Data Protection 101: Follow and protect your critical data, wherever it lives
When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?
Organizations today face the following challenges:
•Identifying the type of data that needs to be protected
•Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
•Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015
Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.
Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
RecordedSep 7 201657 mins
Your place is confirmed, we'll send you email reminders
Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.
However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.
Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.
Join us to learn how you can:
- Discover and assess the risk of applications on your endpoints automatically.
- Shield known good applications to prevent vulnerability exploits.
- Isolate suspicious and malicious applications to stop privileged operations automatically.
In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.
Kevin Haley, Director of Security Response, Symantec
From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.
Join Symantec's leading threat expert, Kevin Haley as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:
- The Coin Mining Gold Rush
- Shifting Trends in Ransomware
- Targeted Attacks by the Numbers
- Infecting the Software Supply Chain
- The Surge in Mobile Threats
Join us for this webinar on March 22, where we will discuss the Symantec approach to software asset management. During this webinar, we will review and demonstrate some of the new capabilities available in Symantec IT Management Suite including the recently updated end user self-service software portal.
The software portal enables on-demand software delivery and includes these new features:
Intelligent delivery of applications based on user role and operating system
Don't miss this great opportunity to learn the latest and greatest information on Symantec IT Management Suite.
Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
Does your organization have a process in place for breach detection under the General Data Protection Regulation (GDPR)? Are you aware of what types of breaches must be reported within the 72hr notification period and the impact to the EU Data Subject?
With the enhanced data security and breach notification standards defined in the GDPR, many organizations are looking to build out an effective incident response strategy to meet the notification requirements.
Join us to learn about the GDPR breach notification procedures and uncover ways to help reduce the impact of a breach while improving your existing security process.
- What are the requirements for reporting a breach under the GDPR?
- How to leverage technology to identify a breach in real time.
- Preemptive steps you can to take now to ensure a breach does not trigger the notification requirement later.
Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
In today's world, information needs to move quickly and freely wherever it is needed. Yet, with the impending General Data Protection Regulation (GDPR), many organizations struggle to understand if data sharing is allowed and what data protections are required to avoid non-compliance.
Join us for an On-Demand webinar focusing on the transfer of personal data across borders. During this session we will cover best practices for protecting your information against physical and virtual threats in order to maintain data integrity and confidentiality.
- Understand what impact the GDPR has on Cross-Border Data Transfers
- Understand the requirements for protecting EU personal data under your control
- Learn how Symantec Solutions can assist you in protecting your personal data
Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.
This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.
Join us to learn how Symantec Email Security can:
- Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.
- Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.
- Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.
- Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.
In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
Sunil Choudrie: Information Protection Strategist, Deena Thomchick: Sr. Dir. Product Mgmt, Steven Grossman: VP Bay Dynamics
Leveraging state of the art technology to help you find personal data, spot risky users, and respond to incidents
The General Data Protection Regulation (GDPR) sets a new standard in data protection that will impact not just EU, but global organizations. With the GDPR start date quickly approaching, organizations face plural priorities; how to stay on top of their existing security program, while building – and implementing - a compliance strategy by May 2018.
The keys to success? First, ensuring you understand the data protection risks you face. Second, using state of the art technology to both reduce risk and free up your security team.
Join us on March 15th to learn how to leverage state of the art technology to build an efficient data protection risk management strategy.
During this session, you will learn:
-Why good risk management and data-centric protection go hand in hand
-How leading technology helps you discover, monitor and protect personal data, wherever it is
-Using data analytics to detect, quantify, and prioritize insider threats and outsider risks
-How to free up your security team by removing unnecessary alerts and distractions
Scott Hardie, Prinicipal Solutions Engineer, ATP, Symantec & David Berman, Sr. Mgr, Product Marketing, ATP, Symantec
Attackers are increasingly using stealthy attacks that exploit common tools and techniques that reside in memory and never touch the disk.
This webinar covers the fileless methods targeted attack groups and cybercriminals use and how the capabilities of Symantec Endpoint Detection and Response expose fileless threats that ‘hide in plain sight’ and quickly remediate their impacts – before the worst effects of a breach occur.
