Browse communities
Browse communities
Presenting a webinar?

Παρακολούθηση σε πραγματικό χρόνο στην ασφάλεια για τη διαχείριση κινδύνων - Ris

Paris Kaskas, Technology Sales Consultant
Η παρακολούθηση της ασφάλειας σε πραγματικό χρόνο είναι το κύριο συστατικό για την αποτελεσματική διαχείριση κινδύνων των εταιρειών. Η κατανόηση του τι συμβαίνει στο εσωτερικό δίκτυο και η εύκολη συσχέτιση των πληροφοριών από τον έξω κόσμο μπορεί να βοηθήσει στην πρόληψη επιθέσεων και την απόδειξη στην συμμόρφωση με πρότυπα, βέλτιστες πρακτικές και κανονιστικές ρυθμίσεις. Στην παρουσίαση αυτή θα συζητήσουμε για το πώς λειτουργούν σήμερα οι επιθέσεις και πώς μπορούν να ανιχνευθούν και να προληφθούν μέσω των υπηρεσιών της Symantec Real Time Security Monitoring και του Symantec Global Intelligence Network.
Jun 5 2012
65 mins
Παρακολούθηση σε πραγματικό χρόνο στην ασφάλεια για τη διαχείριση κινδύνων - Ris
security threat
  • Live and recorded (2029)
  • Upcoming (62)
  • Date
  • Rating
  • Views
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • If you run more then one solution when backing up and recovering your data it can be hard to keep track of which solution does what. Check out how our single solution can fill in all the gaps and make it less complicated to manage multiple solutions at one time.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • Inflexible, constrained, locked in, dependent are all terms we hear used to talk about the IT solutions being used in today’s datacenters. Datacenters are complex with a variety of physical, virtual, and cloud platforms for both computing and storage. Solutions that promise to make a datacenter more manageable, often lock you in to specific platforms or singular processes.

    Join this session with Andy Ebbs to learn about the top 10 technical capabilities needed to ensure that you are able to freely move your workloads to run on the best platform, and protect them wherever they are running.
  • The ability of public sector organizations to accomplish their missions depends on reliable connectivity. Now, more than ever, these network connections must be mobile, rugged, and secure – but most of all, they must be flexible.

    At the federal, state, and local level, as well as at institutions of higher learning, the opportunities to gain efficiency and manage budgets through mobile connectivity are increasing exponentially. Cradlepoint enables the public sector to quickly implement networking solutions that are powerful, flexible, easy to manage, and easy to scale; without busting tight budgets.

    Join us for a webinar to learn how Cradlepoint solutions make it easy for public sector organizations to adapt their networks to take advantage of 3G/4G LTE wireless to provide the strongest signal at the best price in any given location.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • IRM is leading the debate on risk culture. Drawing upon the wealth of practical experience and expert knowledge across the institute, we have developed guidance for organisations wanting a greater understanding of their own risk culture and practical tools that can be applied to drive change.

    As seen in the business press every day, embedding risk management into an organisation to the extent that it reliably makes a difference is a difficult task. To achieve this, boards must keep how to manage risks high on their agenda, and to continue asking themselves, whether they have the right culture, people and processes.

    What do we mean by risk culture?

    Risk culture is a term describing the values, beliefs, knowledge, attitudes and understanding about risk shared by a group of people with a common purpose, in particular the employees of an organisation. This applies to all organisations from private companies, public bodies, governments to not-for-profits.

    What does a good risk culture look like?

    An effective risk culture is one that enables and rewards individuals and groups for taking the right risks in an informed manner.
  • With over half of companies not feeling well enough prepared for an IT disaster according to recent research, Ian Daly of Plan B Disaster Recovery will be sharing his best practices on how to build a DR solution you can trust. In this webinar we’ll cover:

    - What counts as an IT disaster?
    - What are the common causes?
    - How can you better prepare for an IT disaster?
    - Testing – what should you be testing and how often?
    - What level of reliability should you be striving to achieve?
    - How to maintain trust in your disaster recovery solution
  • Channel
  • Channel profile
  • Big Data & Cyber Sécurité - Symantec Internet Security Threat Report 2015 May 7 2015 9:00 am UTC 45 mins
    Laurent Heslault, Directeur des Stratégies de Sécurité – Symantec Europe du Sud
    Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
    Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
    Vous en saurez plus sur :
    -Les changements observés dans les techniques d’attaques
    -La vitesse d’exécution des nouvelles attaques
    -Les cibles privilégiées et les enjeux financiers
    -Les tendances à suivre (social media, IoT…)
    Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
  • Symantec Internet Security Threat Report (ISTR) 2015 May 6 2015 1:00 pm UTC 30 mins
    Antonio Forzieri, EMEA Cyber Security and ISS Lead – Technology Sales and Services, Symantec
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland May 6 2015 12:00 pm UTC 45 mins
    Candid Wueest, Cyber Security Strategist bei Symantec in Deutschland
    Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Move security strategy forward - Internet Security Threat Report 15 is here! May 6 2015 10:00 am UTC 45 mins
    Sunil Choudrie - Product Marketing Manager
    Every year, Symantec provide a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2015 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider. Topics include:
    •Changes in targeted attack techniques
    •The speed in which attackers exploit new vulnerabilities
    •How end-users are being held hostage across multiple devices
    •Simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
  • Security running your day-to-day? Internet Security Threat Report 15 is here! May 6 2015 9:00 am UTC 45 mins
    Sunil Choudrie - Product Marketing Manager
    Every year, Symantec provide a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2015 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider. Topics include:
    •Changes in targeted attack techniques
    •The speed in which attackers exploit new vulnerabilities
    •How end-users are being held hostage across multiple devices
    •Simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation.
  • Securing Legacy systems in the Public Sector Recorded: Mar 19 2015 32 mins
    Mark Fox Senior Principal Consultant, Data Centre Security and Compliance
    Government departments are facing several problems in relation to Legacy Operating Systems and Applications. Windows Server support is due to end on the 14th of July 2015, and stricter controls regarding access to the PSN network & resources are coming into force this year.

