Hi [[ session.user.profile.firstName ]]

How secure is your Office 365 deployment?

Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

Consider these statistics from IDC:

• Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
• Over 90% of threats to enterprises emanate from email
• 65% of threats go undetected for weeks/months

IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

Learn how to enhance your Office 365 security to:

• Shield Email From Phishing, Sophisticated Malware and Spam
• Neutralize Advanced Threats and Targeted Attacks
• Safeguard Your Sensitive Data
•Control Access with Strong Authentication

Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
Recorded May 24 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
Presentation preview: How secure is your Office 365 deployment?
  • Channel
  • Channel profile
  • Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization Dec 5 2017 6:00 pm UTC 60 mins
    Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.

    Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environment, and the impact it has provided.

    Register Today

    To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235
  • How to Use the NIST CSF to Recover from a Healthcare Breach Oct 17 2017 5:00 pm UTC 60 mins
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Responding to Healthcare Data Breaches with the NIST Cybersecurity Framework Sep 12 2017 5:00 pm UTC 60 mins
    Part 5 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    A cybersecurity event is currently going on. What do you do? Can you quickly and efficiently take action or simply stand by and watch the breach unfold? The ability to respond to a cyberattack in a timely fashion is incredibly important, especially for healthcare organizations that house lots of personally-identifiable information that is critical to their care delivery mission.

    In this webinar, we will explore the RESPOND function of the NIST CSF and what tools and processes healthcare organizations need in order to minimize impact during a cyber incident.

    This includes looking at:

    • Response Planning: Processes and procedures are executed and maintained to ensure timely response to detected cybersecurity events.

    • Communications: Activities are coordinated with internal and external stakeholders to include support from law enforcement agencies.

    • Analysis: Analysis is conducted to ensure adequate response and support recovery activities.

    • Mitigation: Activities are performed to prevent expansion of an event, mitigate its effects and eradicate the incident.

    • Improvements: Response activities are improved by incorporating lessons learned from current and previous detection/response activities.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 6-7 https://resource.elq.symantec.com/LP=4235
  • Detecting a Healthcare Breach with the NIST Cybersecurity Framework Aug 17 2017 5:00 pm UTC 60 mins
    Part 4 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it.

    In this webinar, we’ll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they’ve been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.

    We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes.

    It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 5-7 https://resource.elq.symantec.com/LP=4235
  • Not All Endpoint Protection Platforms Are Created Equal Jul 27 2017 5:00 pm UTC 60 mins
    Torry Campbell, Senior Director Product Management, Symantec
    Think for a moment: How many agents/modules/servers must your IT team install? Now consider the maintenance. Help ensure you get the level of endpoint protection your organization needs.

    Symantec provides the most complete endpoint security anywhere—from threat prevention to detection and response.

    In this webcast, you’ll learn how you can:

    •Drastically improve your security posture with next-gen technologies.

    •Remediate any attack artifact across all Symantec protected endpoints from one place.

    •Lower your IT burden and reduce complexity through a single agent.

    •Facilitate a painless migration and get your IT staff up and running.

    Stop advanced threats, both known and unknown, with a single lightweight agent.

    Register today for this Informative webinar.
  • Ensuring Data Protection with NIST Cybersecurity Framework Jul 20 2017 6:00 pm UTC 30 mins
    Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec
    When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.

    Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.

    Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:

    • Identify sensitive data, where it is and who is accessing it

    • Protect that data by establishing policies which prevent exposure

    • Detect threats to which could extrapolate data by several means

    • Respond to threats with automated actions

    • Recover after a threat to produce reports to prove compliance

    Register Today
  • Protecting Health Information with the NIST Cybersecurity Framework Jul 13 2017 5:00 pm UTC 60 mins
    Jeff Marron, IT Security Specialist from NIST and Ken Durbin, CISSP, Strategist CRM and Threat Intel from Symantec
    Part 3 of 7: The NIST Cybersecurity Framework Healthcare Webinar Series

    WannaCry is the most recent ransomware attack to cripple healthcare systems internationally. And whether it’s ransomware or the next trending threat, HHS, in conjunction with other agencies and the industry, has established a working group with the goal of developing official cybersecurity guidance for the healthcare industry. It is expected the the NIST Cybersecurity Framework (CSF) will play a major role in this guidance.

    Join us as we continue our webinar series focused on the NIST CSF and its benefits for the healthcare industry.

    Our first two segments aimed to demystify the NIST CSF and provide insight into the first function, Identify. This webinar will focus on the PROTECT function of the NIST CSF, which ultimately puts the security in cybersecurity.

    Our experts discuss how the framework helps healthcare organizations limit, or contain, the impact of a cybersecurity event, focusing on the critical technology categories to support the PROTECT function of the NIST CSF.

