Hi [[ session.user.profile.firstName ]]

Symantec Information Security EMEA

  • Date
  • Rating
  • Views
  • Easy Ways To Improve Your Security Posture
    Easy Ways To Improve Your Security Posture Kirk Gibbons System Engineer, Symantec and Q&A with Gavin Fulton & Sunil Choudrie Recorded: Apr 27 2017 36 mins
    Imagine if you could respond to vulnerabilities, in real-time, and prevent the spread of infection through your network. It’s possible—if your network and endpoints are fully integrated.

    •Do you know what makes it possible for Symantec to instantly deploy protection and detection improvements at the endpoints?
    •Ever learn how new REST APIs effectively orchestrate automated, rapid response at the endpoint?
    •Are you aware of what new advancements are on the horizon to prevent new, unknown threats?

    Learn how Symantec Endpoint Protection 14 and Secure Web Gateway work together to detect, protect and provide rapid response to known and, most importantly, unknown threats.
  • Growth opportunities with Integrated Symantec Solutions
    Growth opportunities with Integrated Symantec Solutions Ramsés Gallego, Strategist & Evangelist, Office of the CTO, Symantec Recorded: Apr 20 2017 61 mins
    Learn how to drive new sales opportunities by adding complimentary Symantec solutions into your customer conversations. This session will overview the Symantec portfolio and identify the latest integrated value propositions your customers will want to understand.
  • Zero-Day Attacks and What To Do About It
    Zero-Day Attacks and What To Do About It Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton Recorded: Apr 20 2017 35 mins
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • Block The Risk Of Ransomware
    Block The Risk Of Ransomware Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic Recorded: Mar 30 2017 34 mins
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • Effective Patch Strategies for Windows 10 and Office 365
    Effective Patch Strategies for Windows 10 and Office 365 Damon Covey, Director of Solutions Product Management, Symantec Recorded: Mar 9 2017 44 mins
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Comment protéger et surveiller vos données sensibles en tous lieux
    Comment protéger et surveiller vos données sensibles en tous lieux Hervé Doreau, Directeur Technique - Symantec France Recorded: Feb 24 2017 44 mins
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • Cyberangriffe verhindern - sensible Daten schützen
    Cyberangriffe verhindern - sensible Daten schützen Thomas Hemker, Matthias Senft Recorded: Feb 23 2017 59 mins
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere
    How to Gate, Watch and Guard your Sensitive Data Everywhere Sunil Choudrie Recorded: Feb 23 2017 55 mins
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Protection next-gen des terminaux et machine learning
    Protection next-gen des terminaux et machine learning Herve Doreau, Directeur Technique - Symantec France Recorded: Feb 22 2017 42 mins
    Sur le marché de la sécurité des terminaux et des antivirus, pas moins de 37 nouveaux produits ont fait leur apparition au cours des 5 dernières années et chacun affirmait répondre à l’évolution des menaces. Mais peut-on vraiment s’y fier ?
    Découvrez la nouvelle technologie de machine learning, comment cela fonctionne et ce à quoi vous devez l’associer pour vous protéger sur chaque point d’attaque.

    Principaux thèmes abordés :

    • Quel est l’état de l'art des technologies de protection des terminaux

    • Pourquoi le machine learning ne suffit pas

    • Comment réduire le nombre d’agents sur les terminaux

Embed in website or blog