Securing your virtual infrastructure

Manage webcast
Paul Murgatroyd, Principal Product Manager
Virtualization of IT infrastructure is enabling companies, both large and small, to consolidate their data centres and increase the agility of their IT organisations. However, managing this extension of the traditional physical infrastructure presents a number of new security challenges. For example:
- How do you extend protection to your new virtual platform while also meeting density goals?
- How do you know if rogue, non-compliant or vulnerable virtual machines are being introduced?
- How can you effectively and efficiently both monitor and assess these machines on a programmatic or real time basis?
- How do you continue to do what you are successfully doing while extending security and compliance to this new virtual environment?
Join us in this webcast as we discuss these challenges.
Dec 15 2011
56 mins
Securing your virtual infrastructure
More from this community:

IT Security

  • Live and recorded (5852)
  • Upcoming (126)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Symantec protege tus sistemas Windows Server 2003 ante el EOSL Recorded: Jun 30 2015 29 mins
    Jose Carlos Cerezo – Especialista en Seguridad Data Center
    Sesión sobre la protección de sus sistemas Windows Server 2003 después de la finalización del soporte.
    •¿Sabía que el 14 de julio finalizará el soporte del producto Windows Server 2003?
    oDespués de esta fecha , Microsoft dejará de emitir parches de seguridad , dejando a estos sistemas en un estado de vulnerabilidad alto frente a los ataques de día cero y otras formas de código malicioso.
    •Conozca a que riesgos se expone si no hace frente a esta situación y como Symantec le ayuda a proteger sus sistemas ante la finalización del soporte para estos sistemas.
  • If Hacking is the Poison, What's the Antidote? Recorded: Jun 9 2015 42 mins
    James Hanlon CISM, CISSP, Cyber Security Strategy & GTM Lead, EMEA
    James Hanlon, Security Strategist at Symantec, looks at both the current cyber poisons and potential antidotes to the cyber security challenge. The discussion will focus current threat landscape and the changes we are seeing in regard to hacking and cyber attacks. It will pose the questions to whether global intelligence & data analytics is an approach that can be used counter the most advanced threats.
  • Symantec protege tus sistemas Windows Server 2003 ante el EOSL Recorded: Jun 1 2015 10 mins
    Jose Carlos Cerezo – Especialista en Seguridad Data Center
    •¿Sabía que el 14 de julio finalizará el soporte del producto Windows Server 2003?
    oDespués de esta fecha , Microsoft dejará de emitir parches de seguridad , dejando a estos sistemas en un estado de vulnerabilidad alto frente a los ataques de día cero y otras formas de código malicioso.

    •Conozca a que riesgos se expone si no hace frente a esta situación y como Symantec le ayuda a proteger sus sistemas ante la finalización del soporte para estos sistemas.
  • Threat Protection: how does the growing threat landscape affect you? Recorded: May 26 2015 41 mins
    Sunil Choudrie - Product Marketing Manager
    If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
    Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
    On this webcast we will cover;
    •The main security challenges and trends in 2014
    •Highlight how threats operate to allow you to better informed
    •Key takeaways for executive / functional leaders
  • Big Data & Cyber Sécurité - Symantec Internet Security Threat Report 2015 Recorded: May 7 2015 45 mins
    Laurent Heslault, Directeur des Stratégies de Sécurité – Symantec Europe du Sud
    Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
    Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
    Vous en saurez plus sur :
    -Les changements observés dans les techniques d’attaques
    -La vitesse d’exécution des nouvelles attaques
    -Les cibles privilégiées et les enjeux financiers
    -Les tendances à suivre (social media, IoT…)
    Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
  • Die wichtigen Trends bei Cyberkriminalität in Deutschland Recorded: May 6 2015 49 mins
    Candid Wueest, Cyber Security Strategist bei Symantec in Deutschland
    Das Jahr 2014 ist aus Sicht der IT Sicherheit Jahr geprägt von einer Reihe größerer Datenverluste, bei denen Millionen von Datensätzen verloren gingen. Was auffällig war: Cyberkriminelle scheinen abzuwarten, bis sich ein lohnendes Ziel ergibt.

    Erfahren Sie in diesem Live-Webcast von Lars Kroll, seines Zeichens Cyber Security Strategist bei Symantec, wie Cyberkriminelle ihre Einbruchstaktiken abgewandelt haben. Besprechen Sie mit ihm, was man aus diesem veränderten Strategien lernen kann, um das eigene Netzwerk und die wichtigen Daten besser zu schützen. Sollten Sie zu diesem Zeitpunkt beschäftigt sein, können Sie sich trotzdem registrieren und bekommen automatisch einen Link zur Aufzeichnung zugeschickt.

    Registrieren Sie sich noch heute und erfahren Sie die wichtigsten Enwicklungen im Bereich Cyber Sicherheit.
  • Is your security strategy on track? Internet Security Threat Report v20 is here! Recorded: May 6 2015 49 mins
    Sunil Choudrie - Product Marketing Manager
    A good strategy relies on you knowing where you want to go. Unless you understand the latest security trends and challenges then your program could be off track. Every year, Symantec distils the expertise from our team of experts into the Internet Security Threat Report. We have recently published our 20th edition and invite you to join this webcast to gain insights to drive your security program.

