Hi [[ session.user.profile.firstName ]]

How secure is your Office 365 deployment?

Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

Consider these statistics from IDC:

• Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
• Over 90% of threats to enterprises emanate from email
• 65% of threats go undetected for weeks/months

IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

Learn how to enhance your Office 365 security to:

• Shield Email From Phishing, Sophisticated Malware and Spam
• Neutralize Advanced Threats and Targeted Attacks
• Safeguard Your Sensitive Data
•Control Access with Strong Authentication

Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
Recorded May 24 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
Presentation preview: How secure is your Office 365 deployment?
  • Channel
  • Channel profile
  • Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization Dec 5 2017 6:00 pm UTC 60 mins
    Symantec
    Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.

    Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environment, and the impact it has provided.

    Register Today

    To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235
  • How to Use the NIST CSF to Recover from a Healthcare Breach Oct 17 2017 5:00 pm UTC 60 mins
    Symantec
    Part 6 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured?

    This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on:

    • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.

    • Improvements: Planning and processes are improved by incorporating lessons learned.

    • Communications: Restoration activities are coordinated with internal and external parties.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 7 https://resource.elq.symantec.com/LP=4235
  • Responding to Healthcare Data Breaches with the NIST Cybersecurity Framework Sep 12 2017 5:00 pm UTC 60 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Part 5 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    A cybersecurity event is occurring in you hospital. What do you do? Will you be prepared and can you quickly and efficiently take action or simply stand by and watch it unfold? The ability to respond to a cyberattack in a timely fashion is incredibly important, especially for healthcare organizations that house loads of personally identifiable information that is critical to their care delivery mission.



    In this webinar, taking place September 12 at 1pm eastern, we will explore the RESPOND function of the NIST CSF and what tools and processes healthcare organizations need in order to minimize impact during a cyber incident. 



    Webinar attendees will learn:

    •The different aspects of the RESPOND function of the NIST CSF, along with which activities security experts believe to be the most important.

    •A detailed look at all the categories of the RESPOND function and how they work in harmony with other parts of the NIST CSF.

    •The most important controls and solutions available to have in place when an incident does occur.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Series Part 6-7 https://resource.elq.symantec.com/LP=4235
  • Extend Content & Malware Analysis Beyond ProxySG to Email & Double Your Security Aug 31 2017 5:00 pm UTC 60 mins
    Alan Hall, Content & Malware Analysis, Symantec & Yvonne Dresser, Messaging Gateway, Symantec
    Symantec recently extended Content & Malware Analysis’s advanced threat protection capabilities to Messaging Gateway, Symantec’s on-premises email security solution. With this integration, Content & Malware Analysis adds additional value by bringing threat analysis, blocking, and remediation to the email channel.


    Join Symantec product team members from Messaging Gateway and Content & Malware Analysis to get an overview of Messaging Gateway and learn how this combined solution addresses today’s latest email borne threats through:
    •Advanced scanning and sandboxing to detect and block malicious files and URLs
    •In-depth threat analysis and summary dashboard-level visibility
    •Threat correlation analysis across Symantec Endpoint Protection, Proxy SG and Messaging Gateway

    Don't miss this great opportunity to speak with our product experts and get your questions answered!
  • Comprehensive Protection and Visibility into Advanced Email Attacks Aug 30 2017 5:00 pm UTC 60 mins
    Nirav Shah, Product Mktg Mgr for Email Security.Cloud, Symantec & Naveen Palavalli, Director Product Mktg., Symantec
    The latest version of the Symantec Cloud Email Security solution provides the strongest protection against Business Email Compromise with new, automated impersonation controls.

    In addition, this release offers the deepest visibility into targeted & advanced attacks with advanced email security analytics that now includes insights into both clean and malicious emails with 60+ data points on each email.

