Intelligent Endpoint Security: Why Taking A Modern Approach Matters
Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.
Join us for an interactive discussion and learn more about:
• How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection
• What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack
• Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems
• How risk assessment plays a role in strengthening your security to preempt future attacks
RecordedAug 4 201663 mins
Your place is confirmed, we'll send you email reminders
Part 4 of 4: National Cybersecurity Awareness Month (NCSAM)
Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems.
Will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe.
The releases of Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3 are almost here! Please join us for a special webcast on Tuesday, October 23 to learn all about these exciting new solutions.
We will discuss and demo some of the cool new features in IT Management Suite 8.5 such as time-critical management, endpoint quarantine, and automated vulnerability remediation and in Ghost Solution Suite 3.3 such as the new web console, smart wizards, and much more!
We will also have a discussion with a panel of early adopters who have already upgraded to IT Management Suite 8.5 so you can learn from their knowledge and experience.
Don't miss this great opportunity to get the latest information on IT Management Suite 8.5 and Ghost Solution Suite 3.3!
AJ Nash, Global Head, Cyber Intelligence Global Security Office, Symantec
Part 3 of 4: National Cybersecurity Awareness Month (NCSAM)
As the lines between our work and daily lives become increasingly blurred, it’s more important than ever to be certain that smart cybersecurity is integrated into our lives.
The focus will be on cybersecurity workforce education, training and awareness with specific focus on understanding adversary objectives and the best practices for thwarting some of the most common adversary actions.
Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
Its your job to secure email, sensitive data and apps in Office 365. Now What?
Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.
Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:
- Get the most out of your Office 365 instance by enhancing the security
- Understand what Microsoft offers and how Symantec compliments their security offering
- Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps
Paige Hanson, Chief of Identity Education, Symantec; Collin Robinson, National PTA & Larry Magid, CEO, ConnectSafely.org
Part 1 of 4: National Cybersecurity Awareness Month (NCSAM)
Kick off National Cybersecurity Awareness Month (NCSAM) with Symantec’s program partners, the National PTA and ConnectSafely to discuss the basic essentials the entire family can deploy to protect their homes against cyber threats.
Ken Durbin,CISSP Sr.Strategist,Global Gov't Affairs, Symantec & Robert Glaser, Sr. Mgr. Privacy, Deloitte & Touche LLP
Join us for a webinar on September 12th, as experts from Symantec and Deloitte discuss the impact of the first few months of GDPR. For two years, companies have had the May 25, 2018 GDPR date in the forefront of their planning. However, the scope of this game-changing policy has left over 80% of organizations feeling inadequately prepared.
In this webinar you will:
• Discover why protecting data is the best response to GDPR
•. Learn how the world is embracing GDPR since it's May 25th launch
•. Hear from industry experts on what to expect in the coming month
•. Ask questions and learn from your peers on best preparation and adaption practices
Andras Cser Vice President, Principal Analyst, Forrester and Salah Nassar, Director of Information Protection from Symantec
It’s called a 'data breach' for a reason. Bad actors are after your sensitive data. Users, endpoints, email, and cloud applications are communication channels that serve as attack vectors. In a "Zero Trust" model where you cannot trust anything in or out of your network: focusing the perimeter around the data and protecting it with intelligent authentication is the best security approach. Most authentication solutions on the market authenticate access to almost everything BUT your data. Organizations invest heavily in DLP policies to have visibility and protection around their sensitive data. In fact, organizations spend the majority of security resources around threat and data protection solutions to protect data. Blindly allowing users to access the data without checking their identity negates the entire security stack.
To implement Zero Trust successfully in your organization, the best products are the ones that give you the most visibility into who is accessing your data both on-premises and in the cloud. Before a user is granted access, all risk factors surrounding the user and their authenticating device need to be evaluated. Other risk factors that compromise the level of assurance could be malware, bad IP addresses, malicious files, and networks, or stolen credentials on the darknet. Simply put: protect your data and trust no one.
In this webinar, you will hear from guest speaker Andras Cser, VP and Principal Analyst on IAM and Fraud Management at Forrester and Salah Nassar, Director of Information Protection from Symantec break down the following:
•What are the components of Zero Trust?
•How to implement Zero Trust successfully in your organization.
•What are the important security solutions core to Zero Trust and why data protection and identity are central to this model.
•What to look for in Zero Trust data-centric authentication vendor.
Torry Campbell; Sr. Director, Enterprise Solutions and Javier Santoyo; Sr. Director, Global Security Intelligence
Security Operations Center (SOC) managers struggle to build teams with the right balance of skills and experience. A cyber security skills shortage and budget constraints are pushing managers to enhance the skills of tier 1 analysts and increase the productivity of tier 2 analysts.
In addition, tier 3 analysts are expensive and hard to retain, so organizations are looking for better ways incorporate the expertise of skilled threat hunters.
This webcast covers innovations in threat analytics and automation that enhances the efforts of analysts at each level.
Join us to learn how security teams
-Employ local and global telemetry to continuously improve attack and anomaly detection
-Find attack patterns with cloud-based analytics before attackers exfiltrate data
-Quickly convict unknown files with advanced content inspection and sandboxing
-Replicate the skills and best practices of expert analysts via automated artifact collection and threat hunting playbooks
In addition, we’ll demonstrate how Symantec Endpoint Detection and Response (EDR) allows
resource-constrained SOC teams to detect and respond advanced attacks more effectively.
Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.
In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.
Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.
In this session they’ll discuss:
•. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce
•. The increased complexity of managing full security stack with limited resources
•. The technical challenges of securing cloud applications
•. Cloud solutions that solve cloud problems
It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.
We highly encourage you to register and reserve your spot today.
Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.
Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?
In this webinar we'll discuss:
- Why you should embrace cloud-based network security
- The tools you need to provide protection against a variety of attacks
- Why a proxy belongs at the center of your cloud service
- Cloud migration strategies
- Integrations that orchestrate defenses across control points and attack vectors
Join us for a monthly customer dialog to learn about the latest Symantec Endpoint Protection(SEP) Mobile features and ask any product-related questions.
You will learn about:
- What new features are in the Symantec Endpoint Protection Mobile incident model
- End-user emails localization
- New Suspicious URLs tab
- New unwanted app conditions
- Symantec Web Security Service (WSS) integration
- Symantec Cloud Access Security Broker (CASB) integration
- And more
Vasant Kabra, Sr. Principal Software Engineer, Symantec and Curtis Barker, Product Portfolio Manager, Symantec
Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.
Containers provide some very compelling benefits especially in terms of speed and cost savings. But, like with any new tool, there are security concerns that must be addressed.
Join us for this special webcast on June 12 where we will discuss the security challenges that arise from using containers, how to assess the security of the container and container images in order to reap the full benefits of this exciting technology.
Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
Jimmy Lin, Product Manager, Email Security.cloud, Symantec
Spear-phishing emails emerged as by far the most widely used infection vector in 2017, employed by 71 percent of targeted attack groups according to findings in our latest Internet Threat Security Report.
In this how-to session, we will demonstrate:
- How to optimize the configurations of your Email Security.cloud service to protect your organization.
- We will explain the benefits of the following technologies and how to enable them in your administration console ClientNet:
• SPF Authentication
• DMARC Authentication
• Business Email Scam Analyzer
• Email Impersonation Control
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.
Intelligent Endpoint Security: Why Taking A Modern Approach MattersRobert Westervelt is a Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]63 mins