    Our Internet Security Threat Report Webcast summarises he key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in ensuring security contributes to business strategy - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for staff involved in day to day security.
  • Step out of the day-to-day, let Internet Security Threat Report 20 guide the way Recorded: May 6 2015 49 mins
    Sunil Choudrie - Product Marketing Manager
    If you’re busy protecting your organisation from IT threats, then it’s natural to focus on the here and now. However, the world of security is changing fast. Symantec’s annual report provides analysis from our team of experts. The report describes the security trends we observed in 2014 to help you be better prepared going forward.

    Our Internet Security Threat Report Webcast distils the key findings from these trends to help you focus your defences and counter measures. The agenda includes:
    • How attacker techniques are evolving
    • Why vulnerabilities are still being exploited
    • The dramatic rise in ransom ware
    • Our simple steps that can yield big improvements across your security

    If you are interested in the role security has to play in the day-to-day - tune in live to hear directly from Symantec’s security experts and take the opportunity to ask questions about how our findings might impact your organisation. Note, we will also be running a similar webcast aimed for executive leaders.
  • Symantec Internet Security Threat Report (ISTR) 2015 Recorded: May 6 2015 49 mins
    Antonio Forzieri, EMEA Cyber Security and ISS Lead – Technology Sales and Services, Symantec
    Ogni anno, Symantec fornisce una fotografia completa sulle minacce presenti in rete in tutto il mondo, offre preziose informazioni sulle tendenze e le attività in corso e sulle loro evoluzioni. Non perdetevi questo evento annuale.

    Registrati adesso per il nostro webcast 2015 sul Symantec Internet Security Threat Report per conoscere i principali risultati e le ultime tendenze oltre alle contromisure che si dovrebbero attuare.

    Potrai scoltare direttamente dagli esperti di sicurezza Symantec e cogliere l'occasione per porre domande su quali impatti potrebbero esserci sulla tua stessa organizzazione. Non mancare a questo importante approfondimento!
  • Securing Legacy systems in the Public Sector Recorded: Mar 19 2015 32 mins
    Mark Fox Senior Principal Consultant, Data Centre Security and Compliance
    Government departments are facing several problems in relation to Legacy Operating Systems and Applications. Windows Server support is due to end on the 14th of July 2015, and stricter controls regarding access to the PSN network & resources are coming into force this year.

    You have options but you need to be sure that you can continue to access to business critical applications and at the same time be secure without incurring significant costs from custom support agreements. Symantec has an answer that extends the life of your Windows 2003 systems that is cost effective and increases your security.

    Attend this webinar if you want to learn how you can:

    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business operational costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • EU General Data Protection Regulation is coming: Time for ‘Privacy by Design' Recorded: Mar 18 2015 46 mins
    Mike Smart - Symantec Security Strategist
    The European Union’s proposed General Data Protection Regulation (GDPR) has left even the most informed confused.
    Attend Mike Smart’s panel session to hear from Sian John, Symantec’s Chief Strategist and Tamzin Matthew, Symantec’s Director of Legal introduce this new legislation.
    This webinar will cover 3 topics of discussion; Scope of the new regulation, roles and responsibilities of those involved in data privacy and how implementing ‘Privacy by Design’ will minimize the impact of the GDPR.
  • How Does Big Data Threat Analytics Heighten Cyber Security? Recorded: Feb 17 2015 47 mins
    Sunil Choudrie, Symantec Security Specialist
    Advanced cyber-attacks are just too difficult to deal with! Often hard to detect, challenging to respond to and even then you are not sure it will be any better next time. Big data threat analytics is a growing theme in the security industry that helps organisations move from simple reaction to being able to detect and defend themselves more effectively. With 25 years of malware research and big data threat analytics experience, Symantec explains the benefits of big data threat analytics.
  • Reduce the cost and securely extend the life of your Windows 2003 Estate. Recorded: Feb 5 2015 61 mins
    James Hanlon CISM, CISSP Cyber Security Strategy & GTM Lead, EMEA - Mark Fox, Sr Principle Technical Specialist
    Time is short. With Windows Server support due to end on the 14th of July 2015, now is the time to consider your strategy to address this issue. You have options but you need to be sure your business critical applications are available & secure whilst not incurring significant costs from custom support agreements. Symantec has an answer which will extend the life of your Windows 2003 systems and that is cost effective and increases your security.

    Attend this webinar if you want:
    •Safely extend the lifetime of Windows Server 2003 systems in your environment
    •Reduce business costs
    •Significantly improve your security
    •Reduce risk to business critical applications
  • Advanced Threats & Malware Attacks Rising: Ready for the impact of a breach? Recorded: Feb 3 2015 47 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    2013 was the year of the Mega Breach…and unfortunately the trend continues. Attacks on global corporations were highly visible in 2014 – a direct result of the huge increase in complex breaches. It’s no longer enough to simply work on keeping the bad guys out. You need a response and remediation plan for when (not if) a breach occurs.

