Hi [[ session.user.profile.firstName ]]

Symantec Information Security EMEA

  • Date
  • Rating
  • Views
  • Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise
    Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise Michael Mauch Recorded: Aug 18 2017 28 mins
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.

    In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    ●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
    ●Symantec BC Proxy SG is the best security defense.
    ●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
  • Preparing for GDPR: Are identity management and authentication core to GDPR?
    Preparing for GDPR: Are identity management and authentication core to GDPR? Sian John, Symantec & Enza Iannopollo, Forrester Recorded: Aug 17 2017 48 mins
    You’re preparing for GDPR. You’re auditing your information. You’re reviewing your security systems. But is this enough? Join us at Part Two of this BrightTALK webinar series where Symantec experts and a guest speaker from Forrester discuss how to ensure your security strategy is primed for GDPR.

    You’ll learn the proven milestones to bring together the people, policies and processes that will make your GDPR preparations more successful – and how other businesses have done so.
    Other topics will include:

    •Identifying gaps in your strategy
    •How to prioritise remediation and investments
    •How to protect user identities and authentication so that they can’t be used to break into your personal and sensitive information.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018?
    BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case Recorded: Aug 17 2017 63 mins
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Introducing Mobile Threat Defense for the Cloud Generation
    Introducing Mobile Threat Defense for the Cloud Generation Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure Recorded: Aug 1 2017 61 mins
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Defend Your Endpoints Against Ransomware Attacks
    Defend Your Endpoints Against Ransomware Attacks Yvonne Dresser, Senior Manager Product Strategy, Symantec Recorded: Jul 24 2017 16 mins
    Small and medium-sized businesses are not immune to targeted attacks, such as ransomware and zero-day threats, and require a powerful yet simple solution to protect their endpoints against these advanced threats. Watch this short webinar to learn how Symantec Endpoint Protection Cloud (SEP Cloud) protects PC, Mac, and mobile endpoints and servers with its advanced multi-layered threat prevention solution.
  • Comparing Next Generation Firewalls to Proxy
    Comparing Next Generation Firewalls to Proxy Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 3 mins
    Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure.
  • Taking Proxy to the Cloud
    Taking Proxy to the Cloud Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 3 mins
    This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service.
  • Protecting Sensitive Data in the Cloud
    Protecting Sensitive Data in the Cloud Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 2 mins
    In this short video learn how Proxy and DLP enables information security on prem or in the cloud
  • Proxy Essentials
    Proxy Essentials Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec Recorded: Jul 21 2017 3 mins
    This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.
  • Finanziell motivierte Attacken - Auszug aus Security Threat Report ISTR 22
    Finanziell motivierte Attacken - Auszug aus Security Threat Report ISTR 22 Candid Wueest Recorded: Jul 19 2017 58 mins
    Internet Security Threat Report ISTR
    Analyst: Candid Wueest

    Sprache: DEUTSCH


    Hintergrund:
    Die Malware-Angriffe im Finanzwesen waren doppelt so häufig wie Ransomware-Attacken:
    •Die Threat-Landschaft im Finanzwesen stand 2016 ganz im Zeichen dreier Trojaner.
    •Die Finanzabteilungen der Unternehmen rücken zunehmend in den Fokus der Angreifer.

    Wenn Medien aktuell über IT-Security berichten, steht fast immer Ransomware im Mittelpunkt. Andere Threats – etwa die Malware, mit der Cyberkriminelle Einrichtungen des Finanzwesens und deren Endkunden ins Visier nehmen – erhalten dafür so gut wie keine Beachtung. Dabei ist auch diese Bedrohung höchst real und höchst gefährlich, sowohl für die Einrichtungen selbst als auch für die Verbraucher: Wie der Internet Security Threat Report 2017 belegt, sind Angriffe auf Banken und Bankkunden wesentlich häufiger als Ransomware-Attacken. Jedes Jahr werden in diesem Bereich über 1,2 Millionen Threats entdeckt – mehr als doppelt so viele wie bei der Ransomware.

    Melden Sie sich noch heute zu unserem Webcast an:
    Internet Security Threat Report ISTR
    Zur Bedrohungslage im Finanzwesen

    Alle Teilnehmer erhalten eine Executive Summary, die wesentliche Erkenntnisse und Analysen beinhaltet:
    •Gezielte Angriffe auf Banken und Bankkunden
    •Infektionsvektoren, Häufigkeit und Ausbreitung
    •Taktiken, Technologien und Abläufe
    •Angriffe auf Geldautomaten, Point-of-Sale-Systeme und Mobilgeräte


    Melden Sie sich bitte noch heute an!

Embed in website or blog