Hi [[ session.user.profile.firstName ]]

How to Gate, Watch and Guard your Sensitive Data Everywhere

The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

We will explain how Symantec technology addresses this approach and how you will benefit from:

•Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
•Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
•Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
Recorded Oct 27 2016 58 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sunil Choudrie, Global Solutions Manager, Deena Thomchick, Sr. Director Cloud Security & Linda Park, Sr. Product Manager
Presentation preview: How to Gate, Watch and Guard your Sensitive Data Everywhere
  • Channel
  • Channel profile
  • Safeguarding the Nation’s Critical Infrastructure Oct 23 2018 5:00 pm UTC 60 mins
    Part 4 of 4: National Cybersecurity Awareness Month (NCSAM)

    Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems.

    Will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe.

    Please Join Us, Register Today
  • Symantec Launches IT Management Suite 8.5 and Ghost Solution Suite 3.3 Oct 23 2018 3:00 pm UTC 60 mins
    Damon Covey, Sr. Director, Product Management, Symantec
    The releases of Symantec IT Management Suite 8.5 and Ghost Solution Suite 3.3 are almost here! Please join us for a special webcast on Tuesday, October 23 to learn all about these exciting new solutions.

    We will discuss and demo some of the cool new features in IT Management Suite 8.5 such as time-critical management, endpoint quarantine, and automated vulnerability remediation and in Ghost Solution Suite 3.3 such as the new web console, smart wizards, and much more!

    We will also have a discussion with a panel of early adopters who have already upgraded to IT Management Suite 8.5 so you can learn from their knowledge and experience.

    Don't miss this great opportunity to get the latest information on IT Management Suite 8.5 and Ghost Solution Suite 3.3!
  • It’s Everyone’s Job to Ensure Online Safety at Work Oct 18 2018 5:00 pm UTC 60 mins
    AJ Nash, Global Head, Cyber Intelligence Global Security Office, Symantec
    Part 3 of 4: National Cybersecurity Awareness Month (NCSAM)

    As the lines between our work and daily lives become increasingly blurred, it’s more important than ever to be certain that smart cybersecurity is integrated into our lives.

    The focus will be on cybersecurity workforce education, training and awareness with specific focus on understanding adversary objectives and the best practices for thwarting some of the most common adversary actions.

    Please Join Us, Register Today
  • Ask the Experts—Securing Data and Email in Office 365 Oct 17 2018 5:00 pm UTC 60 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • Millions of Rewarding Jobs: Educating For a Career in Cybersecurity Oct 10 2018 5:00 pm UTC 60 mins
    David Bradbury, Symantec Chief Security Officer / Christine Noyes, Tech Trek Cyber Security Instructor, AAUW / YearUp
    Part 2 of 4: National Cybersecurity Awareness Month (NCSAM)

    Join Symantec nonprofit partners YearUp and AAUW address ways to build the cyber security workforce and how to inspire students to seek highly fulfilling cybersecurity careers.

    Please Join Us, Register Today
  • Make Your Home a Haven for Online Safety Oct 3 2018 5:00 pm UTC 60 mins
    Paige Hanson, Chief of Identity Education, Symantec; Collin Robinson, National PTA & Larry Magid, CEO, ConnectSafely.org
    Part 1 of 4: National Cybersecurity Awareness Month (NCSAM)

    Kick off National Cybersecurity Awareness Month (NCSAM) with Symantec’s program partners, the National PTA and ConnectSafely to discuss the basic essentials the entire family can deploy to protect their homes against cyber threats.

    Please Join Us, Register Today
  • Learn How the World Continues to Respond to GDPR Recorded: Sep 12 2018 56 mins
    Ken Durbin,CISSP Sr.Strategist,Global Gov't Affairs, Symantec & Robert Glaser, Sr. Mgr. Privacy, Deloitte & Touche LLP
    Join us for a webinar on September 12th, as experts from Symantec and Deloitte discuss the impact of the first few months of GDPR. For two years, companies have had the May 25, 2018 GDPR date in the forefront of their planning. However, the scope of this game-changing policy has left over 80% of organizations feeling inadequately prepared.

    In this webinar you will:

    • Discover why protecting data is the best response to GDPR

    •. Learn how the world is embracing GDPR since it's May 25th launch

    •. Hear from industry experts on what to expect in the coming month

    •. Ask questions and learn from your peers on best preparation and adaption practices

    Register Today
  • Why Data-Centric Authentication is at the Heart of Zero Trust Recorded: Aug 28 2018 60 mins
    Andras Cser Vice President, Principal Analyst, Forrester and Salah Nassar, Director of Information Protection from Symantec
    It’s called a 'data breach' for a reason. Bad actors are after your sensitive data. Users, endpoints, email, and cloud applications are communication channels that serve as attack vectors. In a "Zero Trust" model where you cannot trust anything in or out of your network: focusing the perimeter around the data and protecting it with intelligent authentication is the best security approach. Most authentication solutions on the market authenticate access to almost everything BUT your data. Organizations invest heavily in DLP policies to have visibility and protection around their sensitive data. In fact, organizations spend the majority of security resources around threat and data protection solutions to protect data. Blindly allowing users to access the data without checking their identity negates the entire security stack.

    To implement Zero Trust successfully in your organization, the best products are the ones that give you the most visibility into who is accessing your data both on-premises and in the cloud. Before a user is granted access, all risk factors surrounding the user and their authenticating device need to be evaluated. Other risk factors that compromise the level of assurance could be malware, bad IP addresses, malicious files, and networks, or stolen credentials on the darknet. Simply put: protect your data and trust no one.

