Hi [[ session.user.profile.firstName ]]

Data Protection 101: Follow and protect your critical data, wherever it lives

When it comes to your sensitive data, how can you be sure that it is protected and none of it is leaving your environment?

Organizations today face the following challenges:
•Identifying the type of data that needs to be protected
•Controlling access to data & ensuring identities aren’t exposed, especially in the face of significant regulatory fines
•Prevent sensitive data from leaving the organization, mega-breaches & data loss is increasing year on year. Over half a billion personal records were stolen or lost in 2015, spear phishing campaigns targeting company employees increased by 55% in 2015

Answer: Firstly allow the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands. Secondly Easily apply policies to control access and usage―in the cloud, on mobile devices, or on the network.

Join Symantec for a webinar on the lessons learned regarding data protection across the many applications in your environment.
Recorded Sep 7 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sunil Choudrie, Global Solutions Marketing Manager
Presentation preview: Data Protection 101: Follow and protect your critical data, wherever it lives
  • Channel
  • Channel profile
  • How to Keep Endpoints Safe and Employees Productive with Application Isolation May 1 2018 5:00 pm UTC 60 mins
    Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
    In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.

    However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.

    Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.

    Join us to learn how you can:

    - Discover and assess the risk of applications on your endpoints automatically.

    - Shield known good applications to prevent vulnerability exploits.

    - Isolate suspicious and malicious applications to stop privileged operations automatically.

    In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.

    Register Today.
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Apr 12 2018 5:00 pm UTC 60 mins
    Kevin Haley, Director of Security Response, Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Kevin Haley as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Symantec Software Asset Management and the Newly Improved Software Portal Recorded: Mar 22 2018 52 mins
    Damon Covey, Senior Director, Product Management, Symantec
    Join us for this webinar on March 22, where we will discuss the Symantec approach to software asset management. During this webinar, we will review and demonstrate some of the new capabilities available in Symantec IT Management Suite including the recently updated end user self-service software portal.

    The software portal enables on-demand software delivery and includes these new features:

    Browser agnostic
    Intelligent delivery of applications based on user role and operating system

    Don't miss this great opportunity to learn the latest and greatest information on Symantec IT Management Suite.
  • GDPR Compliance: Leveraging Technology for Breach Detection and Response Recorded: Mar 21 2018 30 mins
    Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
    Does your organization have a process in place for breach detection under the General Data Protection Regulation (GDPR)? Are you aware of what types of breaches must be reported within the 72hr notification period and the impact to the EU Data Subject?

    With the enhanced data security and breach notification standards defined in the GDPR, many organizations are looking to build out an effective incident response strategy to meet the notification requirements.

    Join us to learn about the GDPR breach notification procedures and uncover ways to help reduce the impact of a breach while improving your existing security process.

    Key Takeaways:

    - What are the requirements for reporting a breach under the GDPR?

    - How to leverage technology to identify a breach in real time.

    - Preemptive steps you can to take now to ensure a breach does not trigger the notification requirement later.

    View Now
  • GDPR Compliance: The Operational Impact of Cross-Border Data Transfer Recorded: Mar 20 2018 38 mins
    Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
    In today's world, information needs to move quickly and freely wherever it is needed. Yet, with the impending General Data Protection Regulation (GDPR), many organizations struggle to understand if data sharing is allowed and what data protections are required to avoid non-compliance.

    Join us for an On-Demand webinar focusing on the transfer of personal data across borders. During this session we will cover best practices for protecting your information against physical and virtual threats in order to maintain data integrity and confidentiality.

    Key Takeaways:

    - Understand what impact the GDPR has on Cross-Border Data Transfers

    - Understand the requirements for protecting EU personal data under your control

    - Learn how Symantec Solutions can assist you in protecting your personal data

    View Now
  • Phish me not! Stop Sophisticated Phishing Attacks with Email Threat Isolation Recorded: Mar 20 2018 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Anant Vadlamani, Principal Product Manager, Symantec Corporation
    Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

    This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

    Join us to learn how Symantec Email Security can:

    - Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.

    - Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.

    - Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.

    - Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.

    In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
  • GDPR Compliance: What North American Organizations Need to Know Recorded: Mar 20 2018 39 mins
    Ken Durbin, CISSP, Senior Strategist: Global Government Affairs & Cybersecurity, Symantec
    As the Global Data Protection Regulation (GDPR) deadline looms, many North American organizations are still waiting to see the global impact of this European initiative before they take action.

