Hi [[ session.user.profile.firstName ]]

Symantec Customer Success

  • Date
  • Rating
  • Views
  • Web Isolation and Threat Risk Levels: Protection for Risky and Unknown Websites.
    Web Isolation and Threat Risk Levels: Protection for Risky and Unknown Websites.
    Timothy Chiu (Sr Director, Product Marketing) Recorded: Jun 13 2019 52 mins
    Threat Risk Levels are one of the newest ways to help combat malicious websites, but there’s still a set of websites that are suspicious and we don’t have enough information to call them bad or good. Web Isolation fills a gap, providing safe browsing of suspicious websites, with zero risk of malicious code infecting the user’s computer. Learn about Web Isolation (WI) and how to use WI with Threat Risk Levels in this upcoming webinar.
  • How to Implement a Cloud Center of Excellence
    How to Implement a Cloud Center of Excellence
    Jeannie Warner, Sr. Manager, Product Management Outbound, Symantec Recorded: May 16 2019 55 mins
    Gartner security industry analysts recommend the establishment of a Cloud Center of Excellence (CCoE) within every organization, represented by a cross-functional team of people responsible for developing and leading cloud strategy, governance, and best practices.
  • SSL Visibility Appliance and Integration Overview
    SSL Visibility Appliance and Integration Overview
    Bob Blair, Sr. System Engineer, Symantec Recorded: May 9 2019 59 mins
    In an era where most network traffic is SSL/TLS encrypted, organization need solutions to find encrypted threats without compromising their overall security posture. Unfortunately, some TLS interception solutions will introduce security risk in order to gain visibility. This technical webinar will teach you how the Symantec SSL Visibility Appliance can help you expose TLS encrypted threats, improve your security posture, and maximize the value of your network security investments.
  • Email Security.cloud: A walkthrough of the latest product enhancements
    Email Security.cloud: A walkthrough of the latest product enhancements
    Jimmy Lin, Sr. Product Manager, Symantec Recorded: Apr 25 2019 61 mins
    On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.

    In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:

    Indicators of Compromise Blacklisting
    Service Configuration Health
    Symantec Email Security.cloud App for QRadar
    And more
  • Threat Risk Levels: Another Tool in ProxySG to Battle Dangerous Websites
    Threat Risk Levels: Another Tool in ProxySG to Battle Dangerous Websites
    Timothy Chiu, Senior Director, Product Marketing, Network Security Products Recorded: Apr 17 2019 51 mins
    Millions of new URLs are created every day. Traditional URL filtering using categorization can’t keep up with the websites that may only exist for 24 hours or less. Learn how new AI engines in the Global Intelligence Network take website metadata and generate a threat risk level for every new URL, giving you crucial information for policy decisions on web access. Learn about Threat Risk Levels in this upcoming webinar.
  • Cloud Workload Assurance: A Journey from visibility to compliance on the Cloud
    Cloud Workload Assurance: A Journey from visibility to compliance on the Cloud
    Daniel Frey (Sr. Manager, Prod Marketing) and Anand Visvanathan (Dir. Prod Management) Recorded: Apr 11 2019 50 mins
    Misconfigurations of cloud services can lead to gaping holes in your cloud environment and present low hanging fruit for attackers. Cloud users need a proactive, automated approach to monitoring and securing the cloud control plane.

    In this webinar, you’ll learn how as a user you can tackle the most pressing problems that face some companies during their cloud journey

    • Configuration Errors: Monitor changes happening to cloud services in real-time and maintain your “gold standard” security posture.
    • Painstaking Triage: Automate the remediation process to handle any security issues for both inline as well as offline workflows.
  • Symantec Endpoint Protection Mobile Product Updates - April 2019
    Symantec Endpoint Protection Mobile Product Updates - April 2019
    Maya Mandel, Sr Dir. Product Management Recorded: Apr 10 2019 57 mins
    Join us for a periodical customer dialog to learn about the latest Symantec Endpoint Protection (SEP) Mobile features and ask any product-related questions.

    You will learn about:

    Detection and protection against untrusted DNS server
    Content manipulation classification
    Mobile security headlines and newsletter
    SEP Mobile on the Symantec Help Center
    Intune: support complex deployment needs
    AirWatch: support encrypted end-user email addresses
  • 2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    Kevin Haley, Director Product Management, Security Technology & Response, Symantec Recorded: Mar 28 2019 59 mins
    As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

    Join us as we discuss these trends and more:

    - Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

    - Living off the land and supply chain attacks are now a staple of the new threat landscape.

    - Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

    - Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

    Please Join Us, Register Today
  • Advanced Automated Security with Symantec and Splunk
    Advanced Automated Security with Symantec and Splunk
    Colin Gibbens (Dir Prod Mgmt, Enterprise Security Products) and Don Leatham (Sr Manager, Global Strategic Alliances) Recorded: Mar 26 2019 60 mins
    Cyber attackers are using sophisticated automation tactics to quickly find and exploit weaknesses in organizational defenses. Normal response tactics fail to mitigate or stop these “machine speed” attacks. The information necessary to address these attacks is often in different security tools, none of which are easily connected and coordinated.
    In this webinar, you will learn how Symantec and Splunk products address this problem by working together to automate a complete, closed-loop security system.
  • An introduction to Symantec Email Fraud Protection
    An introduction to Symantec Email Fraud Protection
    Anant Krishna Vadlamani, Brian Westnedge, Steve Whittle Recorded: Jan 16 2019 42 mins
    In this webinar, we’ll go in depth on Symantec Email Fraud Protection, a new automated DMARC enforcement solution that provides another layer of defence to eliminate the single biggest phishing attack vector: exact-domain impersonation.

Embed in website or blog