Did you know that just opening a compromised web page could allow dangerous code to install on a PC or smartphone? You don’t have to click “accept” for a download or software update to install malware on your machines and trigger an infection and the consequences can be enormous.
Why you need to build 24 X 7 threat monitoring into your environment
Ransomware is an extremely profitable type of attack. It only takes one network-connected device to expand a malware infection and hold an entire organization hostage for profit. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.
- Learn from our cyber security experts about what can happen in a ransomware attack, based on real-life events.
-Understand how the malware entered the IT infrastructure of two different companies, and find out how long it stayed and the impact to these businesses.
-Will show you how attacks are identified and remediated, as well as some best practices for handling ransomware attacks, should one occur in your company.
Improve your line of defense against ransomware and minimize the loss of key data, money and intellectual property from your organization.
RecordedOct 18 201662 mins
Your place is confirmed, we'll send you email reminders
Andras Cser Vice President, Principal Analyst, Forrester and Salah Nassar, Director of Information Protection from Symantec
It’s called a ‘data breach’ for a reason. Bad actors are after your sensitive data. Users, endpoints, email, and cloud applications are communication channels that serve as attack vectors. In a ‘Zero Trust” model where you cannot trust anything in or out of your network: focusing the perimeter around the data and protecting it with intelligent authentication is the best security approach. Most authentication solutions on the market authenticate access to almost everything BUT your data. Organizations invest heavily in DLP policies to have visibility and protection around their sensitive data. In fact, organizations spend the majority of security resources around threat and data protection solutions to protect data. Blindly allowing users to access the data without checking their identity negates the entire security stack.
To implement “Zero Trust” successfully in your organization, the best products are the ones that give you the most visibility into who is accessing your data both on-premises and in the cloud. Before a user is granted access, all risk factors surrounding the user and their authenticating device needs to be evaluated. Other risk factors that compromise the level of assurance could be malware, bad IP addresses, malicious files and networks, or stolen credentials on the darknet. Simply put: protect your data and trust no one.
In this webinar, you will hear from guest speaker Andras Cser, VP and Principal Analyst on IAM and Fraud Management at Forrester and Salah Nassar, Director of Information Protection from Symantec break down the following:
•What are the components of Zero Trust?
•How to implement Zero Trust successfully in your organization.
•What are the important security solutions core to Zero Trust and why data protection and identity are central to this model
•What to look for in Zero Trust data-centric authentication vendor
Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.
In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.
Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.
In this session they’ll discuss:
•. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce
•. The increased complexity of managing full security stack with limited resources
•. The technical challenges of securing cloud applications
•. Cloud solutions that solve cloud problems
It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.
We highly encourage you to register and reserve your spot today.
Mike Chen, Director of Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.
Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?
In this webinar we'll discuss:
- Why you should embrace cloud-based network security
- The tools you need to provide protection against a variety of attacks
- Why a proxy belongs at the center of your cloud service
- Cloud migration strategies
- Integrations that orchestrate defenses across control points and attack vectors
Join us for a monthly customer dialog to learn about the latest Symantec Endpoint Protection(SEP) Mobile features and ask any product-related questions.
You will learn about:
- What new features are in the Symantec Endpoint Protection Mobile incident model
- End-user emails localization
- New Suspicious URLs tab
- New unwanted app conditions
- Symantec Web Security Service (WSS) integration
- Symantec Cloud Access Security Broker (CASB) integration
- And more
Vasant Kabra, Sr. Principal Software Engineer, Symantec and Curtis Barker, Product Portfolio Manager, Symantec
Container technologies are still a relatively small part of the overall cloud and application portability market, but that is changing. Use of containers is exploding at an estimated annual growth rate of 40%.
Containers provide some very compelling benefits especially in terms of speed and cost savings. But, like with any new tool, there are security concerns that must be addressed.
Join us for this special webcast on June 12 where we will discuss the security challenges that arise from using containers, how to assess the security of the container and container images in order to reap the full benefits of this exciting technology.
Today is the day that GDPR changes things substantially in protecting customer data, affecting businesses that handle, store or pass data of European Citizens both in and outside of Europe. It’s a huge undertaking with comprehensive and extensive compliance requirements and as it takes effect inevitably there will be stops and starts, legal and logistical challenges and hefty fines for non-compliance.
