics:
    • Expose the source and scope of an attack with unrivalled data enrichment and threat intelligence
    • Uncover hidden threats in encrypted traffic when deployed with Symantec SSL Visibility
    • Reduce time to resolution with sophisticated anomaly detection and advanced network forensics

    Empower your network with truly proactive defence. Sign up for our webinar today to learn how Symantec Security Analytics can help you take down threats before they strike.
  • Symantec's 2018 Cybersecurity Predictions
    Symantec's 2018 Cybersecurity Predictions Nick Savvides, Chief Technology Officer (Pacific and Japan), Symantec Recorded: Dec 7 2017 63 mins
    In 2018, the Internet of Things (IoT) will take centre stage as botnets, ransomware, and hackers target them with creative techniques such as playing analog sounds to exploit vulnerabilities in these devices.

    Attackers are also gaining expertise in psychology in decision theory, and may use this knowledge to manipulate users. Artificial intelligence (AI) and blockchain technology will also join the fray in the never-ending arms race between cyberattackers and cybersecurity.

    Join us at our ‘2018 Cybersecurity Predictions’ webinar as we discuss these predictions and more, and get prepared for where the security landscape may be headed.
  • Are you Prepared for the General Data Protection Regulations?
    Are you Prepared for the General Data Protection Regulations? Ilias Chantzos, Senior Director EMEA and APJ, Global CIP and Privacy Advisor, Government Affairs, Symantec Corporation Recorded: Nov 28 2017 59 mins
    On 25 May 2018, the European General Data Protection Regulation (GDPR) will come into effect – and while it is an European Union’s regulation, it may still affect your organisation here in the Asia Pacific.

    But how do you know if your organisation needs to comply with the GDPR, and what is required for compliance? With top level fines of over $20 million for non-compliance, it is better to be safe and sure than sorry.

    Join us at our webinar as we discuss:

    • How to find out if your company will be impacted by the GDPR
    • What is needed to comply with the GDPR
    • How the GDPR will be enforced in Asia Pacific
    • Capitalising on the GDPR to improve your business
    • Real-life issues faced by organisations and how technology can help fix them

    Don’t be caught unaware by the GDPR. Register for our webinar today and learn how Symantec technologies help to facilitate GDPR compliance.
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security
    Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester Recorded: Nov 23 2017 62 mins
    Three major trends define the Cloud Generation chaos that organisations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organisations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for organisations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

Embed in website or blog