    Join this webcast to learn more about these new capabilities in and see them in action! Find out how Symantec Cloud Email Security can help you:

    • Defend your business from Business Email Compromise, spear phishing, spoofing attacks, and other scams

    • Accelerate response to targeted and advanced email attacks with more visibility than ever into email threats

    • Quickly correlate and respond to threats by exporting advanced email security analytics to your Security Operations Center
  • Learn how the NIST Cybersecurity Framework Benefits State and Local Governments Aug 22 2017 6:00 pm UTC 60 mins
    Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec
    The NIST Cybersecurity Framework (CSF) provides an excellent guide for state and local governments looking to improve their overall cybersecurity posture.

    Join our webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross, where he reveals how to apply the CSF to state and local government.

    Learn to:

    •Identify where sensitive data is and who is accessing it.

    •Protect that data with universal policies to ensure stability of networks and infrastructure.

    •Detect cyber threats quickly and reduce the chance of breaches.

    •Respond to threats with automated actions.

    •Recover after a threat to produce reports to prove compliance.

    Register Today
  • Detecting a Healthcare Breach with the NIST Cybersecurity Framework Recorded: Aug 17 2017 55 mins
    Axel Wirth, CPHIMS, CISSP, HCISPP, Technical Architect, Symantec & Ken Durbin, CISSP Strategist: CRM & Threat Intel, Symantec
    Part 4 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it.

    In this webinar, we’ll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they’ve been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.

    We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes.

    It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.

    Register Today

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 5-7 https://resource.elq.symantec.com/LP=4235
  • Using IT Management Suite to Optimize Content Distribution and Updates Recorded: Aug 16 2017 60 mins
    Tomas Chinchilla, Product Manager, Enterprise Security Products, Symantec
    One of the newest features in Symantec IT Management Suite is peer-to-peer downloading which helps optimize content distribution by utilizing the endpoint to periodically check for updates among endpoints nearby and automatically download new content to stay up to date.

    This new functionality provides a scalable distribution model that utilizes the endpoint to supplement the ITMS infrastructure, minimizing the impact on network bandwidth without requiring any changes to network or security configuration.

    Join this webinar on August 16 to learn more about how peer-to-peer downloading works and the best practices for using it in your environment.
  • Providing Security and Threat Protection for the Enterprise - Why It Matters Recorded: Aug 10 2017 31 mins
    Dr. Hugh Thompson, Chief Technology Officer, Symantec
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    In this webinar learn:

    - How a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    - A proxy based architecture is ESSENTIAL to meeting the needs of the cloud generation, to protect against the increasingly sophisticated web threats targeting your business.
  • Introducing Mobile Threat Defense for the Cloud Generation Recorded: Aug 9 2017 62 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Introducing Mobile Threat Defense for the Cloud Generation Recorded: Aug 3 2017 61 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Introducing Mobile Threat Defense for the Cloud Generation Recorded: Aug 3 2017 61 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks. Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats.

    Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • High Scale, High Stakes: Adjusting Focus and Investment at the Network Gateway Recorded: Aug 2 2017 50 mins
    Dan Cummins, Senior Analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing with Symantec
    As cloud continues to erase the network perimeter, it’s more important than ever to align IT infrastructure to track more closely to the businesses it serves.

    As a result, gateway technology choices and investments need to fit the cloud model and fit in terms of security use case, value, and real-world business requirements.

    Join Dan Cummins, analyst with 451 Research and Tim Chiu, Senior Director of Product Marketing at Symantec, for an informative webinar on August 2 to hear a discussion of network security today.

    Agenda:

    - Discussion on the increased dependence on HTTP and HTTPS

    - The limitations of Firewalls in the web and cloud world

    The increasing critical need for web gateways, both on premise and in the cloud, for achieving:

    - Access governance for users and devices

    - Verifiable protection against advanced attack methods

    - Agile risk management and measurable return on investment.

    Important opportunities are at hand right now to integrate network and cloud-based approaches to achieve coordinated and robust anti-malware, privacy, policy and connectivity capabilities, while continuing on a path to flexible, software-defined infrastructure.

