Hi [[ session.user.profile.firstName ]]

Symantec 2016 | Unifying Your Security Strategy

Technology is exponentially advancing by the day and cyber warfare isn't slowing down. According to a recent IBM survey*, the most common reason for breaches is human error and businesses of today need a unified protection that streamlines their data protection strategy. This webcast will present Symantec's evolved answer to holistic data protection for the enterprise.

Join us and learn:
• 5 IT mega trends
• Security issues requiring a response…NOW
• Threat visibility in a virtual security operation center tour
• The future of security

*IBM survey: http://www-03.ibm.com/security/services/2014-cyber-security-intelligence-index-infographic/index.html
Recorded Mar 17 2016 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tim Fitzgerald, Chief Security Officer, Symantec and Neils Johnson, Symantec Evangelist
Presentation preview: Symantec 2016 | Unifying Your Security Strategy
  • Channel
  • Channel profile
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Jun 20 2018 60 mins
    Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Symantec Endpoint Protection Mobile Product Updates - June 2018 Recorded: Jun 12 2018 32 mins
    Maya Mandel VP of Product, Symantec
    Join us for a monthly customer dialog to learn about the latest Symantec Endpoint Protection(SEP) Mobile features and ask any product-related questions.

    You will learn about:

    - What new features are in the Symantec Endpoint Protection Mobile incident model
    - End-user emails localization
    - New Suspicious URLs tab
    - New unwanted app conditions
    - Symantec Web Security Service (WSS) integration
    - Symantec Cloud Access Security Broker (CASB) integration
    - And more

    Register Today
  • Securing Containers with Symantec Control Compliance Suite Recorded: Jun 12 2018 49 mins
    Vasant Kabra, Sr. Principal Software Engineer, Symantec and Curtis Barker, Product Portfolio Manager, Symantec
    Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.

    Containers provide some very compelling benefits especially in terms of speed and cost savings. But, like with any new tool, there are security concerns that must be addressed.

    Join us for this special webcast on June 12 where we will discuss the security challenges that arise from using containers, how to assess the security of the container and container images in order to reap the full benefits of this exciting technology.
  • GDPR: The Importance of Looking Beyond 25 May, 2018 Recorded: May 25 2018 61 mins
    Robert Arandjelovic, Giampiero Nanni
    Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
  • How Can Your Organization Safeguard Against Phishing Emails? Recorded: May 24 2018 27 mins
    Jimmy Lin, Product Manager, Email Security.cloud, Symantec
    Spear-phishing emails emerged as by far the most widely used infection vector in 2017, employed by 71 percent of targeted attack groups according to findings in our latest Internet Threat Security Report.

    In this how-to session, we will demonstrate:

    - How to optimize the configurations of your Email Security.cloud service to protect your organization.

    - We will explain the benefits of the following technologies and how to enable them in your administration console ClientNet:

    • SPF Authentication
    • DMARC Authentication
    • Business Email Scam Analyzer
    • Email Impersonation Control

    Register Today
  • Accelerating Incident Response with Intelligence-Driven Security Orchestration Recorded: May 23 2018 47 mins
    Al Cooley,Director Product Mgmt, Symantec / Meny Har, VP Product, Siemplify / Nimmy Reichenberg, CMO, Siemplify
    Security operations teams are modern-day detectives, combing through clues to thwart cyberthreats. But the deluge of alerts from disparate technologies, manual processes and multiple consoles often hinder teams from building the story they need to respond to truly malicious activity.

    Join Symantec and Siemplify on Wedensday, May 23, to see how intelligence-driven orchestration helps SOCs overcome these challenges by enabling deeper, higher quality investigations and expediting incident response.

    During this session you’ll learn:

    - The vital role context plays in security operations and how it powers incident investigation and response

    - How threat intelligence and security orchestration provide deeper insights to streamline alert validation, incident prioritization and response

    - How Siemplify and Symantec DeepSight Intelligence integrate, drive a standardized workflow and improve security incident response

    Register Today
  • Solving Mobile Security: Peer-tested Strategies That Work Recorded: May 22 2018 60 mins
    Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • GDPR: Identifying and Responding to a Data Breach Recorded: May 22 2018 63 mins
    Duncan Brown IDC, Ilias Chantzos, Sunil Choudrie and Giampiero Nanni,Symantec
    With GDPR coming, businesses are endeavouring to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR’s data breach notification requirements continue to present a challenge for many.