    In this webinar, you will hear from guest speaker Andras Cser, VP and Principal Analyst on IAM and Fraud Management at Forrester and Salah Nassar, Director of Information Protection from Symantec break down the following:

    •What are the components of Zero Trust?
    •How to implement Zero Trust successfully in your organization.
    •What are the important security solutions core to Zero Trust and why data protection and identity are central to this model.
    •What to look for in Zero Trust data-centric authentication vendor.
  • Optimize Cloud-based Analytics to improve SOC team Productivity Recorded: Aug 14 2018 50 mins
    Torry Campbell; Sr. Director, Enterprise Solutions and Javier Santoyo; Sr. Director, Global Security Intelligence
    Security Operations Center (SOC) managers struggle to build teams with the right balance of skills and experience. A cyber security skills shortage and budget constraints are pushing managers to enhance the skills of tier 1 analysts and increase the productivity of tier 2 analysts.

    In addition, tier 3 analysts are expensive and hard to retain, so organizations are looking for better ways incorporate the expertise of skilled threat hunters.

    This webcast covers innovations in threat analytics and automation that enhances the efforts of analysts at each level.

    Join us to learn how security teams

    -Employ local and global telemetry to continuously improve attack and anomaly detection

    -Find attack patterns with cloud-based analytics before attackers exfiltrate data

    -Quickly convict unknown files with advanced content inspection and sandboxing

    -Replicate the skills and best practices of expert analysts via automated artifact collection and threat hunting playbooks

    In addition, we’ll demonstrate how Symantec Endpoint Detection and Response (EDR) allows
    resource-constrained SOC teams to detect and respond advanced attacks more effectively.

    Register Today
  • Maturing DLP Programs with Symantec ICA Recorded: Aug 9 2018 11 mins
    Symantec and Bay Dynamics
    Whiteboard Case Study 180808
  • A CTO’s Perspective: Network Security for the Cloud Generation Recorded: Jul 25 2018 30 mins
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
    Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.

    In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session they’ll discuss:

    •. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce

    •. The increased complexity of managing full security stack with limited resources

    •. The technical challenges of securing cloud applications

    •. Cloud solutions that solve cloud problems

    It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Jun 20 2018 60 mins
    Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:

    - Why you should embrace cloud-based network security

    - The tools you need to provide protection against a variety of attacks

    - Why a proxy belongs at the center of your cloud service

    - Cloud migration strategies

    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
  • Explaining the value of the architecture within our Proxy? Recorded: Jun 19 2018 11 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Join Sunil Choudrie & Robert Arandjelovic ask they discuss architecture within Security Web Gateway
  • What impact the cloud has had on modern organisation and the security challenges Recorded: Jun 19 2018 7 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Join Sunil & Robert as they discuss modern-day security in this Ask the Expert series
  • How does our integrated cyber defence work with relation to web gateway Recorded: Jun 19 2018 7 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Join Robert Arandjelovic & Sunil Choudrie during this Ask the Expert session where they talk through cyber defence and web gateway
  • What role does the Security Web Gateway play in your proxy posture? Recorded: Jun 19 2018 5 mins
    Sunil Choudrie, Sr Manager Product Marketing & Robert Arandjelovic Product Marketing Director
    Symantec experts Sunil Choudrie & Robert Arandjelovic talk through Security Web Gateway during this Ask the Expert video.
  • Symantec Endpoint Protection Mobile Product Updates - June 2018 Recorded: Jun 12 2018 32 mins
    Maya Mandel VP of Product, Symantec
    Join us for a monthly customer dialog to learn about the latest Symantec Endpoint Protection(SEP) Mobile features and ask any product-related questions.

    You will learn about:

    - What new features are in the Symantec Endpoint Protection Mobile incident model
    - End-user emails localization
    - New Suspicious URLs tab
    - New unwanted app conditions
    - Symantec Web Security Service (WSS) integration
    - Symantec Cloud Access Security Broker (CASB) integration
    - And more

    Register Today
  • Securing Containers with Symantec Control Compliance Suite Recorded: Jun 12 2018 49 mins
    Vasant Kabra, Sr. Principal Software Engineer, Symantec and Curtis Barker, Product Portfolio Manager, Symantec
    Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.

    Containers provide some very compelling benefits especially in terms of speed and cost savings. But, like with any new tool, there are security concerns that must be addressed.

    Join us for this special webcast on June 12 where we will discuss the security challenges that arise from using containers, how to assess the security of the container and container images in order to reap the full benefits of this exciting technology.
  • GDPR: The Importance of Looking Beyond 25 May, 2018 Recorded: May 25 2018 61 mins
    Robert Arandjelovic, Giampiero Nanni
    Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
  • How Can Your Organization Safeguard Against Phishing Emails? Recorded: May 24 2018 27 mins
    Jimmy Lin, Product Manager, Email Security.cloud, Symantec
    Spear-phishing emails emerged as by far the most widely used infection vector in 2017, employed by 71 percent of targeted attack groups according to findings in our latest Internet Threat Security Report.

    In this how-to session, we will demonstrate:

    - How to optimize the configurations of your Email Security.cloud service to protect your organization.

    - We will explain the benefits of the following technologies and how to enable them in your administration console ClientNet:

    • SPF Authentication
    • DMARC Authentication
    • Business Email Scam Analyzer
    • Email Impersonation Control

    Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Gate, Watch and Guard your Sensitive Data Everywhere
  • Live at: Oct 27 2016 4:00 pm
  • Presented by: Sunil Choudrie, Global Solutions Manager, Deena Thomchick, Sr. Director Cloud Security & Linda Park, Sr. Product Manager
  • From:
Your email has been sent.
or close