Hi [[ session.user.profile.firstName ]]

Dridex: The Financial Threat Clogging Our Mailboxes

Dridex is one of the most persistent and prevalent threats facing organizations today. Configured to collect victim's banking credentials, it is now one of the most active and dangerous pieces of financial malware in circulation.

Join this webcast as we discuss:

•Dridex propagation methods, in particular its massive spam campaigns.
•How Dridex attempts to steal banking information.
•Guidance on how to protect against Dridex infections.
Recorded Apr 26 2016 31 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Orla Cox, Director Security Response, Symantec and Dick O'Brien, Senior Information Developer, Symantec
Presentation preview: Dridex: The Financial Threat Clogging Our Mailboxes
  • Channel
  • Channel profile
  • Performance Enables Better Cloud & Security Adoption Feb 13 2018 6:00 pm UTC 60 mins
    Kevin Hohenbrink, Principle Product Manager and Mike Chen, Director, Product Marketing
    Today’s network users demand for speed, flexibility and a safe operating environment. While many companies offer technologies that can help you achieve your goal of meeting these user demands, but the right technology not only will help you achieve your goals, it also can help to build a more efficient network environment and saves you thousands of dollars while doing it.

    Come to this interesting webcast and learn how the Symantec PacketShaper improves your security posture and unlocks new capabilities by providing 360-degree network traffic visibility. With complementary products like MACH5, you can realize even bigger gains by optimizing video and rich media content, and other contents on your WAN & Internet links.

    During this webinar, we’ll look at:

    •How to boost user experience to improve Cloud and security adoption
    •How to identify risky apps, encrypted traffic and security gaps with PacketShaper’s visibility and report
    •What are the unique capabilities and benefits of Symantec’s performance optimization products

    Symantec’s performance subject matter experts will be available for Q&A during and following the presentation.
  • Putting the Power of Proxy to Work Jan 25 2018 6:00 pm UTC 30 mins
    Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec
    Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.


    Join us for our webinar “Putting the Power of Proxy to Work” to learn how:

    - Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud

    - Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365

    - A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization

    Register Today
  • Secrets Revealed: Effective Protection Against Ransomware Jan 18 2018 6:00 pm UTC 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • GDPR Compliance: Maintaining Security in the Cloud Jan 11 2018 6:00 pm UTC 60 mins
    Symantec
    Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

    Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

    Join us to learn how to enable safe cloud adoption while maintaining compliance.

    Key Takeaways:

    • How to address security and compliance challenges when migrating to the cloud

    • How to support GDPR compliance in the cloud

    • Leverage a single data protection solution for email, storage, network, endpoints, and cloud

    Register Today
  • Defense Against a Ransomware Attack: Latest Research and Best Practices Dec 12 2017 6:00 pm UTC 60 mins
    Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec
    On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

    It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

    The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

    The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

    Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

    1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

    2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

    3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

    Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

    Register Today
  • The Essentials: Upgrading to Symantec Endpoint Protection 14.1 Recorded: Dec 8 2017 28 mins
    Adam Licata, Principal Product Manager, Symantec
    Find out why upgrading to SEP 14.1 is both smart and easy.

    Learn what you should do to get started and where to go to find detailed instructions and help if you need it.
  • Faster, Lighter and More Advanced Endpoint Security for Every Device Recorded: Dec 8 2017 49 mins
    Naveen Palavalli, Director, Product & GTM Strategy & Varun Kohli, Senior Director, Strategic Marketing from Symantec
    Endpoint Security for the Cloud Generation

    The threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have lead to operational complexity for organizations who face a severe shortage of skilled IT security personnel.

    Learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
  • The 5 Essentials of Every Next-Gen SOC Recorded: Dec 7 2017 61 mins
    Matt Mosley, Director of Product Management, CSS and Antonio Forzieri, Global Practice Lead, CSS from Symantec
    Every cybersecurity organization is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritization

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • TLS 1.3: the future is encrypted. Are your network security tools ready? Recorded: Dec 6 2017 64 mins
    Tim Murphy, Sr. Manager, Network Product Marketing, Symantec and Bob Blair, Sr. Systems Engineer, SSL Visibility, Symantec
    Google recently announced that 71 of the top 100 sites are now using HTTPS, nearly double from a year ago. Accelerated adoption of strong encryption practices, including TLS 1.3, is good for consumers and enterprises alike. However, highly secure encryption also presents challenges for security professionals. SSL/TLS encryption is also becoming popular with cybercriminals, looking to hide malware and other advanced threats. Consequently, without a solution that enables secure inspection, many network security tools that address advanced threats will be blind to them. Join us in this webcast where we’ll look at:
    -Challenges of intercepting TLS traffic while maintaining high security
    -The Impact of TLS 1.3 and importance of preserving session integrity
    -Benefits of centralized encrypted traffic management
    -Architectural considerations before you deploy
  • Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization Recorded: Dec 5 2017 51 mins
    Ken Durbin, CISSP Strategist, CRM & Threat Intel, Symantec and Geoff Cooke, Virtual CISO Services Consultant, CynergisTek
    Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.

    Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environments, and the impact it has provided.

    Register Today

    To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235
  • Your Proxy Just Got Smarter with Web Isolation Recorded: Nov 30 2017 32 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • GDPR, Analysis with Deloitte (Video) Recorded: Nov 16 2017 4 mins
    Symantec and Deloitte
    GDPR, Analysis with Deloitte (4 Min Video)
  • Symantec Endpoint Protection Mobile (Video) Recorded: Nov 15 2017 5 mins
    Symantec
    4 Min Product Demo Video

    Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
  • The Threat Landscape – Cybersecurity Trends in 2017 and Beyond Recorded: Nov 15 2017 59 mins
    Orla Cox, Director Development Symantec
    The last year has been dominated by costly attacks, newsworthy breaches ransomware and economic espionage. Cybercrime has gotten bigger and bolder and the financial rewards have gotten much bigger. Cyber attacks have started to become a regular occurrence in the news,. This webcast will review

    • Review the threat landscape of 2017
    • Who or what has been to blame in these ransomware and cyber attacks
    • What lessons can you the security professionals take from the year
    • What solutions can help secure you as we move into 2018.

    Register now
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Recorded: Nov 14 2017 61 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • Introducing Endpoint Security for the Cloud Generation (Video) Recorded: Nov 8 2017 2 mins
    Symantec
    Introducing Endpoint Security for the Cloud Generation Video (2 mins)

    Advanced Single Agent Endpoint Seucirty - Multi layer defense protects both traditional and modern endpoints stopping them from getting in however they attack.
  • Endpoint Security for the Cloud Generation (Video) Recorded: Nov 8 2017 3 mins
    Adam Bromwich, SVP, Engineering, Symantec
    Review of Symantec Endpoint Security for the Cloud Generation (2 min video)

    Adam Bromwich, SVP, Engineering discusses how our Integrated Cyber Defense Platform consolidates functionality, both on prem and in the cloud, by sharing capabilities and telemetry to solve complexity
  • Symantec Endpoint Protection 'Deception' (Product Tour Video) Recorded: Nov 8 2017 4 mins
    Symantec
    Symantec Endpoint Protection (SEP) 'Deception' Product Tour Video (3 mins)
  • Symantec Endpoint Detection & Response (EDR) - ATP:Endpoint (Product Tour Video) Recorded: Nov 8 2017 4 mins
    Symantec
    Symantec Endpoint Detection & Response (EDR) - ATP: Endpoint Product Tour Video (3 mins)

    Symantec Advanced Threat Protection: Endpoint gives incident investigators the tools to expose, contain and resolve breaches resulting from advanced attacks
  • Symantec Endpoint Protection 14.1 (Product Tour Video) Recorded: Nov 8 2017 4 mins
    Symantec
    Symantec Endpoint Protection (SEP) 14.1 Product Tour Video (3 mins)
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Dridex: The Financial Threat Clogging Our Mailboxes
  • Live at: Apr 26 2016 5:00 pm
  • Presented by: Orla Cox, Director Security Response, Symantec and Dick O'Brien, Senior Information Developer, Symantec
  • From:
Your email has been sent.
or close