Hi [[ session.user.profile.firstName ]]

Symantec IT Management Suite 8.0 Launch

IT Management Suite 8.0 is here! Please join us for a special webcast on Wednesday, March 23 to learn how version 8.0 will make managing and protecting your IT environment even easier.

This event will feature a panel of customers who participated in our early adopter program. They will share their experience testing and using version 8.0.

IT Management Suite 8.0 includes several new exciting features and enhancements including:

• Integration with Symantec Unified Endpoint Protection Cloud Service
• Expanded software license management capabilities and views
• FIPS 140-2 compliant
• Increased scalability by nearly double capacity
• UI improvements with search, filters, agent health, and more

Don't miss this great opportunity to get the latest news and information on IT Management Suite 8.0.
Recorded Mar 23 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hugo Parra, Director of Product Management; Damon Covey, Director of Solutions Product Management
Presentation preview: Symantec IT Management Suite 8.0 Launch
  • Channel
  • Channel profile
  • A Step-By-Step Approach For Endpoint Detection & Response May 18 2017 5:00 pm UTC 30 mins
    Scott Hardie, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • Easy Ways to Improve Your Security Posture Apr 20 2017 5:00 pm UTC 30 mins
    Kirk Gibbons, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 4 of 5: Easy Ways To Improve Your Security Posture

    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join use to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323
  • Zero-Day Attacks and What To Do About It? Mar 23 2017 5:00 pm UTC 30 mins
    Chris Candaffio, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 3 of 5: Zero-Day Attacks and What To Do About It?

    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223
  • Operationalizing Cybersecurity in Healthcare: 2017 IT Security & Risk Management Mar 14 2017 5:00 pm UTC 60 mins
    David Finn, Health IT Officer, Symantec and Bob Chaput, Chief Executive Officer, Clearwater Compliance
    Healthcare organizations continue to make headlines as the target of cyberattacks, ransomware threats and the source of large data breaches. Yet according to the latest “Healthcare IT Security and Risk Management Study” conducted by HIMSS Analytics, while investments are being made and more focus is being placed around cyber security, it is still viewed as IT problem, rather than as a business risk management issue.

    Join us for the “Operationalizing Cybersecurity in Healthcare” webinar as we reveal findings from the study and what healthcare leaders can do to address these gaps and shift their organization from a tactical and reactive mindset to a robust and sustainable risk-management program.

    During this webinar, we will also discuss:

    • How IT, Security, Business, and Clinical leaders are approaching cybersecurity readiness and the role it has as part of their risk management strategy

    • What’s driving the decisions on where cybersecurity investments are being made

    • Critical steps to achieving a comprehensive cybersecurity strategy

    Register Today
  • Unlock Public Cloud Benefits While Maintaining Security Mar 2 2017 6:00 pm UTC 60 mins
    Sudha lyer, Principal Product Marketing, Symantec and Dan Frey, Senior Manager Product Marketing, Symantec
    The public cloud offers agility and cost savings for organizations seeking that competitive edge, but will your critical workloads and applications remain secure?

    The "shared responsibility" model of security means that businesses are still on the hook for securing everything running on the IaaS providers infrastructure.

    Learn how the new Symantec Cloud Workload Protection automates security for your AWS and Azure deployments, how to defend your workloads against exploits and advanced threats so you can enjoy public cloud benefits without worrrying about security.

    Join our webcast to learn how easy it can be to:

    * Automatically discover, view, and control all of your for public cloud IaaS instances
    * Intregrate security directly into your DevOps continuous delivery workflows
    * Deploy security that scales seamlessly with your dynamic public cloud workloads
    * Mitigate risk associated with public cloud adoption

    Register Today
  • Doing More With Symantec Control Compliance Suite Feb 28 2017 6:00 pm UTC 60 mins
    Anand Visvanathan, Principal Product Manager, Symantec
    In the past year, Symantec Control Compliance Suite (CCS) has added several new features that provide additional flexibility and platform coverage including:

    • IT Compliance and security assessments for custom applications and services

    • Security assessments across devices, servers and endpoints

    • Security baselines for newer technologies like Docker

    Please join us for this special webcast to learn how:

    The new features will simplify and enhance your ability to assess the compliance of your data center and get an update on the product roadmap

    Register today
  • Symantec Cloud Workload Protection Product Demo Video Recorded: Feb 24 2017 2 mins
    Symantec
    Symantec Cloud Workload Protection, our latest offering for securing enterprise data center migrations into the public cloud. This new offering adds workload security to Symantec’s security portfolio for the cloud generation.