    Join Duncan Brown, IDC and Ilias Chantzos, Senior Director, Global CIP and Privacy Advisor, Symantec and panel hosts to discuss

    •Findings from the current IDC GDPR Assessment
    •Gain practical advice on GDPR breach notification rules
    •Guidance issued from European Data Protection Authorities
    •Data transfers and how a breach can affect multiple locations and jurisdictions.
  • SEP Deception – All you need to know Recorded: May 18 2018 40 mins
    Adam Licata, Product Marketing Manager, SEP, Symantec
    Deception is a new features of SEP 14.1. Learn how to deploy and utilize this unique feature to identify hackers and remove risks.
  • SEP Hardening– All you need to know Recorded: May 18 2018 40 mins
    Adam Licata, Product Marketing Manager, SEP, Symantec
    Understand how and why to deploy the new SEP Hardening feature in an effort to increase your overall security posture.
  • Top 5 Things to Consider When Securing AWS Recorded: May 15 2018 53 mins
    Deena Thomchick, Sr. Director, Cloud Security, Symantec
    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    Monitor activity and security configurations
    Control access and prevent risky changes or privileged misuse
    Detect malicious insiders and compromised accounts
    Keep S3 buckets private and secure confidential data with DLP
    Defend S3 buckets from advanced malware threats
  • GDPR: Act now to accelerate your GDPR journey Recorded: May 11 2018 49 mins
    Robert Arandjelovic, Director Product Marketing, Symantec and Sunil Choudrie, Global Product Marketing Manager, Symantec
    With GDPR almost here, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=jyWguSFtTX
  • How Secure is Your Hybrid Cloud? Recorded: May 10 2018 61 mins
    Doug Cahill, Senior Analyst and Group Director, ESG and Abhishek Srivastava, Sr. Director Product Management, Symantec
    Enterprises migrating workloads from traditional data centers to Infrastructure-as-a-Service (IaaS) providers are discovering that a "lift-and-shift" approach to security doesn't work. Traditional on-premises security tools do not scale with workloads and storage in dynamic cloud environments or support the continuous integration and delivery (CI/CD) workflows central to modern DevOps practices. And while some workloads are well suited to the public cloud, others often remain on-premises or in private clouds, necessitating multiple security solutions and multiple consoles generating alerts. An efficient, single console security solution is needed to protect workloads and storage against advanced threats and malware across today's heterogeneous hybrid cloud environments.

    What is a hybrid cloud and how is it different from securing a traditional data center?

    Why is the development of applications for the cloud different and how does it impact security?

    What are some solutions currently available for protecting my hybrid cloud workloads and how do they do it?
  • Healthcare Cyber Security: Still Playing Catch Up? Recorded: May 9 2018 64 mins
    Axel Wirth, Distinguished Technical Architect, Symantec
    Cybersecurity is earning its seat in the boardroom with so much attention on the impacts and destruction a cyber attack or incident can have on a hospital's bottom line, or even worse, a patient. Yet healthcare providers continue to lag behind other industries when it comes to investing in cybersecurity with 74% dedicating 6% or less to IT security. So what will it take to fill the gaps that are still looming when it comes to an organization's risk management strategy?

    Join Axel Wirth, Distinguished Technical Architect, Symantec, as he shares key findings from HIMSS Analytics and Symantec's 2018 Healthcare IT Security & Risk Management Study.

    Learn about:

    - Healthcare's shift from a compliance mindset to a risk management approach.

    - Which cybersecurity frameworks are gaining momentum within the industry and why.

    - How healthcare IT leaders are addressing security while navigating the changing technology landscape to include cloud and medical devices.

    Register Today
  • How to Keep Endpoints Safe and Employees Productive with Application Isolation Recorded: May 1 2018 54 mins
    Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
    In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.

    However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.

    Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.

    Join us to learn how you can:

    - Discover and assess the risk of applications on your endpoints automatically.

    - Shield known good applications to prevent vulnerability exploits.

    - Isolate suspicious and malicious applications to stop privileged operations automatically.

    In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.

    Register Today.
  • Get all your questions on GDPR answered Recorded: Apr 24 2018 60 mins
    Sunil Choudrie, Giampiero Nanni, Robert Arandjelovi, Alexander Peters, Ramses Gallego
    Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.

    The discussion will enable you to successfully prepare for the GDPR by:

    • Understanding its full implications for your organisation
    • Identifying and tracking personal data, wherever it may be
    • Implementing cyber security to protect your data systems
    • Detecting and responding effectively to security breaches
    • Building a GDPR compliance program for the long term

    Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Recorded: Apr 12 2018 56 mins
    Kevin Haley, Director of Security Response, Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Kevin Haley as he shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • Did you complete the IDC Assessment? You're Stage 4/5 Recorded: Apr 5 2018 9 mins
    Sunil Choudrie, Symantec
    Have you completed the IDC Assessment and your report has identified that you are Stage 4/5. Listen to this 15 minute webinar on what it means to you and what you can do next.
  • Did you complete the IDC Assessment? You're Stage 2/3 Recorded: Apr 5 2018 10 mins
    Sunil Choudrie, Symantec
    Have you completed the IDC Assessment your report has identified that you are Stage 2 / 3. Join this 15 minute webcast on what to do next
  • Did you complete the IDC Assessment? You're Stage 1 Recorded: Apr 5 2018 9 mins
    Sunil Choudrie, Symantec
    If you've taken the IDC Assessment and your report has identified that you are Stage 1 - find out in this 10 minute webcast on what you need to now.
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Symantec 2016 | Unifying Your Security Strategy
  • Live at: Mar 17 2016 5:00 pm
  • Presented by: Tim Fitzgerald, Chief Security Officer, Symantec and Neils Johnson, Symantec Evangelist
  • From:
Your email has been sent.
or close