Jimmy Lin, Product Manager, Email Security.cloud, Symantec
Spear-phishing emails emerged as by far the most widely used infection vector in 2017, employed by 71 percent of targeted attack groups according to findings in our latest Internet Threat Security Report.
In this how-to session, we will demonstrate:
- How to optimize the configurations of your Email Security.cloud service to protect your organization.
- We will explain the benefits of the following technologies and how to enable them in your administration console ClientNet:
• SPF Authentication
• DMARC Authentication
• Business Email Scam Analyzer
• Email Impersonation Control
Al Cooley,Director Product Mgmt, Symantec / Meny Har, VP Product, Siemplify / Nimmy Reichenberg, CMO, Siemplify
Security operations teams are modern-day detectives, combing through clues to thwart cyberthreats. But the deluge of alerts from disparate technologies, manual processes and multiple consoles often hinder teams from building the story they need to respond to truly malicious activity.
Join Symantec and Siemplify on Wedensday, May 23, to see how intelligence-driven orchestration helps SOCs overcome these challenges by enabling deeper, higher quality investigations and expediting incident response.
During this session you’ll learn:
- The vital role context plays in security operations and how it powers incident investigation and response
- How threat intelligence and security orchestration provide deeper insights to streamline alert validation, incident prioritization and response
- How Siemplify and Symantec DeepSight Intelligence integrate, drive a standardized workflow and improve security incident response
Duncan Brown IDC, Ilias Chantzos, Sunil Choudrie and Giampiero Nanni,Symantec
With GDPR coming, businesses are endeavouring to change how they collect and use personal data with more accountable and compliant processes. However, the GDPR’s data breach notification requirements continue to present a challenge for many.
Join Duncan Brown, IDC and Ilias Chantzos, Senior Director, Global CIP and Privacy Advisor, Symantec and panel hosts to discuss
•Findings from the current IDC GDPR Assessment
•Gain practical advice on GDPR breach notification rules
•Guidance issued from European Data Protection Authorities
•Data transfers and how a breach can affect multiple locations and jurisdictions.
Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.
As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.
Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:
Monitor activity and security configurations
Control access and prevent risky changes or privileged misuse
Detect malicious insiders and compromised accounts
Keep S3 buckets private and secure confidential data with DLP
Defend S3 buckets from advanced malware threats
Doug Cahill, Senior Analyst and Group Director, ESG and Abhishek Srivastava, Sr. Director Product Management, Symantec
Enterprises migrating workloads from traditional data centers to Infrastructure-as-a-Service (IaaS) providers are discovering that a "lift-and-shift" approach to security doesn't work. Traditional on-premises security tools do not scale with workloads and storage in dynamic cloud environments or support the continuous integration and delivery (CI/CD) workflows central to modern DevOps practices. And while some workloads are well suited to the public cloud, others often remain on-premises or in private clouds, necessitating multiple security solutions and multiple consoles generating alerts. An efficient, single console security solution is needed to protect workloads and storage against advanced threats and malware across today's heterogeneous hybrid cloud environments.
What is a hybrid cloud and how is it different from securing a traditional data center?
Why is the development of applications for the cloud different and how does it impact security?
What are some solutions currently available for protecting my hybrid cloud workloads and how do they do it?
Axel Wirth, Distinguished Technical Architect, Symantec
Cybersecurity is earning its seat in the boardroom with so much attention on the impacts and destruction a cyber attack or incident can have on a hospital's bottom line, or even worse, a patient. Yet healthcare providers continue to lag behind other industries when it comes to investing in cybersecurity with 74% dedicating 6% or less to IT security. So what will it take to fill the gaps that are still looming when it comes to an organization's risk management strategy?
Join Axel Wirth, Distinguished Technical Architect, Symantec, as he shares key findings from HIMSS Analytics and Symantec's 2018 Healthcare IT Security & Risk Management Study.
- Healthcare's shift from a compliance mindset to a risk management approach.
- Which cybersecurity frameworks are gaining momentum within the industry and why.
- How healthcare IT leaders are addressing security while navigating the changing technology landscape to include cloud and medical devices.
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.
Anatomy of a Ransomware AttackDennis York, Lead Incident Response Investigator, Symantec and Darian Lewis, Senior Principal Security Analyst, Symantec[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]62 mins