Hi [[ session.user.profile.firstName ]]

Symantec Customer Success

  • Date
  • Rating
  • Views
  • Technical Education Series: Securing the Cloud Approach
    Technical Education Series: Securing the Cloud Approach
    Mohammad Kaouk, World Wide Solutions Architect Recorded: Nov 14 2018 88 mins
    In this webinar you will learn how to utilize Symantec’s Web Security Service in order to secure your day to day interactions with the Internet
  • Symantec Endpoint Protection Mobile Product Updates - October 2018
    Symantec Endpoint Protection Mobile Product Updates - October 2018
    Maya Mandel, Sr Dir, Product Management Recorded: Oct 25 2018 49 mins
    Join us for a monthly customer dialog to learn about the latest Symantec Endpoint Protection (SEP) Mobile features and ask any product-related questions.

    You will learn about:

    A new on-device protection action against malicious URLs
    Trusted enterprise developer certificates
    Risky hosts file detection
    Auto-login on unmanaged iOS devices
    SEP Mobile apps localization
    Download risky APKs directly from the Management Console
    Compliance policy based on app classification
    Marking Android apps as unwanted based on the actual device state
    Support for Android work profile devices
    And more...
  • Email Security.Cloud: Policy Based Encryption Best Practices
    Email Security.Cloud: Policy Based Encryption Best Practices
    Jimmy Lin, Sr Product Manager & Sarah Happé, Dir.Client Engagement Recorded: Oct 23 2018 51 mins
    In this webinar, we’ll explore the Policy Based Encryptions service – highlighting how it works, how to trigger a policy, and the user experience. We’ll also cover advanced features and industry best practices to equip you with the tools needed to protect your organization.
  • Technical Education Series: Further Securing the SaaS Model
    Technical Education Series: Further Securing the SaaS Model
    Hari Nanda, Sr. Systems Engineer, Symantec Recorded: Sep 20 2018 59 mins
    In this webinar you will learn how to utilize and configure Symantec’s CoudSOC service to protect access to an Office 365 SaaS environment.
  • Advanced Threat Protection: Email Best Practice Recommendations Webinar
    Advanced Threat Protection: Email Best Practice Recommendations Webinar
    Jimmy Lin Recorded: Aug 15 2018 50 mins
    The purpose of this webinar is to make sure our ATP Email customers are aware of all the services within this solution and that they are configured to our recommended best practices.

    The ATP Email solution consists of the following services:

    Click-time URL Protection
    Cynic sandboxing
    Auto remediation for Office 365
    Advanced Email Analytics
    Phishing Readiness
  • Technical Education Series: Securing Office 365 from Threats
    Technical Education Series: Securing Office 365 from Threats
    Warren Sealey Recorded: Aug 9 2018 52 mins
    Adoption of cloud services like Office 365 adds simplicity to business services. However, it has also added significant complexity to the traditional security infrastructure. This technical webinar will teach you how to utilize the Symantec Email Security.Cloud service to protect against advanced threats.
  • Symantec EndPoint Protection Mobile Product Updates - August 2018
    Symantec EndPoint Protection Mobile Product Updates - August 2018
    Maya Mandel Recorded: Aug 7 2018 33 mins
    Join us for a monthly customer dialog to learn about the latest Symantec Endpoint Protection(SEP) Mobile features and ask any product-related questions.

    You will learn about:

    Content manipulation classification
    Network and device root certificates whitelisting
    Android Enterprise Recommended devices
    Security incidents reported to the MDM
    New customization options in dashboard trend widgets
  • Technical Education Series: Preventing Data Loss in the Office 365 Model
    Technical Education Series: Preventing Data Loss in the Office 365 Model
    Daphne Zhao Recorded: Jul 26 2018 48 mins
    In today’s cloud era, organizations must adapt to new cloud based solutions quickly in order to enable their business. Unfortunately, securing data becomes an afterthought. This technical webinar will teach you how to utilize the Symantec DLP solution to secure your data.
  • How to Optimally Configure Email Security.cloud
    How to Optimally Configure Email Security.cloud
    Jimmy Lin, Product Manager, Email Security.cloud, Symantec Recorded: Jun 26 2018 43 mins
    In 2018, organizations worldwide are expected to invest up to $93 billion dollars in security solutions to protect their users and data. Yet, most companies are still vulnerable to the latest cyber-attacks and breaches, in no small part due to service misconfigurations. Attackers are looking for systems that have default settings that are immediately vulnerable.

    Join us for our upcoming webinar, and we will:

    1.Take you through the Symantec Email Security.cloud administration console

    2. Highlight the key protection features that every organization should enable to protect themselves against malware, phish and spam emails.

    Take full advantage of the industry’s most complete email security solution by properly configuring your Email Security.cloud solution.

    Register Today
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    When the Walls Come Tumbling Down – Network Security for the Cloud Generation
    Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec Recorded: Jun 20 2018 60 mins
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today

Embed in website or blog