    While this risk based decision might seem like a good idea now, the impacts of non-compliance could be detrimental to their organization.

    Watch this On-Demand video to learn if your organization will be impacted by the GDPR as well as what data processing tactics trigger compulsory requirements.

    Key Takeaways:

    - Is the GDPR relevant to your organization: 5 Questions to ask yourself

    - What are the GDPR Triggers that require compliance action?

    - Hypothetical scenarios to help you understand and prepare for the GDPR

    - How Symantec can help regardless of your stage of readiness

    Register Today
  • How to Tackle Data Protection Risk in time for GDPR Compliance Recorded: Mar 15 2018 62 mins
    Sunil Choudrie: Information Protection Strategist, Deena Thomchick: Sr. Dir. Product Mgmt, Steven Grossman: VP Bay Dynamics
    Leveraging state of the art technology to help you find personal data, spot risky users, and respond to incidents

    The General Data Protection Regulation (GDPR) sets a new standard in data protection that will impact not just EU, but global organizations. With the GDPR start date quickly approaching, organizations face plural priorities; how to stay on top of their existing security program, while building – and implementing - a compliance strategy by May 2018.

    The keys to success? First, ensuring you understand the data protection risks you face. Second, using state of the art technology to both reduce risk and free up your security team.

    Join us on March 15th to learn how to leverage state of the art technology to build an efficient data protection risk management strategy.

    During this session, you will learn:

    -Why good risk management and data-centric protection go hand in hand

    -How leading technology helps you discover, monitor and protect personal data, wherever it is

    -Using data analytics to detect, quantify, and prioritize insider threats and outsider risks

    -How to free up your security team by removing unnecessary alerts and distractions

    Please join us, register today
  • Your Hidden Adversary: Understanding and Responding to Fileless Attacks Recorded: Mar 8 2018 55 mins
    Scott Hardie, Prinicipal Solutions Engineer, ATP, Symantec & David Berman, Sr. Mgr, Product Marketing, ATP, Symantec
    Attackers are increasingly using stealthy attacks that exploit common tools and techniques that reside in memory and never touch the disk.

    This webinar covers the fileless methods targeted attack groups and cybercriminals use and how the capabilities of Symantec Endpoint Detection and Response expose fileless threats that ‘hide in plain sight’ and quickly remediate their impacts – before the worst effects of a breach occur.

    Join us to learn how you can:

    - Detect Fileless attacks with machine learning, behavioral analysis and precise heuristics

    - Gain visibility into suspicious PowerShell activity and shutdown malicious scripts

    - Leverage built-in Malware Analysis file detonation and conviction

    - Streamline deployment of Endpoint Protection and EDR while lowering total cost of ownership

    In addition, we’ll show you Symantec’s EDR solution, ATP: Endpoint, in action, with a demo that showcases powerful investigative tools and one-click remediation of impacted endpoints.

    Register Today
  • Securing Today’s Enterprise The Proof is in the Proxy Recorded: Feb 27 2018 31 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    While many network security technologies by themselves promise complete security, the only real protection against advanced threats in today's risk-laden environment is a multi-layered defense comprised of
    different network, end-point and gateway technologies.

    Learn how each of these different technologies offers different layers of protection against threats, and why it’s not a prudent risk to go without any of them, especially the Secure Web Gateway.

    The Secure Web Gateway adds the proxy-based layer of defense needed for web-borne threats, generally considered one of the two most likely mechanisms for threat transmission into organizations today
    (the other being e-mail).

    Please Join Us, Register Today
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey Recorded: Feb 22 2018 49 mins
    Robert Arandjelovic and Sunil Choudrie, Symantec
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=JO0yR5ukvt
  • Are you ready for the new MFA requirements for PCI Compliance? Recorded: Feb 21 2018 24 mins
    Alex Wong, Senior Manager, Product Management, Symantec and Maren Peasley, System Engineer, Symantec
    PCI just made changes to the MFA requirements.

    With rapid cloud adoption, how do companies protect data, secure access & keep employees productive all while meeting compliance requirements?

    Key Takeaways:

    - Learn the scope of the new and future Payment Card Industry MFA & SSL (PCI) requirements

    - Understand common ways to comply & why companies fall out of compliance

    - Review best practices to secure access to your data

    Register Today
  • Shadow Data Report: Top 5 Risks of Employee Cloud App Use and Abuse Recorded: Feb 15 2018 54 mins
    Martin Johnson, Sr. Director of Outbound Product Management, Cloud from Symantec
    It’s not an illusion. The increase in cloud app adoption has increased the exposure to your most sensitive data. Our Shadow Data Report covers the key trends and challenges to consider so you can deal with the risks head-on and still maintain the benefits of moving to the cloud.

