Hi [[ session.user.profile.firstName ]]

How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe

Learn how you can uncover, prioritize, and remediate today’s most advanced persistent threats across your endpoints, networks, and email – fast! Combine local intelligence with everything Symantec sees globally, so that you can pinpoint and remediate the most critical threats to your organization – all without deploying any new agents.

Join our webcast on December 8, 2015, and you will learn how Symantec's Advanced Threat Protection solution is the first solution that can:

- Uncover a full range of threats - from persistent threats to zero-day
attacks-across your endpoints, network, and email

- Prioritize what matters most by correlating local intelligence with everything Symantec sees through its massive global telemetry

- Remediate threats quickly from a single console, all without deploying new endpoint agents

-Leverage existing agents, which means there is no need to deploy agents on top of Symantec Endpoint Protection or Symantec Email Security.cloud


Looking forward to seeing you at the upcoming webinar December 8th
Recorded Dec 8 2015 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Piero DePaoli, Sr. Director, Product Marketing, Symantec | Morgan Wright, Media Analyst, Center for Digital Government
Presentation preview: How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe
  • Channel
  • Channel profile
  • Using the NIST Cybersecurity Framework to Identify Protected Health Information Jun 1 2017 5:00 pm UTC 60 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Vishal Gupta, VP, Engineering/Product Management, Symantec
    Part 2 of 7: The NIST Cybersecurity Framework Healthcare Webinar Series

    Of the 16 critical infrastructure sectors, healthcare is the only one yet to adopt a formal cybersecurity framework. That may be about to change.

    Join Symantec on June 1 for the second webinar in our series around how healthcare organizations can adopt the NIST Cybersecurity Framework (CSF).

    In this webinar – Using the NIST CSF to Identify Protected Health Information (PHI) – we will look at the Identify function, knowing that you cannot protect what you don’t know you have.

    Healthcare organizations need to identify digital systems, what data they hold, how it is used, and what value it holds before they can make the right decisions on how to protect it under their Risk Management program.

    This webinar will look at technical and administrative controls that reflect your mission and operations and why it must be the first step in protecting your sensitive data and patient information.

    During this webinar we will:

    -Discuss how to successfully implement an asset and risk management strategy that incorporates all of your hardware, software, and data to gain complete visibility of your organization’s assets

    -Provide a practical guide for healthcare organizations to navigate through the 5 categories within the Identify function

    On-Demand Webinar Series:
    - Part 1 of 7: Demystifying NIST Cybersecurity Framework for Healthcare Series http://bit.ly/Part10209WebinarNIST
  • A Step-By-Step Approach For Endpoint Detection & Response May 18 2017 5:00 pm UTC 30 mins
    Scott Hardie, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape May 16 2017 5:00 pm UTC 60 mins
    Kevin Haley, Director of Product Management for Symantec Security Technology and Response
    2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT devices.

    This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.

    Get the facts in this highly respected research report and learn why:

    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates

    •One in 131 emails contained a malicious link or attachment – highest rate in five years

    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom

    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends and learn steps you can take to improve your security posture in 2017.
  • Symantec IT Management Suite 8.1 & Ghost Solution Suite 3.2 Launch May 16 2017 3:00 pm UTC 60 mins
    Damon Covey, Director of Solutions Product Management, Symantec
    Symantec IT Management Suite 8.1 and Ghost Solution Suite 3.2 are here!

    We will discuss and demo some of the cool new features such as streamlined processes for updating Windows 10 and Office 365, peer-to-peer content distribution, Mac profile management, and much more!

    We will also have a panel of ITMS 8.1 early adopter customers who have already upgraded to IT Management Suite to share their experiences so you can learn all the do's and don'ts of a successful upgrade.

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.1 and Ghost Solution Suite 3.2!

    Please join us for a special webcast on Tuesday, May 16 to learn how these new solutions will make your life easier.
  • The NIST Cybersecurity Framework (CSF): A Federal Use Case Recorded: Apr 27 2017 51 mins
    Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Considered the gold standard for cybersecurity, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is being utilized by the Federal Government agencies to reduce risk.

