Internet Security Threat Report by Symantec in English

Greg Day, EMEA Security CTO, Symantec & Orla Cox, Sr Security Operations Manager, Security Response , Symantec
Protect your business in the new threat landscape
With the global threat landscape changing constantly,
understanding the latest security risks and cybercrime
trends is crucial to protecting your business.

The Symantec Internet Security Threat Report (ISTR)
uses data from the Symantec Global Intelligence Network
to analyse global threat activity. The latest report shows
an escalation in the volume and sophistication of this
activity in 2011.

You are invited to join a Symantec Webcast discussing
the findings of the ISTR, including the emerging trends
in mobile malware and rising number of targeted attacks.
With companies of all sizes now falling victim to malicious
attacks, no business is off the radar of cybercriminals.

Download your copy of the ISTR and register for the webcast
today to find out what you can do to secure your company.
http://bit.ly/JRHZ1X
Jun 13 2012
54 mins
Internet Security Threat Report by Symantec in English
Join us for this summit:
More from this community:

Cloud Computing

Webinars and videos

  • Live 1 and recorded (3268)
  • Upcoming (95)
  • Date
  • Rating
  • Views
  • Join us for a 30-minute live session every Friday, where we’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer. This week tune in and learn how your employees can hold multi-point HD video meetings around the world, anytime and anywhere with RingCentral Meetings.
  • 397% de ROI , c‘est ce que vous offre l’architecture Fluid Data de Dell. C’est prouvé mais comment est-ce possible ?
  • Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • Join Mark Collier, COO of the OpenStack Foundation, Troy Toman, Cloud Architect at Rackspace and Das Kamhout, IT Principal Engineer at Intel, to discuss updates on Icehouse, the latest OpenStack software release, available on Thursday, April 17. OpenStack Icehouse is the ninth release of the open source software for building public, private, and hybrid clouds. Mark will also review the next OpenStack Summit agenda taking place in Atlanta, Georgia May 12-16, 2014 at the Georgia World Conference Center.

    This webinar will cover:
    - The latest features and trends from OpenStack Icehouse
    - Updated growth metrics from the OpenStack community
    - Opportunities to learn more at the OpenStack Summit in Atlanta May 12-16, 2014
  • Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?

    In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • In today's multi-cloud world, do you find yourself thinking, "I really need an open source private cloud that is completely compatible with leading public clouds, i.e. AWS, GCE."

    This webinar explores the anatomy of an OpenStack-powered private cloud built with hybrid computing and DevOps in mind. Join Cloudscaling’s CEO Randy Bias and Scalr CEO Sebastian Stadil as they discuss the design considerations of a hybrid cloud environment that both IT and developers will love. Mark Williams, Redapt’s CTO (former VP of zCloud Infrastructure Operations) will also share real-world experience from implementing one of the first large-scale hybrid cloud infrastructures.

    Register today and gain insight into:
    - Building OpenStack-powered private clouds
    - Private and public cloud interoperability
    - Managing your hybrid cloud with an eye to the future
    - Lessons from the field; what works and what doesn't
  • Join salesforce.com customer kCura as they describe the value of having a communities platform to create frictionless service experiences with law firms, government agencies, and litigation service providers. Learn how a self-service community experience enables customers to help each other and themselves, letting service teams focus on the big issues. All of these benefits ultimately translate into a frictionless and unified experience for all their customers!

    George Orr is the VP of Client Services for kCura. He leads strategic and implementation initiatives designed to enhance the online experience of customers.
  • Everyone knows that there are risks associated with moving enterprise data to a Cloud and everyone knows the huge potential that the analytics of Big Data can bring especially when using the Cloud, but what happens when these two converge.

    The presentation will discuss some of the security and privacy challenges associated with Big Data in the Cloud and will present a number of key initiatives that the ODCA have done to support enterprises that wish to take this step.
  • Tras crear un prototipo inicial de su aplicación para una vista previa limitada ya es hora de que el equipo pase a consolidar la arquitectura haciéndola más robusta y tolerante a los fallos antes de lanzarla oficialmente al público final.

    En este capítulo se tratan conceptos de la infraestructura de AWS tales como regiones y zonas de disponibilidad; además, se explica cómo utilizar tales características para incrementar la tolerancia de la aplicación a los fallos.