    Cloud Workload Protection provides elastic security for AWS and Microsoft Azure workloads via cloud-native integration, enabling businesses to enjoy public cloud benefits without worrying about the security and integrity of their brand as they offer new services to their customers.

    To learn more, visit the Symantec Cloud Workload Protection product page: https://www.symantec.com/products/threat-protection/cloud-workload-protection
  • Block The Risk Of Ransomware Recorded: Feb 23 2017 31 mins
    Jonathan Korba, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 2 of 5: Block The Risk Of Ransomware

    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.

    Register Today

    Watch On-Demand: SEP 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126
  • Demystifying the NIST Cybersecurity Framework for Healthcare Recorded: Feb 9 2017 51 mins
    Don Kleoppel, Chief Security Officer, Cerner and Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.

    This quarterly webinar series is designed to discuss how healthcare organizations are adopting the 5 core functions of the NIST Cybersecurity Framework-Identify, Protect, Detect, Respond, and Recover- to help them defend against cybersecurity threats on an ongoing basis, prioritize security risks and incidents based on potential impacts, and mitigate the most significant problems first, all while maintaining compliant with HIPAA and other federal and state regulations.

    Join us for Part 1 of this series as Cerner’s Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.

    During this webinar, we will also cover:

    •Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture

    •Symantec’s involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations

    •Leveraging the CSF to shift from a “check the box” compliance mindset to an automated risk management approach

    Register Today
  • The inside scoop on Cloud Security Gateways featuring Andras Cser of Forrester Recorded: Feb 7 2017 57 mins
    Andras Cser, VP, Principal Analyst Serving Security & Risk Professionals, Forrester & Deena Thomchick, Sr.Director, Symantec
    Get advice on evaluating cloud security products from our guest speaker, Andras Cser, primary author of Forrester's first Wave Report on Cloud Security. He will discuss the risks associated with adopting cloud applications and services and how cloud security gateways (CSG), also known as CASBs, can help protect your organization with integrated data protection and activity monitoring.

    This webcast will include insights from the recently released report, The Forrester Wave™: Cloud Security Gateways Q4 2016, which evaluated 8 of the most significant CSG vendors against 23 different criteria.

    Register Today
  • Securing Higher Education Institutions in the Cloud Recorded: Feb 7 2017 51 mins
    Frank Torrence, Senior Systems Engineer, Symantec
    With the rise of cloud adoptions and ease of access to business and learning applications, higher education institutions are finding it increasingly difficult to maintain data integrity, authentication, and security for its students and faculty.

    Join Symantec’s Frank Torrence, to discuss industry best practices for higher education to leverage Cloud Access Security Broker (CASB) and Data Loss Prevention(DLP) capabilities to provide auditing, reporting, and security for applications data wherever it resides.

    In this webcast you will learn how to:

    - Ensure secure cloud application and data access for students, teachers and faculty

    - Secure your network from the cloud to the ”ground”

    - Maintaining data integrity and security without sacrificing access

    - Provide an environment that allows freedom and ease of use for all connected users.

    Register Today
  • Using the NIST CSF to prepare for Canada Digital Privacy Act Recorded: Jan 31 2017 58 mins
    Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    The Digital Privacy Act (DPA) from Canada is here…are you ready? The Government of Canada passed the Digital Privacy Act (DPA), which amends and updates the existing federal privacy legislation. As a business in Canada what does this mean to you and are you ready?

    Aside from the obvious ramifications of a breach such as lost data and revenue, one of the many new requirements of the DPA requires all Canadian organizations to “keep and maintain a record of every breach of security safeguards involving personal information under its control.”

    Attend this Webcast to learn how to use the National Institute of Standards and Technology (NIST) with Cybersecurity Framework (CSF) as a tool to help determine if you’re ready for this new, important legislation.

    Key Learning Objectives:

    -Basic overview of NIST Cybersecuity Framework (CSF)

    -Review what the Canadian Digital Privacy Act (DPA) requirements are to your organization

    -Understand how to utilize the CSF to prepare for the Digital Privacy Act

    Register Now
  • Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning Recorded: Jan 26 2017 32 mins
    Chris Diya, Systems Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 1 of 5: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning

    Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning.