    Key Learning Objectives:

    •Overview of the NIST CSF

    •How the NIST CSF is currently being used by the Federal Government to compliment The Federal Information Security Management Act (FISMA )

    •Possible future use cases

    Join this webcast for a review on best practices for the NIST CSF being utilized by Federal, State and Local Government
  • Easy Ways to Improve Your Security Posture Recorded: Apr 20 2017 28 mins
    Kirk Gibbons, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 4 of 5: Easy Ways To Improve Your Security Posture

    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
  • The Power of the Proxy Recorded: Apr 10 2017 17 mins
    Timothy Chiu is a Senior Director of Product Marketing for Symantec
    Have you wondered why security companies use proxy technology?

    Listen to our recorded webinar on the “Power of the Proxy” and find out:

    - Why proxy architecture is the most secure technology available on the network

    - How it enables the most advanced security products available today, including Symantec’s Secure Web Gateway products.
  • Zero-Day Attacks and What To Do About It? Recorded: Mar 23 2017 32 mins
    Chris Candaffio, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management Recorded: Mar 14 2017 59 mins
    David Finn, Health IT Officer, Symantec and Bob Chaput, Chief Executive Officer, Clearwater Compliance
    Healthcare organizations continue to make headlines as the target of cyberattacks, ransomware threats and the source of large data breaches. Yet according to the latest “Healthcare IT Security and Risk Management Study” conducted by HIMSS Analytics, while investments are being made and more focus is being placed around cyber security, it is still viewed as IT problem, rather than as a business risk management issue.

    Join us for the “Operationalizing Cybersecurity in Healthcare” webinar as we reveal findings from the study and what healthcare leaders can do to address these gaps and shift their organization from a tactical and reactive mindset to a robust and sustainable risk-management program.

    During this webinar, we will also discuss:

    • How IT, Security, Business, and Clinical leaders are approaching cybersecurity readiness and the role it has as part of their risk management strategy

    • What’s driving the decisions on where cybersecurity investments are being made

    • Critical steps to achieving a comprehensive cybersecurity strategy

    Register Today
  • Risk Insight – An Actionable Approach For Your Security Posture Recorded: Mar 3 2017 23 mins
    Marcelo Oliveira, Sr. Director of Product Management, Symantec
    Determining the effectiveness of your security posture is fraught with challenges. You have products in place, but how do you make sense of all the data. And how do you balance the day-to-day operations with the need to proactively improve your security posture?

    Learn how Risk Insight can help you gain the insight you need:

    · Communicate to executive leadership a 360 degree view of your security posture compared to your industry peers

    · Investigate using granular data analysis to identify your most vulnerable endpoints, riskiest users, and more

    · Utilize automated reports from data already available in your environment

    In addition we’ll show you Risk Insight in action, with a demo that showcases the power of the analytics and the simplicity of the interface.

    Watch On-Demand Any Time
  • Unlock Public Cloud Benefits While Maintaining Security Recorded: Mar 2 2017 34 mins
    Sudha lyer, Principal Product Marketing, Symantec and Dan Frey, Senior Manager Product Marketing, Symantec
    The public cloud offers agility and cost savings for organizations seeking that competitive edge, but will your critical workloads and applications remain secure?

    The "shared responsibility" model of security means that businesses are still on the hook for securing everything running on the IaaS providers infrastructure.

    Learn how the new Symantec Cloud Workload Protection automates security for your AWS and Azure deployments, how to defend your workloads against exploits and advanced threats so you can enjoy public cloud benefits without worrrying about security.

    Join our webcast to learn how easy it can be to:

    * Automatically discover, view, and control all of your for public cloud IaaS instances
    * Intregrate security directly into your DevOps continuous delivery workflows
    * Deploy security that scales seamlessly with your dynamic public cloud workloads
    * Mitigate risk associated with public cloud adoption

    Register Today
  • Doing More With Symantec Control Compliance Suite Recorded: Feb 28 2017 39 mins
    Anand Visvanathan, Principal Product Manager, Symantec
    **Due to a Brighttalk/Amazon Technical Issue, this webinar was recorded on webex for those that couldn't make the session on 2/28 you can view on-demand**

    In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:

    • IT Compliance and security assessments for custom applications and services

    • Security assessments across devices, servers and endpoints

    • Security baselines for newer technologies like Docker

    Please join us for this special webcast to learn how:

    The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap

    View Now
  • Symantec Cloud Workload Protection Product Demo Video Recorded: Feb 24 2017 2 mins
    Symantec
    Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.

    Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.