    In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pitt discussing ‘how to protect against cyber-attack from the inside’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Dynamic Data Protection: set your data free with confidence Recorded: Feb 3 2015 46 mins
    Mike Smart, Sian John and Laurence Pitt (Security Specialists)
    Information is everywhere: with an increasingly mobile workforce and snowballing adoption of cloud services, IT leaders are struggling to protect information in this distributed environment. In this webinar Mike Smart From Symantec will be hosting a panel with Sian John and Laurence Pit discussing why ‘work is what you do not where you are’. You will also hear Symantec discuss how IT Security leaders can balance business innovation and protection in the modern IT world.
  • Why PCI/DSS needs to be part of a bigger security strategy Recorded: Jan 20 2015 59 mins
    Tom Davison (Security Specialist) C.Baker (Senior Manager Gov Affairs), J.Fletcher (Head of IT Risk Swinton Group Ltd)
    Cybercrime is booming.

    Every day we hear new headlines about breaches that have resulted in the significant loss of credit card information or customer data. Many of these companies are PCI/DSS compliant. So what went wrong? More importantly, what can you do to make sure your business isn’t attacked next?
    In this webinar we talk about the advantages of using PCI/DSS as a base from which to build a wider, stronger cyber security strategy. By making strategic security investments, you can mitigate risk while maximizing business opportunities. Ticking the boxes to avoid a fine isn’t enough to keep cyber criminals at bay.

    Our experts will cover:
    •Overview of PCI/DSS and characteristics of successful projects
    •The new European General Data Protection Regulation and likely regulatory/financial impact
    • Case Study
  • Step up to your Digital Security Responsibilities Recorded: Jan 15 2015 61 mins
    Tom Davison Symantec and David Gillick HP
    Malware has grown to be a major concern across the Enterprise. The emergence of ransomware, such as Cryptlocker, shows the increasing sophistication of modern malware attacks and the threat these cause to your business. Ransomware disables the functionality of a computer in some way. The malware, in effect, holds the computer ransom and requests payment from the user to restore function. According to our research, as many as 2.9 percent of compromised users admitted to paying out, however the real number is likely to be much higher.

    Take an Intelligent Approach to Security

    Intelligent Security from HP ESS and Symantec not only identifies how to proactively approach your cyber security, but also how making the right risk management decisions can enable your business to operate most securely and efficiently.
  • Vers une approche cyber sécurité intégrée Recorded: Jan 9 2015 39 mins
    Evelyne Lescuyer, Consultante Information Security, Symantec
    La complexité et les enjeux liés à la cyber sécurité requièrent une plateforme de sécurité cohérente et unifiée, prenant en compte autant la connaissance des risques internes qu'externes. Lors de ce webcast vous découvrirez comment Symantec peut vous aider à mettre en place une approche sécurité complète et holistique, combinant les meilleures pratiques, l'expérience et l'intelligence, au travers d'une plateforme de services sécurité, et ainsi rendre votre entreprise cyber préparée.
  • Un monde sans mot de passe ? Recorded: Jan 9 2015 35 mins
    Cédric Pottier, Consultant Information Security - CISSP, Symantec
    Durant les 20 dernières années, les experts sécurité ont toujours clamé que les mots de passe étaient le talon d'Achille de leur stratégie. Les entreprises ont dû composer avec l'augmentation des risques, les freins à la productivité des utilisateurs et les investissements dans des solutions de gestion des mots de passe. Découvrez lors de ce webcast la nouvelle solution VIP, la première solution d'authentification pour limiter les mots de passe en entreprise. Vous en saurez plus sur cette nouvelle méthode d'authentification à vos applications mobiles, SaaS et web. Et vous découvrirez comment Symantec Identity and Authentication Platform s'intègre avec des offres tiers pour servir de socle commun d'IAM, d'authentification forte, de provisionning et de protection de l'information.
  • L’actu cyber du mois, so what ? Recorded: Jan 9 2015 31 mins
    Laurent Heslault - Directeur cyber stratégiesPaul Dominjon - Responsable stratégie décideurs
    •C’est arrivé durant les 30 derniers jours, nouvelles attaques, nouvelles vulnérabilités, rapport d’experts, point de vue des analystes, les éléments les plus marquants du mois seront commentés et interprétés en terme d’impact et d’analyse de risques, pour les décideurs et professionnels de la cyber sécurité.
    •Votre rendez-vous de 20 minutes pour comprendre l’essentiel, vous aider à y voir plus clair et répondre à vos questions du moment.
Webcasts targeted to software security professionals
Symantec Corporation Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Our presenters usually are combined with a customer, analyst or partner. We plan to run 2 webcasts a month and they are targeted to the software security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing your virtual infrastructure
  • Live at: Dec 15 2011 11:00 am
  • Presented by: Paul Murgatroyd, Principal Product Manager
  • From:
Your email has been sent.
or close
You must be logged in to email this