    Register for this webcast for insights on the top 5 threats from the report to consider as well as:

    •The hidden signs of looming data breaches and where to look for them

    •What kind of risky employee activity could expose your most sensitive data

    •Whether file sharing, email and social or a combination change your exploitation risks

    Register Today
  • Performance Enables Better Cloud & Security Adoption Recorded: Feb 13 2018 60 mins
    Kevin Hohenbrink, Principle Product Manager and Mike Chen, Director, Product Marketing
    Today’s network users demand speed, flexibility and a safe operating environment. Symantec is an industry leader with the right technologies to help you achieve these goals.

    This webcast will look at how Symantec PacketShaper improves your security posture and unlocks new capabilities by providing 360-degree network traffic visibility. With complementary products like MACH5, you can realize even bigger gains by optimizing video and rich media content, and other contents on your WAN & Internet links.

    Join us to discover how you can:

    •Boost user experience to improve cloud and security adoption
    •Identify risky apps, encrypted traffic, and security gaps with PacketShaper’s visibility and reporting
    •Learn the unique capabilities and benefits of Symantec’s Performance Optimization products

    Register for the discussion today.
  • Making Sense of Federal IT Modernization Recorded: Feb 8 2018 42 mins
    Ken Durbin, Sr. Strategist Gov't Affairs & Cybersecurity, Symantec & Bill Wright, Director of Government Affairs, Symantec
    Modernizing Federal IT Systems has been discussed for years with little systemic progress, but 2017 changed that when several major initiatives that could lead to significant progress in modernizing efforts were produced.

    In 2017, an Executive Order on Cybersecurity was signed, which led to the creation of the American Technology Council that ultimately produced a comprehensive report on Federal IT Modernization.

    At the same time, Congress passed the Modernizing Government Technology (MGT) Act in order to help fund the modernization efforts.

    Join Symantec for this informative webinar to understand:

    -- The key take-a-ways of the IT Modernization Report
    -- What it could mean to me
    -- Timelines for Implementation
    -- The role of the MGT Act

    Register Today
  • Protect Your Business Against Today’s Advanced Mobile Security Threats Recorded: Feb 1 2018 60 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec
    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.

    Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?

    In this webcast, you will:

    - Learn about the various and advanced methods hackers use to attack and compromise mobile devices.

    - Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.

    - Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.

    Register Today
  • Best Practices for Data Privacy Day 2018 Recorded: Jan 30 2018 61 mins
    Zoltán Précsényi, Director GDPR Strategy, EMEA Legal, Symantec
    Creating a culture of privacy at work starts with teaching your organization what privacy means. Customers and stakeholders want to understand what personal data is being collected about them, how it will be used and whom it will be shared.

    Symantec is proud to support Data Privacy Day, please join Symantec’s Zoltán Précsényi for a webcast on 1/30 to learn how to:

    •Articulate what privacy means to your organization and share best practices to achieve and maintain security internally and with third parties.

    •Define security measures to protect individuals’ personal information from unauthorized access and use.

    •Explore the fundamentals of what personal data means under GDPR

    •Communicate your data use practices to your customers’ and explain how you manage their personal information.

    Register Today
  • Putting the Power of Proxy to Work Recorded: Jan 25 2018 33 mins
    Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec
    Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.

    Join us for our webinar “Putting the Power of Proxy to Work” to learn how:

    - Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud

    - Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365

    - A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization

    Register Today
  • Secrets Revealed: Effective Protection Against Ransomware Recorded: Jan 18 2018 62 mins
    Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • GDPR Compliance: Maintaining Security in the Cloud Recorded: Jan 11 2018 62 mins
    Clive Finlay, Director, Technical Account Management,Symantec and Peter Gooch, Partner within Deloitte Cyber Security Service
    Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

    Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

    Join us to learn how to enable safe cloud adoption while maintaining compliance.

    Key Takeaways:

    • How to address security and compliance challenges when migrating to the cloud

    • How to support GDPR compliance in the cloud

    • Leverage a single data protection solution for email, storage, network, endpoints, and cloud

    Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Protection 101: Follow and protect your critical data, wherever it lives
  • Live at: Sep 7 2016 10:00 am
  • Presented by: Sunil Choudrie, Global Solutions Marketing Manager
  • From:
Your email has been sent.
or close