Part 1 of 5: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning.
Join us to discover:
•How machine learning addresses unknown threats
•Why Symantec Endpoint Protection 14 machine learning is unique
•Where it fits in a layered solution
In addition to a lively discussion we’ll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don’t stand a chance.
RecordedJan 26 201732 mins
Your place is confirmed, we'll send you email reminders
As you transition to Digital IAM, take stock of how you are using your Symantec Identity Security solutions today and how to extend them into the future. Broadcom has developed a security services platform that will do just that – allow you to implement IAM business services used to secure, manage, and provision access underpinned by a unified, cloud-native architecture of policy, risk, session, and analytics with a common data model.
Join Vadim Lander to learn how these services seamlessly integrate with your existing solutions so that you can transition to Digital IAM while driving automation and security benefits.
In the Forrester Report, “A Practical Guide to Zero Trust Implementation”, Forrester recommends that companies implement privileged identity management as part of their Zero Trust projects. However, some organizations may not see the connection between Zero Trust and PIM.
In part 3 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss how PIM technologies help organizations achieve Zero Trust.
They will also cover the “least privilege” model and wrap up this series with advice on best practices for implementing or enhancing PIM capabilities.
Dick O'Brien, Principal Research Editor Sylvester Segura, Threat Intelligence Analyst Javier Santoyo, Technical Director
While no organization should assume that it is at low risk of a state-sponsored attack, this is doubly the case when it comes to North Korea-linked groups. While attackers linked to the country’s regime have been heavily involved in espionage-type attacks, they have branched out into destructive sabotage attacks and a range of financially motivated attacks. Organizations of all sizes may be potential targets and take steps to mitigate the risk of attack.
Join Dick O’Brien, principal research editor, and Sylvester Segura, threat intelligence analyst, from Symantec’s Critical Attack Discovery and Intelligence team, along with Javier Santoyo, technical director for Symantec Endpoint Security, to learn about:
• The North Korean cyber ecosystem
• The varying motivations behind attacks by North Korean groups
• A deep dive into the operations of Stonefly, a North Korean group heavily involved in stealing industrial and military secrets
• How customers can best use Symantec products to protect themselves from these threats
The concept of “privileged” has grown beyond traditional IT users. In many organizations, we now have business users with business roles that give them the ability to download an entire customer database from their CRM or Marketing Automation systems.
In part 2 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss the need to redefine what it means to be “privileged” and what that means for your business.
In recent years we have seen changes in how we view privileged identity management. Initially, the main emphasis was on securing root and reigning in the super admins; yet lately, we have seen virtual and cloud environments introduce new types of privileged accounts.
In part 1 of this series, Merritt Maxim, VP, Research Director from Forrester, and Clayton Donley, VP of Symantec Identity Security will discuss:
• Customer challenges associated with a dynamically changing environment
• Emerging requirements not being addressed by PIM vendors today
They will also provide insight into the maturity path that customers are facing.
Manoj Sharma, Technical Director of Zero Trust, Symantec; Dr. Chase Cunningham, Principal Analyst, Forrester
Join us as Dr. Chase Cunningham, Principal Analyst at Forrester, and Manoj Sharma, Technical Director at Symantec, discuss why zero trust is becoming an urgent priority for enterprises focused on protecting their users and data, and offer timely recommendations on how to build and operate a zero-trust architecture.
Tune into this webinar to explore and get answers about:
• What it really means to implement the zero trust model vs. traditional perimeter defenses
• How security teams are operationalizing zero trust to enable cloud migration and remote workforce scenarios
• How to assess your zero trust maturity and plan your own implementation journey
*This session is eligible for CPE credits with ISC(2).
Transformação Digital - Mudando a vida das pessoas em tempos de Pandemia. Como a tecnologia pode literalmente transformar a vida das pessoas. Cenários reais e novas propostas trazendo inspiração para o novo normal.
Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division
Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.
Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?
Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET
You will learn:
- The details of these attacks
- How Symantec discovered them
- What you can do to protect your organization going forward
The new IAM architecture is based on many micro-perimeters, each a single user, session, device or application. As a result, you need to integrate IAM into the fabric of your applications. How do we get there? You can’t wave a magic wand or issue a top-down mandate that changes all the rules overnight. Because the new Digital IAM needs to coexist with your existing IAM infrastructure, a managed transition is needed to bring identity services closer to the applications to operationalize management of identity & security.
Join Vadim Lander for a deep dive on navigating the path to Digital IAM.
Securing the Digital Transformation - especially with a large remote workforce - has never been more essential for today's organizations. Workers must remain productive wherever they are, but a poorly implemented solution will only add complexity and cost, eliminating many of the benefits of moving to the cloud.