    You have options but you need to be sure that you can continue to access to business critical applications and at the same time be secure without incurring significant costs from custom support agreements. Symantec has an answer that extends the life of your Windows 2003 systems that is cost effective and increases your security.

    Attend this webinar if you want to learn how you can:

    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business operational costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • EU General Data Protection Regulation is coming: Time for ‘Privacy by Design' Recorded: Mar 18 2015 46 mins
    Mike Smart - Symantec Security Strategist
    The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused.
    Attend Mike Smart’s panel session to hear from Sian John, Symantec’s Chief Strategist and Tamzin Matthew, Symantec’s Director of Legal introduce this new legislation.
    This webinar will cover 3 topics of discussion; Scope of the new regulation, roles and responsibilities of those involved in data privacy and how implementing ‘Privacy by Design’ will minimize the impact of the GDPR.
  • How Does Big Data Threat Analytics Heighten Cyber Security? Recorded: Feb 17 2015 47 mins
    Sunil Choudrie, Symantec Security Specialist
    Advanced cyber-attacks are just too difficult to deal with! Often hard to detect, challenging to respond to and even then you are not sure it will be any better next time. Big data threat analytics is a growing theme in the security industry that helps organisations move from simple reaction to being able to detect and defend themselves more effectively. With 25 years of malware research and big data threat analytics experience, Symantec explains the benefits of big data threat analytics.
  • Reduce the cost and securely extend the life of your Windows 2003 Estate. Recorded: Feb 5 2015 61 mins
    James Hanlon CISM, CISSP Cyber Security Strategy & GTM Lead, EMEA - Mark Fox, Sr Principle Technical Specialist
    Time is short. With Windows Server support due to end on the 14th of July 2015, now is the time to consider your strategy to address this issue. You have options but you need to be sure your business critical applications are available & secure whilst not incurring significant costs from custom support agreements. Symantec has an answer which will extend the life of your Windows 2003 systems and that is cost effective and increases your security.

    Attend this webinar if you want:
    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • Advanced Threats & Malware Attacks Rising: Ready for the impact of a breach? Recorded: Feb 3 2015 47 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    2013 was the year of the Mega Breach…and unfortunately the trend continues. Attacks on global corporations were highly visible in 2014 – a direct result of the huge increase in complex breaches. It’s no longer enough to simply work on keeping the bad guys out. You need a response and remediation plan for when (not if) a breach occurs.

    In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pitt discussing ‘how to protect against cyber-attack from the inside’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Dynamic Data Protection: set your data free with confidence Recorded: Feb 3 2015 46 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    Information is everywhere: with an increasingly mobile workforce and snowballing adoption of cloud services, IT leaders are struggling to protect information in this distributed environment. In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pit discussing why ‘work is what you do not where you are’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Why PCI/DSS needs to be part of a bigger security strategy Recorded: Jan 20 2015 59 mins
    Tom Davison (Security Specialist) C.Baker (Senior Manager Gov Affairs), J.Fletcher (Head of IT Risk Swinton Group Ltd)
    Cybercrime is booming.

    Every day we hear new headlines about breaches that have resulted in the significant loss of credit card information or customer data. Many of these companies are PCI/DSS compliant. So what went wrong? More importantly, what can you do to make sure your business isn’t attacked next?
    In this webinar we talk about the advantages of using PCI/DSS as a base from which to build a wider, stronger cyber security strategy. By making strategic security investments, you can mitigate risk while maximizing business opportunities. Ticking the boxes to avoid a fine isn’t enough to keep cyber criminals at bay.

    Our experts will cover:
    •Overview of PCI/DSS and characteristics of successful projects
    •The new European General Data Protection Regulation and likely regulatory/financial impact
    • Case Study
  • Step up to your Digital Security Responsibilities Recorded: Jan 15 2015 61 mins
    Tom Davison Symantec and David Gillick HP
    Malware has grown to be a major concern across the Enterprise. The emergence of ransomware, such as Cryptlocker, shows the increasing sophistication of modern malware attacks and the threat these cause to your business. Ransomware disables the functionality of a computer in some way. The malware, in effect, holds the computer ransom and requests payment from the user to restore function. According to our research, as many as 2.9 percent of compromised users admitted to paying out, however the real number is likely to be much higher.