    Servicios y características tratados
    •Conceptos clave sobre infraestructura (regiones y zonas de disponibilidad)
    •Equilibro de carga elástico (Elastic Load Balancing)
    •Amazon RDS

    Demostración
    •Creación de una AMI basada en una instancia en ejecución
    •Creación y configuración de un equilibrador de carga elástico
    •Zonas de disponibilidad múltiples con Amazon RDS
    •Alarmas con Amazon CloudWatch
  • Channel
  • Channel profile
Up Down
  • Symantec Internet Security Threat Report (ISTR) 2014 May 16 2014 9:00 am UTC 60 mins
    En 2013, les attaques de sécurité ont été encore plus complexes. Même si le focus reste sur les attaques ciblées (en augmentation de 91%), la cybercriminalité est malheureusement toujours d’actualité pour les entreprises, les cybercriminels ayant mené les attaques les plus préjudiciables jamais enregistrées (+ 62% de violation de données).

    Pour en savoir plus, inscrivez-vous à ce webcast. Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France du Symantec Internet Security Threat Report, rapport annuel sur les menaces et tendances de sécurité concocté par nos analystes du Symantec™ Global Intelligence Network.
  • Nuevo Symantec Internet Security Threat Report (ISTR) 2014 May 14 2014 8:00 am UTC 75 mins
    Cada año Symantec ofrece una presentación del Informe de Symantec sobre Amenazas a la Seguridad en Internet, no se lo pierda este año.

    El informe sobre amenazas a la seguridad en Internet ofrece un análisis y los aspectos generales de la actividad mundial anual de las amenazas. El informe se basa en los datos recopilados por la Global Intelligence Network, utilizados por los analistas de Symantec para identificar, analizar y ofrecer comentarios sobre las tendencias emergentes en ataques, actividad de códigos maliciosos, phishing y spam.

    Registrese ahora al Webcast para conocer de primera mano los resultados y ultimas tendencias que pueden afectar a las medidas a adoptar y a considerar en sus entornos.

    Conectese para que se lo explique el experto de symantec en directo y pueda hacer las preguntas que desee.
  • Symantec Internet Security Threat Report (ISTR) avslöjar May 13 2014 8:00 am UTC 75 mins
    2013 – året av Megahacks

    Varje år släpper Symantec en omfattande rapport om de internethot som har ägt rum under det gångna året. Årets rapport visar bl a en omfattande beteendeförändring hos nätbrottslingar, där flera månaders förberedelser tycks ligga till grund för de allt större intrången.

    “Ett megahack kan vara lika mycket värt som 50 mindre” säger Per Hellqvist, säkerhetsexpert hos Symantec. Samtidigt som attackerna fortsätter att vara lika sofistikerade som tidigare ser vi att de riktade attackerna är än mer riktade än tidigare och pågår under längre tid. Nätbrottslingarna är helt enkelt mer fokuserade och uthålliga.

    Registrera dig till vår webcast där du kan lyssna till Symantecs säkerhetsexpert Per Hellqvist.
    Ställ frågor och få råd om hur du bäst kan skydda din organisation.

    Om du inte kan delta, registrera dig ändå och så att du kan ta del av den inspelade webcasten vid ett tillfälle som passar dig.
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland May 8 2014 8:00 am UTC 75 mins
    Das Jahr 2013 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 12:00 pm UTC 75 mins
    Every year, Symantec provides a comprehensive source on Internet threats all across the globe, offering valuable insights into trends and activity from the past year. Don’t miss this annual event.

    Register now for our 2014 Symantec Internet Security Threat Report Webcast to understand the key findings and latest trends that will impact the counter measures that you should consider.

    Tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Can’t make the date? Secure your registration, watch the recording at your leisure and ensure you receive our report. Don’t miss this important annual event.
  • Symantec Internet Security Threat Report (ISTR) 2014 May 7 2014 8:00 am UTC 60 mins
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2014 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Hai l’agenda impegnata? Guarda la registrazione on demand ed assicurati di ricevere il nostro rapporto ISTR.
    Non mancare a questo importante approfondimento!
  • Cyber: The Catalyst to Transforming your Security Programme Recorded: Apr 2 2014 47 mins
    1.What will the webcast cover:

    The data security industry has reached a critical tipping point with the average organisation now taking over 200 days to detect a data breach.
    It is no longer effective or realistic to rely solely on static prevention controls to protect business critical assets. True resilience against todays overwhelming cyber threats is based in knowing exactly where to concentrate your security efforts and investments for maximum protection. But which battles should you elect to engage in, and where exactly should you focus to secure your business critical data?