    Register Today
  • Introducing Mobile Threat Defense for the Cloud Generation Recorded: Aug 1 2017 61 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Not All Endpoint Protection Platforms Are Created Equal Recorded: Jul 27 2017 60 mins
    Torry Campbell, Senior Director Product Management, Symantec
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Mitigate Threats with Context-aware Vulnerability Assessment and Risk Analysis Recorded: Jul 25 2017 60 mins
    Anand Visvanathan, Principal Product Manager, Symantec
    Most vulnerability management solutions do little to help security leaders put vulnerability and risk information in the context of business.

    Attend this webcast to learn about the newly released Symantec Control Compliance Suite Vulnerability Manager and how it can help you:

    • proactively identify security exposures

    • analyze business impact

    • plan and conduct remediation

    Register today!
  • Ensuring Data Protection with NIST Cybersecurity Framework Recorded: Jul 20 2017 32 mins
    Renault Ross, Chief Cybersecurity Business Strategist North America, Symantec
    When it comes to your data, regardless of your country or industry, you likely have compliance regulations to adhere to. We understand the challenges this can bring to your IT and compliance teams.

    Adopting the NIST Cybersecurity Framework (CSF) is one way that can help you achieve compliance with the many regulations you may be affected by. Developed in the United States, the CSF has been adopted by many organizations, including those in the international community with one example being the government of Italy, who has incorporated the Framework into its own National Framework for Cyber Security.

    Join us for a webcast hosted by Symantec Chief Cybersecurity Business Strategist, Renault Ross CISSP, MCSE, CHSS, CCSK, CISM as he dives into the CSF to:

    • Identify sensitive data, where it is and who is accessing it

    • Protect that data by establishing policies which prevent exposure

    • Detect threats to which could extrapolate data by several means

    • Respond to threats with automated actions

    • Recover after a threat to produce reports to prove compliance

    Register Today
  • Integrating Threat Isolation with SWG and SMG (10:00am PT / 1:00pm ET) Recorded: Jul 19 2017 32 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Integrating Threat Isolation with SWG and SMG (9:00am PT / 12:00pm ET) Recorded: Jul 14 2017 32 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Protecting Health Information with the NIST Cybersecurity Framework Recorded: Jul 13 2017 63 mins
    Jeff Marron, IT Security Specialist from NIST and Ken Durbin, CISSP, Strategist CRM and Threat Intel from Symantec
    Part 3 of 7: The NIST Cybersecurity Framework Healthcare Webinar Series

    WannaCry is the most recent ransomware attack to cripple healthcare systems internationally. And whether it’s ransomware or the next trending threat, HHS, in conjunction with other agencies and the industry, has established a working group with the goal of developing official cybersecurity guidance for the healthcare industry. It is expected the the NIST Cybersecurity Framework (CSF) will play a major role in this guidance.

    Join us as we continue our webinar series focused on the NIST CSF and its benefits for the healthcare industry.

    Our first two segments aimed to demystify the NIST CSF and provide insight into the first function, Identify. This webinar will focus on the PROTECT function of the NIST CSF, which ultimately puts the security in cybersecurity.

    Our experts discuss how the framework helps healthcare organizations limit, or contain, the impact of a cybersecurity event, focusing on the critical technology categories to support the PROTECT function of the NIST CSF.

    Key Learning Objectives:

    •Why HHS is leading the effort to develop healthcare industry guidance and how the NIST CSF is playing an integral role

    •What the NIST CSF is and why the PROTECT function is one of the most important areas of consideration

    •What the key desired outcomes of the PROTECT function include

    •Why a focus on people, processes, policies and technologies is critical to success

    •How awareness and training plays into the mix

    Register Today

    On-Demand Webinar Series:
    - Part 1 of 7: Demystifying NIST Cybersecurity Framework for Healthcare Series http://bit.ly/Part10209WebinarNIST

    - Part 2 of 7: Using the NIST Cybersecurity Framework to Identify Personal Health Information (PHI) http://bit.ly/Part20601NIST

    To view upcoming NIST Cybersecurity Framework for Healthcare Webinar Series Part 4-7 https://resource.elq.symantec.com/LP=4235
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How secure is your Office 365 deployment?
  • Live at: May 24 2016 5:00 pm
  • Presented by: Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
  • From:
Your email has been sent.
or close