    Key Learning Objectives:

    •Why HHS is leading the effort to develop healthcare industry guidance and how the NIST CSF is playing an integral role

    •What the NIST CSF is and why the PROTECT function is one of the most important areas of consideration

    •What the key desired outcomes of the PROTECT function include

    •Why a focus on people, processes, policies and technologies is critical to success

    •How awareness and training plays into the mix

    Register Today

    On-Demand Webinar Series:
    - Part 1 of 7: Demystifying NIST Cybersecurity Framework for Healthcare Series http://bit.ly/Part10209WebinarNIST

    - Part 2 of 7: Using the NIST Cybersecurity Framework to Identify Personal Health Information (PHI) http://bit.ly/Part20601NIST

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 4-7 https://resource.elq.symantec.com/LP=4235
  • Mitigate Threats with Context-aware Vulnerability Assessment and Risk Analysis Jul 12 2017 5:00 pm UTC 60 mins
    Anand Visvanathan
    Most vulnerability management solutions do little to help security leaders put vulnerability and risk information in the context of business.

    Attend this webcast to learn about the newly released Symantec Control Compliance Suite Vulnerability Manager and how it can help you:

    • proactively identify security exposures

    • analyze business impact

    • plan and conduct remediation

    Register today!
  • Advanced Threat Protection for Messaging Gateway Jun 29 2017 5:00 pm UTC 60 mins
    Zachary Sivertson, Director Content & Malware Analysis, Symantec & Tobias Pischl, Product Manager, Email Security, Symantec
    Symantec has just released new advanced threat protection capabilities for Messaging Gateway 10.6 based on integration with Symantec’s Content & Malware Analysis platform. This new advanced threat defense option for Messaging Gateway provides offloading of messages to Content & Malware Analysis for further inspection and comprehensive malware detonation.

    Join Symantec product managers from Messaging Gateway and Content & Malware Analysis to see demos of this integration in action, and learn more about how this solution addresses today’s latest advanced threats through:

    •Advanced scanning and sandboxing to detect and block malicious files and URLs
    •In-depth threat analysis and summary dashboard-level visibility
    •Threat correlation analysis across Symantec Endpoint Protection, Proxy SG and Messaging Gateway

    Don't miss this great opportunity to speak with the product experts of this combined solution and get your questions answered!
  • Year in Review: Financial Sector Threat Activity Jun 28 2017 6:00 pm UTC 60 mins
    Candid Wueest, Threat Researcher, Symantec Security Response & Vikram Thakur, Researcher Security Response, Symantec
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • Mega Breaches: How To Mitigate Your Risks Using Data-Centric Security Recorded: Jun 22 2017 57 mins
    Heidi Shey - Senior Analyst at Forrester and Nico Popp - SVP Engineering, Information Protection at Symantec
    Keeping data safe pays dividends for protecting your reputation and retaining trust. No-one wants to suffer a breach, let alone a mega breach, but how should you invest time and resources to prevent this?

    In this webinar, guest speaker Heidi Shey (Senior Analyst at Forrester) will join Nico Popp (SVP Engineering, Information Protection at Symantec) as they guide you through the evolving world of data protection and explain how a holistic approach to data security and identity puts you back in control.

    Such a data centric approach combines data discovery, protection and identity and delivers two key benefits:

    •Ensures data is only available to the right users, irrespective of location (including cloud), organization or device

    •Provides protection throughout the data lifecycle

    The webcast will include a review of best practices to help you understand how a proactive, data-centric approach makes best use of your resources, and safeguards your – and your customers’ – critical data.
  • Protecting Your Sensitive Data Recorded: Jun 16 2017 2 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    Protecting Sensitive Data in the Cloud: In this short video learn how Proxy and DLP enables information security on prem or in the cloud.
  • Comparing Next Generation Firewalls to Proxy Recorded: Jun 16 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure
  • Taking Proxy to the Cloud Recorded: Jun 16 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service.
  • Proxy Essentials Recorded: Jun 16 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.
  • Google Docs and the Future of Phishing Scams Recorded: Jun 8 2017 60 mins
    Vikram Thakur, Technical Director Security Response and Ulf Mattsson (Atlantic BT)
    When the Google Docs phishing scam spread across the network in early May, it showed what a sophisticated phishing email looks like. It did not ask for a user's password and in some cases, it came from contacts the user already knew. What made this scam so hard to spot and what can we expect to see in the future when it comes to phishing attacks?