    Data Security Professionals and Data Center Managers who join Symantec and Information Security (ISF) on this webcast will hear directly from leading industry security experts on how organisations should reimagine their data security in order to prepare, protect, detect and respond to cyber threats quickly and effectively.

    2.What are the benefits of attending:

    In addition to thought provoking presentations attendees will learn about the Symantec CyberV Risk Calculator which will help you to:
    • Measure your organisation’s cyber maturity
    • Help you identify areas of potential weakness
    • Prioritize your actions
    • Guide you towards the best cyber resilience solutions.

    3.Who should attend:

    Anyone concerned with data security, be they professionals, IT Managers or C-level
  • Partner with an information security leader for your email security. Recorded: Jul 17 2013 35 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries. Spam, phishing, and malware data is captured through a variety of sources. Over 8 billion email messages and more than 1.4 billion Web requests are processed each day across 15 data centers.
    This intelligence enables us to build protection technologies that can be leveraged across our products to ensure that we protect all of our customers’ people and information.
    In this webcast we will highlight some of the latest Internet attack trends and explain why you should partner with an information security leader for your email security.
  • Is cloud security right for your business? Recorded: Jul 16 2013 37 mins
    Symantec provides email and web security as a virtual appliance, a hardware appliance or a cloud service. We have expertise in all deployment platforms so, rather than driving you to purchase a specific product, we can help you determine which is best for you.
    During this 30 minute webcast we will help you to understand what questions you should be asking yourself to determine whether a move to the cloud is the right move for your business.
  • Symantec Cyber Week: La Protezione dei sistemi critici Recorded: Jun 27 2013 60 mins
    Perchè i Server? La Protezione dei sistemi critici
    La sicurezza dei server è un asset fondamentale per abilitare il business. Non solo per le informazioni che gestiscono ma anche per i servizi per i quali sono configurati. Pianificarne la sicurezza e la conformità è l’unico strumento per per ridurre il rischio in caso di attacco
    In questo webcast approfondiremo i vantaggi delle soluzione end point protection ed anche di server hardening
    Partecipa a questo webcast per pianificare al meglio la tua politica di Cyber Security.
  • Symantec Cyber Week: Le politiche di controllo Recorded: Jun 21 2013 39 mins
    Le politiche di controllo servono? Quali?
    Non pensare ad una politica di controllo, compreso il monitoraggio delle vulnerabilità, della correlazione degli eventi di sicurezza, e delle procedure di risposta in caso di attacco rende inefficaci gli investimenti fatti in sicurezza
    Se si vuole davvero ridurre il rischio di un attacco informatico, ogni organizzazzione deve monitorare lo stato della propria sicurezza con il corrispettivo rischio, deve avere una fonte di intelligence per una visibilità su cosa stia accadendo in tempo reale
    Partecipa a questo webcast per valutare quanto un’attività di intelligence sia utile realmente al tuo business.
  • Hardening de serveur ou comment diminuer rapidement vos risques Recorded: Jun 21 2013 42 mins
    De par la nature des informations que les serveurs hébergent, les services pour lesquels ils sont configurés, leurs contraintes d’accessibilité, il est temps de repenser la sécurité des serveurs et leur mise en conformité pour limiter les risques en cas d’attaque. Faites le point avec nos experts et découvrez les solutions adaptées à ces problématiques spécifiques.
  • Symantec Cyber Week: La Protezione degi End Point Recorded: Jun 20 2013 41 mins
    Gli End Point: tutto quello che devi sapere per proteggerli
    La sicurezza nel suo punto cardine: contrastare il malware e proteggere i dati
    Non è una novità che i codici malevoli siano ogni giorno sempre più complessi. Un partner come Symantec sa come pianificare una strategia di difesa. Da una soluzione fondamentale come Symantec EndPoint Protection alle funzionalià di crittografia, per una protezione del dato a tutto tondo
    Partecipa a questo webcast; scopri cosa ti da di più Symantec.
  • Symantec Cyber Week: Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH Recorded: Jun 18 2013 37 mins
    Come avvengono gli attacchi? 5 STAGES OF A DATA BREACH
    Per proteggere le aziende da attacchi informatici, è importante capire come operano gli attacanti. Questo webcast descrive l’anatomia di un attacco nelle sue 5 fasi: Reconnaissance, Incursion, Discovery, Capture ed Exfiltration
    Verranno inoltre analizzate le principali tecniche impiegate e le soluzioni per prevenirle e/o contrastarle oltre al relativo impatto sul business (rilevato dalla ricerca “Cost of a Data Breach 2013”)
    Partecipa a questo webcast per vedere come si sono evolute le cyber minacce e come stanno influenzando le realtà produttive.
  • Symantec Cyber Week: Cosa sta DAVVERO succedendo? Il Security Threat Report Recorded: Jun 17 2013 45 mins
    Cosa sta DAVVERO succedendo? Il Security Threat Report
    Il Security Threat Report fornisce una panoramica e un'analisi di attività delle minacce a livello mondiale nel 2012. Dai dati della Global Intelligence Network, esperti di Symantec analizzano le tendenze emergenti negli attacchi, nelle vulnerabilità e negli obiettivi.
    Inoltre, l’ultima ricerca “Cost of a Data Breach Report 2013” traccerà gli impatti economici per le organizzazioni nel caso di attacchi informatici
    Partecipa a questo webcast per avere un aggiornamento sul panorama delle minacce e della sicurezza nel 2013 e sulle conseguenze nel business.
  • Supervision pour une cyber vision Recorded: Jun 14 2013 40 mins
    Pour limiter les risques d’une cyber-attaque, la politique de sécurité doit comprendre la mise en place d’une politique de supervision incluant la surveillance des vulnérabilités, la corrélation des événements de sécurité, les procédures de réponse en cas d’attaque… Lors de ce webcast, nous vous invitons à faire le point sur les solutions de SOC, SSIEM, Services Managés et leurs bénéfices.
  • Insights from the Symantec Website Security Threat Report 2012 Recorded: Jun 12 2013 45 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