    Join us to discover:

    •How machine learning addresses unknown threats

    •Why Symantec Endpoint Protection 14 machine learning is unique

    •Where it fits in a layered solution

    In addition to a lively discussion we’ll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • ATM Threats to the Financial Sector Recorded: Jan 24 2017 54 mins
    Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Current State of Ransomware in State & Local Government Recorded: Jan 19 2017 58 mins
    Kevin Haley, Director of Product Management for Symantec Security Technology and Response
    Ransomware has become extremely popular with cyber criminals because it’s easy and very profitable. Organizations can defend themselves and lower the risk of ransomware or other common threats costing them time and money.

    Key Learning Objectives:

    - A look at the current state of ransomware

    - Simple and inexpensive steps that can advance state and local government security posture

    - Better understanding of the cyber security landscape

    - Best practices to take in cyber defense

    Join us for a review on simple ways, state and local government can protect themselves against ransomware attacks.

    Register for this free webinar today.
  • Learn How the NIST CSF Benefits Small and Medium Businesses Recorded: Jan 17 2017 60 mins
    Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Small Businesses are increasingly being targeted by cyber criminals. With precious few resources, how can Small Businesses defend against Ransomware, Data Breach, Insider Threat plus more issues.

    Join this webcast to learn how the NIST Cybersecurity Framework (CSF) can be an important resource to help Small Businesses defend against cyber-attacks. We’ll walk you through the recently released NIST Publication “Small Business Information Security: The Fundamentals” and it’s relation to the NIST CSF.

    - A basic understanding of the Cybersecurity Framework.

    -The purpose and scope of the recently released NIST Small Business Information Security Publication.

    -A review of the alignment of Symantec solutions to the Cybersecurity Framework.

    Join this webcast for a review of the latest NIST guidance and how to apply it to assess and manage Cybersecurity Risks to your business.
  • Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead Recorded: Dec 20 2016 64 mins
    Nick Savvides, Manager, Cyber Security Strategy, Asia Pacific & Japan, Symantec Corporation
    2017 will see even more IoT devices introduced into business networks, along with an increasingly mobile workforce enabled by cloud applications and services. This rapid evolution of the workplace necessitates a re-look at where the security industry should focus on, in the ongoing battle against cybercriminals.

    As 2016 comes to an end, our Security Intelligence team have compiled a list of the top security predictions for 2017 and beyond.

    Attend our ‘Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead’ webinar and join our discussion of the upcoming threat landscape.
  • Effective Patch Strategies for Windows 10 and Office 365 Recorded: Dec 13 2016 47 mins
    Damon Covey, Director of Solutions Product Management – Symantec
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Introducing the Latest Release of Symantec Advanced Threat Protection: Email Recorded: Dec 8 2016 27 mins
    Jane Wong,Product Management,Gateway Security Group,Symantec & Nirav Shah, Email Security Product Marketing Manager, Symantec
    Stop Sophisticated Email Threats by Leveraging one of the World’s Largest Global Intelligence Networks

    Email continues to be the #1 threat vector for targeted and advanced attacks. The ubiquity of email and the widespread adoption of traditional email security solutions has led attackers to move beyond basic spam and phishing emails to more targeted and sophisticated attacks to infiltrate an organization.

    Join Symantec’s Jane Wong, Sr. Director, Product Management,Gateway Security Group and Nirav Shah, Email Security Product Marketing Manager to learn:

    - How Symantec can help your organization uncover, stop and respond to sophisticated email attacks while providing the deepest level threat intelligence.


    Register Today
  • The Threat Landscape – A Year in Review and a Look at What is Ahead Recorded: Dec 7 2016 41 mins
    Kevin Haley, Director Security Response, Symantec
    Once again it's been a bad year for computer security. But while we are focused on the increased threats of IoT devices as the year comes to an end, a lot of other significant security events and malware threats appeared all through the year. And they all have significance for next year.

    This webcast will review the threat landscape of 2016 with a focus on what we need to remember as we move into 2017.
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Symantec IT Management Suite 8.0 Launch
  • Live at: Mar 23 2016 3:00 pm
  • Presented by: Hugo Parra, Director of Product Management; Damon Covey, Director of Solutions Product Management
  • From:
Your email has been sent.
or close