    Join this panel of experts to learn:
    - Latest trends in phishing scams
    - How to spot a phishing email from a mile away
    - Recommendations on how to avoid becoming a victim

    - David Morris, Pioneer in Cybersecurity

    - Phil Richards, CSO of Ivanti Software
    - Vikram Thakur, Technical Director, Security Response Team at Symantec
    - Sean Hittel, Principal Security Engineer at Netskope
  • Using the NIST Cybersecurity Framework to Identify Protected Health Information Recorded: Jun 1 2017 62 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Vishal Gupta, VP, Engineering/Product Management, Symantec
    Part 2 of 7: The NIST Cybersecurity Framework Healthcare Webinar Series

    Of the 16 critical infrastructure sectors, healthcare is the only one yet to adopt a formal cybersecurity framework. That may be about to change.

    Join Symantec on June 1 for the second webinar in our series around how healthcare organizations can adopt the NIST Cybersecurity Framework (CSF).

    In this webinar – Using the NIST CSF to Identify Protected Health Information (PHI) – we will look at the Identify function, knowing that you cannot protect what you don’t know you have.

    Healthcare organizations need to identify digital systems, what data they hold, how it is used, and what value it holds before they can make the right decisions on how to protect it under their Risk Management program.

    This webinar will look at technical and administrative controls that reflect your mission and operations and why it must be the first step in protecting your sensitive data and patient information.

    During this webinar we will:

    -Discuss how to successfully implement an asset and risk management strategy that incorporates all of your hardware, software, and data to gain complete visibility of your organization’s assets

    -Provide a practical guide for healthcare organizations to navigate through the 5 categories within the Identify function

    On-Demand Webinar Series:
    - Part 1 of 7: Demystifying NIST Cybersecurity Framework for Healthcare Series http://bit.ly/Part10209WebinarNIST

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 3-7 https://resource.elq.symantec.com/LP=4235
  • A Step-By-Step Approach For Endpoint Detection & Response Recorded: May 18 2017 31 mins
    Scott Hardie, System Engineer, Symantec
    5-Part Webinar Series: Endpoint Protection…what really matters?

    Part 5 of 5: A Step-By-Step Approach For Endpoint Detection & Response

    Endpoint Detection and Response (EDR) was developed as a way to address Advanced Persistent Threats (APTs). It is the sneakiness of APTs that make them so dangerous and so difficult to eradicate.

    Although it is generally accepted that EDR technology requires a unique agent, we’d like to ask “should it”?

    Join us to learn how Symantec Endpoint Protection 14 tackles EDR without an extra agent. Discover:

    •How EDR is used to improve security
    •Why integrations are important
    •Why Symantec Endpoint Protection and ATP beat the competition
    •Future plans EDR

    Finally, see a demo that showcases how quick and easy it is to identify and respond to threats with Symantec.

    Register Today

    Watch On-Demand:
    • Symantec Endpoint Protection 14 Webinar Series Part 1 of 5: Addressing Unknown Threats with Advanced Machine Learning http://bit.ly/SEP14Series0126

    • Symantec Endpoint Protection 14 Webinar Series: Part 2 of 5: Block The Risk Of Ransomware http://bit.ly/Part2Webinar0223

    • Symantec Endpoint Protection 14 Webinar Series: Part 3 of 5: Achieving Zero-Day Attacks and What To Do About It http://bit.ly/Part3Webinar0323

    • Symantec Endpoint Protection 14 Webinar Series: Part 4 of 5: Easy Ways To Improve Your Security Posture http://bit.ly/Part4Webinar0420
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Recorded: May 16 2017 61 mins
    Kevin Haley, Director of Product Management for Symantec Security Technology and Response
    2016 saw major shifts in techniques used by targeted attackers, the continued rise of ransomware and significant attacks from IoT devices.

    This webinar will share data from ISTR 22 to better understand the threats and trends that will affect us in 2017. It will cover key findings of the report and best practices to keep us protected in 2017.

    Get the facts in this highly respected research report and learn why:

    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates

    •One in 131 emails contained a malicious link or attachment – highest rate in five years

    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom

    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends and learn steps you can take to improve your security posture in 2017.
  • Symantec IT Management Suite 8.1 & Ghost Solution Suite 3.2 Launch Recorded: May 16 2017 60 mins
    Damon Covey, Director of Solutions Product Management, Symantec
    Symantec IT Management Suite 8.1 and Ghost Solution Suite 3.2 are here!

    We will discuss and demo some of the cool new features such as streamlined processes for updating Windows 10 and Office 365, peer-to-peer content distribution, Mac profile management, and much more!

    We will also have a panel of ITMS 8.1 early adopter customers who have already upgraded to IT Management Suite to share their experiences so you can learn all the do's and don'ts of a successful upgrade.

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.1 and Ghost Solution Suite 3.2!

    Please join us for a special webcast on Tuesday, May 16 to learn how these new solutions will make your life easier.
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How secure is your Office 365 deployment?
  • Live at: May 24 2016 5:00 pm
  • Presented by: Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
  • From:
Your email has been sent.
or close