    These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

    Join Symantec's team of as they draw on this report to discuss:
    • Trends and patterns across the globe and the impact these have
    • Best practices to mitigate risk for online businesses
    • What actions you can take to protect your site and your customers
  • Transformational smart cities: cyber security and resilience 10:00 BST/11:00 CET Recorded: Jun 11 2013 52 mins
    Smart cities are on the increase worldwide, and especially within Europe there are many initiatives stimulated by the EC and the national governments. Local administrators and policy makers will be increasingly driven to make their cities competitive in order to attract businesses, talent and taxpayers, and to comply with sustainable policies, greenhouse gas emission targets and carbon footprint guidelines.
    Smart city deployments will involve multi-faceted developments, carried out by a diverse ecosystem of providers in innovative domains, involving state-of-the-art technology including critical and complex ICT implementations.
    Choosing reputable, experienced thought leaders as partners in conceiving such complex developments is an important step in the right direction towards building resilient smart cities for the twenty-first century.

    Attend our webcast to learn more!
  • Les 5 étapes d’une cyber-attaque Recorded: Jun 7 2013 33 mins
    Afin de protéger votre entreprise des cyber-attaques, il est important de comprendre comment les attaquants opèrent. Lors de ce webcast, nous vous proposons d’analyser les 5 phases d’une attaque (reconnaissance, incursion, découverte, capture, exfiltration), les principales techniques employées, ainsi que les solutions adaptées à chaque phase.
  • Mobile Threats (Internet Security Threat Report) Recorded: Jun 6 2013 60 mins
    Did you know that 32% of mobile malware is aimed at stealing information?
    The rapid increase in mobile working, the demand for higher levels of productivity and the growing trend of Bring Your Own Device puts you under new pressure, and exposes your critical business data to additional risk.
    Learn how solutions for enterprise mobility from Symantec can help you to enable, manage and secure mobile endpoints, apps and data.
    By attending our webinar we'll show you how the solutions for enterprise mobility protect business- critical data and apps – wherever they are accessed, whatever the smartphone, tablet or other device.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Internet Security Threat Report by Symantec in English
  • Live at: Jun 13 2012 11:00 am
  • Presented by: Greg Day, EMEA Security CTO, Symantec & Orla Cox, Sr Security Operations Manager, Security Response , Symantec
  • From:
Your email has been sent.
or close
You must be logged in to email this