    To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
  • Block The Risk Of Ransomware Recorded: Feb 23 2017 31 mins
    Jonathan Korba, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • Demystifying the NIST Cybersecurity Framework for Healthcare Recorded: Feb 9 2017 51 mins
    Don Kleoppel, Chief Security Officer, Cerner and Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.

    This quarterly webinar series is designed to discuss how healthcare organizations are adopting the 5 core functions of the NIST Cybersecurity Framework-Identify, Protect, Detect, Respond, and Recover- to help them defend against cybersecurity threats on an ongoing basis, prioritize security risks and incidents based on potential impacts, and mitigate the most significant problems first, all while maintaining compliant with HIPAA and other federal and state regulations.

    Join us for Part 1 of this series as Cerner’s Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.

    During this webinar, we will also cover:

    •Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture

    •Symantec’s involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations

    •Leveraging the CSF to shift from a “check the box” compliance mindset to an automated risk management approach

    Register Today
  • The inside scoop on Cloud Security Gateways featuring Andras Cser of Forrester Recorded: Feb 7 2017 57 mins
    Andras Cser, VP, Principal Analyst Serving Security & Risk Professionals, Forrester & Deena Thomchick, Sr.Director, Symantec
    Get advice on evaluating cloud security products from our guest speaker, Andras Cser, primary author of Forrester's first Wave Report on Cloud Security. He will discuss the risks associated with adopting cloud applications and services and how cloud security gateways (CSG), also known as CASBs, can help protect your organization with integrated data protection and activity monitoring.

    This webcast will include insights from the recently released report, The Forrester Wave™: Cloud Security Gateways Q4 2016, which evaluated 8 of the most significant CSG vendors against 23 different criteria.

    Register Today
  • Securing Higher Education Institutions in the Cloud Recorded: Feb 7 2017 51 mins
    Frank Torrence, Senior Systems Engineer, Symantec
    With the rise of cloud adoptions and ease of access to business and learning applications, higher education institutions are finding it increasingly difficult to maintain data integrity, authentication, and security for its students and faculty.

    Join Symantec’s Frank Torrence, to discuss industry best practices for higher education to leverage Cloud Access Security Broker (CASB) and Data Loss Prevention(DLP) capabilities to provide auditing, reporting, and security for applications data wherever it resides.

    In this webcast you will learn how to:

    - Ensure secure cloud application and data access for students, teachers and faculty
    - Secure your network from the cloud to the ”ground”
    - Maintaining data integrity and security without sacrificing access
    - Provide an environment that allows freedom and ease of use for all connected users.

    Register Today
  • Using the NIST CSF to prepare for Canada Digital Privacy Act Recorded: Jan 31 2017 58 mins
    Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    The Digital Privacy Act (DPA) from Canada is here…are you ready? The Government of Canada passed the Digital Privacy Act (DPA), which amends and updates the existing federal privacy legislation. As a business in Canada what does this mean to you and are you ready?

    Aside from the obvious ramifications of a breach such as lost data and revenue, one of the many new requirements of the DPA requires all Canadian organizations to “keep and maintain a record of every breach of security safeguards involving personal information under its control.”

    Attend this Webcast to learn how to use the National Institute of Standards and Technology (NIST) with Cybersecurity Framework (CSF) as a tool to help determine if you’re ready for this new, important legislation.

    Key Learning Objectives:

    -Basic overview of NIST Cybersecuity Framework (CSF)

    -Review what the Canadian Digital Privacy Act (DPA) requirements are to your organization

    -Understand how to utilize the CSF to prepare for the Digital Privacy Act

    Register Now
  • Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning Recorded: Jan 26 2017 32 mins
    Chris Diya, Systems Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 1 of 5: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning

    Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning.

    Join us to discover:

    •How machine learning addresses unknown threats

    •Why Symantec Endpoint Protection 14 machine learning is unique

    •Where it fits in a layered solution

    In addition to a lively discussion we’ll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • ATM Threats to the Financial Sector Recorded: Jan 24 2017 54 mins
    Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Use An Advanced Threat Protection Solution To Keep Your Organization Safe
  • Live at: Dec 8 2015 5:00 pm
  • Presented by: Piero DePaoli, Sr. Director, Product Marketing, Symantec | Morgan Wright, Media Analyst, Center for Digital Government
  • From:
Your email has been sent.
or close