Join us to learn how you can:
- Detect Fileless attacks with machine learning, behavioral analysis and precise heuristics
- Gain visibility into suspicious PowerShell activity and shutdown malicious scripts
- Leverage built-in Malware Analysis file detonation and conviction
- Streamline deployment of Endpoint Protection and EDR while lowering total cost of ownership
In addition, we’ll show you Symantec’s EDR solution, ATP: Endpoint, in action, with a demo that showcases powerful investigative tools and one-click remediation of impacted endpoints.
Timothy Chiu - Senior Director of Product Marketing, Symantec
While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
different network, end-point and gateway technologies.
Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.
The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
(the other being e-mail).
With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.
Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.
Don’t leave it to chance – register now.
Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.
Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
Martin Johnson, Sr. Director of Outbound Product Management, Cloud from Symantec
It’s not an illusion. The increase in cloud app adoption has increased the exposure to your most sensitive data. Our Shadow Data Report covers the key trends and challenges to consider so you can deal with the risks head-on and still maintain the benefits of moving to the cloud.
Register for this webcast for insights on the top 5 threats from the report to consider as well as:
•The hidden signs of looming data breaches and where to look for them
•What kind of risky employee activity could expose your most sensitive data
•Whether file sharing, email and social or a combination change your exploitation risks
Kevin Hohenbrink, Principle Product Manager and Mike Chen, Director, Product Marketing
Today’s network users demand speed, flexibility and a safe operating environment. Symantec is an industry leader with the right technologies to help you achieve these goals.
This webcast will look at how Symantec PacketShaper improves your security posture and unlocks new capabilities by providing 360-degree network traffic visibility. With complementary products like MACH5, you can realize even bigger gains by optimizing video and rich media content, and other contents on your WAN & Internet links.
Join us to discover how you can:
•Boost user experience to improve cloud and security adoption
•Identify risky apps, encrypted traffic, and security gaps with PacketShaper’s visibility and reporting
•Learn the unique capabilities and benefits of Symantec’s Performance Optimization products
Ken Durbin, Sr. Strategist Gov't Affairs & Cybersecurity, Symantec & Bill Wright, Director of Government Affairs, Symantec
Modernizing Federal IT Systems has been discussed for years with little systemic progress, but 2017 changed that when several major initiatives that could lead to significant progress in modernizing efforts were produced.
In 2017, an Executive Order on Cybersecurity was signed, which led to the creation of the American Technology Council that ultimately produced a comprehensive report on Federal IT Modernization.
At the same time, Congress passed the Modernizing Government Technology (MGT) Act in order to help fund the modernization efforts.
Join Symantec for this informative webinar to understand:
-- The key take-a-ways of the IT Modernization Report
-- What it could mean to me
-- Timelines for Implementation
-- The role of the MGT Act
Brian Duckering, Sr. Mobile Security Specialist, Symantec
Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.
Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?
In this webcast, you will:
- Learn about the various and advanced methods hackers use to attack and compromise mobile devices.
- Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.
- Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.
Zoltán Précsényi, Director GDPR Strategy, EMEA Legal, Symantec
Creating a culture of privacy at work starts with teaching your organization what privacy means. Customers and stakeholders want to understand what personal data is being collected about them, how it will be used and whom it will be shared.
Symantec is proud to support Data Privacy Day, please join Symantec’s Zoltán Précsényi for a webcast on 1/30 to learn how to:
•Articulate what privacy means to your organization and share best practices to achieve and maintain security internally and with third parties.
•Define security measures to protect individuals’ personal information from unauthorized access and use.
•Explore the fundamentals of what personal data means under GDPR
•Communicate your data use practices to your customers’ and explain how you manage their personal information.
Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec
Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.
Join us for our webinar “Putting the Power of Proxy to Work” to learn how:
- Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud
- Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365
- A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization
Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.
This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.
Join us to discover how you can:
· Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention
· Gain enhanced visibility into suspicious activity across your endpoint estate
· Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc
In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.
Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?
Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.
Join us to learn how to enable safe cloud adoption while maintaining compliance.
• How to address security and compliance challenges when migrating to the cloud
• How to support GDPR compliance in the cloud
• Leverage a single data protection solution for email, storage, network, endpoints, and cloud
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.