    Take an Intelligent Approach to Security

    Intelligent Security from HP ESS and Symantec not only identifies how to proactively approach your cyber security, but also how making the right risk management decisions can enable your business to operate most securely and efficiently.
  • Vers une approche cyber sécurité intégrée Recorded: Jan 9 2015 39 mins
    Evelyne Lescuyer, Consultante Information Security, Symantec
    La complexité et les enjeux liés à la cyber sécurité requièrent une plateforme de sécurité cohérente et unifiée, prenant en compte autant la connaissance des risques internes qu'externes. Lors de ce webcast vous découvrirez comment Symantec peut vous aider à mettre en place une approche sécurité complète et holistique, combinant les meilleures pratiques, l'expérience et l'intelligence, au travers d'une plateforme de services sécurité, et ainsi rendre votre entreprise cyber préparée.
  • Un monde sans mot de passe ? Recorded: Jan 9 2015 35 mins
    Cédric Pottier, Consultant Information Security - CISSP, Symantec
    Durant les 20 dernières années, les experts sécurité ont toujours clamé que les mots de passe étaient le talon d'Achille de leur stratégie. Les entreprises ont dû composer avec l'augmentation des risques, les freins à la productivité des utilisateurs et les investissements dans des solutions de gestion des mots de passe. Découvrez lors de ce webcast la nouvelle solution VIP, la première solution d'authentification pour limiter les mots de passe en entreprise. Vous en saurez plus sur cette nouvelle méthode d'authentification à vos applications mobiles, SaaS et web. Et vous découvrirez comment Symantec Identity and Authentication Platform s'intègre avec des offres tiers pour servir de socle commun d'IAM, d'authentification forte, de provisionning et de protection de l'information.
  • L’actu cyber du mois, so what ? Recorded: Jan 9 2015 31 mins
    Laurent Heslault - Directeur cyber stratégiesPaul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques, nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.
    •Votre rendez-vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • L’actu cyber du mois, so what ? Recorded: Dec 12 2014 31 mins
    Laurent Heslault - Directeur cyber stratégies, Paul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques , nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.

    •Votre rendez vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
  • How to achieve a proactive approach to security Recorded: Dec 9 2014 53 mins
    James Hanlon Symantec and Marco Pereira HP
    Achieving a proactive approach to security: All organisations are looking to lower their risk when it comes to Cyber threats, but increasingly need to have faster incident response and containment. The question becomes one of how can you embrace technological change while minimising IT risks? Are you looking to meet compliance regulations and audit requirements, but also improve efficiency and productivity of your IT staff? Join us to understand how talking a different approach and shifting your investment may enable to you respond faster but importantly give you better awareness.
  • The future of Endpoints & Identities: Increases in Threats, Cloud & Mobility Recorded: Dec 3 2014 46 mins
    Mike Smart at Symantec and Charles Kolodgy (IDC), Research Vice President for Security Products Service
    Join Mike Smart at Symantec and Charles Kolodgy, Research Vice President for IDC's Security Products Service on this interview-style webinar to hear about how the industry needs to evolve endpoints and identities to embrace evolution and flexible working as well as defend off increasingly complex attacks. In this session there is a twist! – you, the audience will have control over the topics we’ll choose to discuss! To conclude this session, we’ll be hearing from Charles on his view of what the future holds!
  • Die Spionage-Software Regin | Einladung zum deutschen Webcast Recorded: Dec 3 2014 62 mins
    Candid Wüest (Principal Threat Researcher) Carsten Hoffmann (Director Technical Sales and Services)
    Am 23. November 2014 hat Symantec als erstes Unternehmen Informationen über Regin, ein hoch entwickeltes Tool für die Cyber-Spionage, veröffentlicht. In den Medien wurde ausführlich darüber berichtet und wir möchten Ihnen einige wichtige Informationen über diese Bedrohung sowie dazu, wie wir Sie davor schützen, geben.

    In unserem deutschspraching Webcast am 3.12.14 möchten wir näher erläutern, was Regin ist und warum diese Bedrohung ernst ist: Regin ist deshalb als Malware so bemerkenswert, da sie äußerst komplex ist und sich in ihrer Funktionalität für die verschiedensten Zwecke anpassen lässt. Regin basiert auf einem Framework, das sich bestens für die langfristige Informationsbeschaffung eignet, indem es die Malware vor einer Enttarnung schützt. Regin unternimmt erhebliche Anstrengungen, um sich und seine Aktivitäten auf infizierten Computern zu verbergen. Für seine Tarnung werden zahlreiche der raffiniertesten Techniken eingesetzt, die wir bisher beobachten konnten.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Παρακολούθηση σε πραγματικό χρόνο στην ασφάλεια για τη διαχείριση κινδύνων - Ris
  • Live at: Jun 5 2012 8:00 am
  • Presented by: Paris Kaskas, Technology Sales Consultant
  • From:
Your email has been sent.
or close
You must be logged in to email this