Hi [[ session.user.profile.firstName ]]

Symantec Customer Success

  • Date
  • Rating
  • Views
  • Symantec Endpoint Protection Mobile Product Updates - July 2019
    Symantec Endpoint Protection Mobile Product Updates - July 2019
    Maya Mandel, Sr. Dir., Product Management , Symantec Recorded: Jul 17 2019 61 mins
    Join us for a customer dialog to learn about the latest Symantec Endpoint Protection (SEP) Mobile features and ask any product-related questions.

    You will learn about:

    Unwanted app rules based on Appthority insights
    User risk: breached accounts
    Mobile EDR: Investigating suspicious iOS modules
    Management Console localization
    SOC 2 Type 2 compliance
    Environment navigation and management
    Symantec Mobile App Defense (B2B2C SDK)
    A new health warning for devices missing a mandatory permission
    MDM integrations: iOS app inventory sync visibility
    SEP Mobile and Microsoft Defender ATP
  • Automated Hunting for Malicious Insiders and Advanced threats using Symantec ICA
    Automated Hunting for Malicious Insiders and Advanced threats using Symantec ICA
    Bruce Ong, Director of Product Management, Symantec, Ryan Stolte, ICA Chief Technical Architect, Bay Dynamics Recorded: Jun 25 2019 60 mins
    Preventing Malicious Insiders from wreaking havoc and stealing sensitive data is extremely challenging as today’s security teams and SOC operators must analyze huge volumes of data to isolate threats. Further, even when risks are uncovered, in-depth investigation must encompass numerous security systems and data streams to determine how these activities can be stopped.

    In this webinar, you’ll learn how Symantec Information Centric Analytics automates threat hunting and speeds remediation, pinpointing problematic behaviours and informing response.
  • Web Isolation and Threat Risk Levels: Protection for Risky and Unknown Websites.
    Web Isolation and Threat Risk Levels: Protection for Risky and Unknown Websites.
    Timothy Chiu (Sr Director, Product Marketing) Recorded: Jun 13 2019 52 mins
    Threat Risk Levels are one of the newest ways to help combat malicious websites, but there’s still a set of websites that are suspicious and we don’t have enough information to call them bad or good. Web Isolation fills a gap, providing safe browsing of suspicious websites, with zero risk of malicious code infecting the user’s computer. Learn about Web Isolation (WI) and how to use WI with Threat Risk Levels in this upcoming webinar.
  • How to Implement a Cloud Center of Excellence
    How to Implement a Cloud Center of Excellence
    Jeannie Warner, Sr. Manager, Product Management Outbound, Symantec Recorded: May 16 2019 55 mins
    Gartner security industry analysts recommend the establishment of a Cloud Center of Excellence (CCoE) within every organization, represented by a cross-functional team of people responsible for developing and leading cloud strategy, governance, and best practices.
  • SSL Visibility Appliance and Integration Overview
    SSL Visibility Appliance and Integration Overview
    Bob Blair, Sr. System Engineer, Symantec Recorded: May 9 2019 59 mins
    In an era where most network traffic is SSL/TLS encrypted, organization need solutions to find encrypted threats without compromising their overall security posture. Unfortunately, some TLS interception solutions will introduce security risk in order to gain visibility. This technical webinar will teach you how the Symantec SSL Visibility Appliance can help you expose TLS encrypted threats, improve your security posture, and maximize the value of your network security investments.
  • Email Security.cloud: A walkthrough of the latest product enhancements
    Email Security.cloud: A walkthrough of the latest product enhancements
    Jimmy Lin, Sr. Product Manager, Symantec Recorded: Apr 25 2019 61 mins
    On 29 March 2019, we further extended the capabilities of Symantec Email Security.cloud. As a SaaS security service, it undergoes many upgrades throughout the year, allowing us to make improvements and add new capabilities. We have always understood the importance of ensuring our products are designed around the user’s needs. This is critical as our customers rely on Symantec to provide a highly practical solution.

    In this webinar, we’ll do a deep dive into some of the recent enhancements of our Email Security.cloud solution:

    Indicators of Compromise Blacklisting
    Service Configuration Health
    Symantec Email Security.cloud App for QRadar
    And more
  • Threat Risk Levels: Another Tool in ProxySG to Battle Dangerous Websites
    Threat Risk Levels: Another Tool in ProxySG to Battle Dangerous Websites
    Timothy Chiu, Senior Director, Product Marketing, Network Security Products Recorded: Apr 17 2019 51 mins
    Millions of new URLs are created every day. Traditional URL filtering using categorization can’t keep up with the websites that may only exist for 24 hours or less. Learn how new AI engines in the Global Intelligence Network take website metadata and generate a threat risk level for every new URL, giving you crucial information for policy decisions on web access. Learn about Threat Risk Levels in this upcoming webinar.
  • Cloud Workload Assurance: A Journey from visibility to compliance on the Cloud
    Cloud Workload Assurance: A Journey from visibility to compliance on the Cloud
    Daniel Frey (Sr. Manager, Prod Marketing) and Anand Visvanathan (Dir. Prod Management) Recorded: Apr 11 2019 50 mins
    Misconfigurations of cloud services can lead to gaping holes in your cloud environment and present low hanging fruit for attackers. Cloud users need a proactive, automated approach to monitoring and securing the cloud control plane.

    In this webinar, you’ll learn how as a user you can tackle the most pressing problems that face some companies during their cloud journey

    • Configuration Errors: Monitor changes happening to cloud services in real-time and maintain your “gold standard” security posture.
    • Painstaking Triage: Automate the remediation process to handle any security issues for both inline as well as offline workflows.
  • Symantec Endpoint Protection Mobile Product Updates - April 2019
    Symantec Endpoint Protection Mobile Product Updates - April 2019
    Maya Mandel, Sr Dir. Product Management Recorded: Apr 10 2019 57 mins
    Join us for a periodical customer dialog to learn about the latest Symantec Endpoint Protection (SEP) Mobile features and ask any product-related questions.

    You will learn about:

    Detection and protection against untrusted DNS server
    Content manipulation classification
    Mobile security headlines and newsletter
    SEP Mobile on the Symantec Help Center
    Intune: support complex deployment needs
    AirWatch: support encrypted end-user email addresses
  • 2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    2019 Internet Security Threat Report (ISTR): The New Threat Landscape
    Kevin Haley, Director Product Management, Security Technology & Response, Symantec Recorded: Mar 28 2019 59 mins
    As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

    Join us as we discuss these trends and more:

    - Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

    - Living off the land and supply chain attacks are now a staple of the new threat landscape.

    - Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

    - Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

    Please Join Us, Register Today

Embed in website or blog