Security professionals are rapidly coalescing around a Secure Access Service Edge (SASE) approach to enable a successful digital transformation journey that delivers a smooth, low-latency connectivity which satisfies the needs of both users and those that are required to protect them.
Please join, Michael Mauch, Product Manager, Network Security Architecture, Symantec Enterprise Division, Broadcom as he discusses:
• The importance of SASE in your digital transformation journey
• Best practices in deploying a SASE architecture to accelerate the
adoption of cloud and mobile applications
• How Symantec’s Integrated Cyber Defense Platform protects
customer data, prevents attacks and optimizes security operations
Chris Sherman, Senior Analyst, Forrester, Domingo Guerra, Head-Endpoint Security GTM and Archana Rajan, Head-PM, Symantec
When it comes to solving endpoint challenges, one of the hardest problems is staying up-to-date on the right tools to defend against evolving threats. Harder yet, is unifying them into one seamless solution. For many CISOs, purchase decisions become an endless cycle of weighing costs against critical features and people required to operate them. In the end, there are always trade-offs, and often full protection is not achieved.
In this webinar, our guest speaker and Forrester Senior Analyst, Chris Sherman, joins Symantec Head of Endpoint Security GTM, Domingo Guerra, and Head of Endpoint Security Product Management, Archana Rajan. Together, they will discuss the key building blocks required for the best endpoint protection today.
Art Gilliland, SVP and GM, Symantec Enterprise Division of Broadcom, Jon Oltsik, Senior Principal Analyst. ESG
A lot has happened since Symantec was acquired by Broadcom but one constant is the evolving threat landscape and the need for even more advanced protection, detection and response. Symantec, as a division of Broadcom, has made a significant amount of progress since the acquisition and is more focused than ever to deliver on its strategy of integrated cyber defense, operational efficiency and customer driven innovation to meet the growing demands of cyber security.
Join Art Gilliland, SVP & GM of the Symantec Enterprise Division of Broadcom and Jon Oltsik, Senior Principal Analyst from ESG, on June 23rd for an interactive, conversation about cyber security including:
- Symantec’s progress since the Broadcom acquisition
- Impact of COVID-19 on cyber security
- An industry outlook on the post-pandemic era
We look forward to this discussion and hope you will join us for the webinar and actively participate by submitting your questions and comments.
Our world of digital business is different today, yet some organizations have yet to embrace and capitalize on the disruption that has taken place thanks to mobility and digital transformation. A fresh approach is needed where IAM is integrated into the fabric of applications.
Join Vadim Lander, to learn what is needed to bring identity services closer to your applications and transition to the new micro-perimeter environments to help enable the business while providing the necessary level of protection.
Michael Dubinsky, Head of Product Management, Symantec Enterprise Division, Broadcom
As organizations move to redesign their security architecture to a Zero Trust security model, some are struggling to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, whilst not drowning in costs and complexity. Please join the Symantec Enterprise Division for a special webinar focused on how Symantec’s solutions can help implement a Zero Trust security model for your organization.
During this webinar, Symantec will discuss:
The main challenges that are solved by adopting a Zero Trust security model
Why it’s crucial to prioritize and address these challenges today
An overview of the Zero Trust scenarios and how Symantec's portfolio enables an end-to-end implementation while removing the cost and complexity barriers
Alex Campbell, Symantec Network Protection Product Manager; Tim Murphy, Symantec Network Protection Product Marketing
Enterprises are depending on cloud services like never before to enable direct-to-net access
for users outside of their traditional offices. Consequently, there are many new facets to the network edge—all of which must be secured. Security architects need solutions that increase infrastructure visibility and extend threat protection at all network edges, ensuring greater user protection from modern-day security threats. These solutions must be scalable, and maintain high performance standards, covering the Internet fully—securing all ports and protocols of traffic.
The Symantec Network protection team will show you:
● The benefits of pushing security to the service edge
● Why you want a cloud-delivered Secure Web Gateway to orchestrate your security stack
● How a Cloud Firewall can enhance the protection of your remote users
● Techniques to speed your digital transformation
We will also set aside time after the presentation to address any questions you have. Please register for our free webinar today to ensure live participation or a recording of the event.
Brigid O'Gorman, Senior Information Developer at Symantec, Heidi Shey, Principal Analyst at Forrester
Over the course of 2019, Symantec’s attack investigations team identified at least 25 telecoms providers that were compromised by state-sponsored APT groups, with 18 groups actively targeting the sector in that timeframe. This could lead to serious consequences for organizations, impairing trust, and damaging reputation.
Join Brigid O'Gorman, Senior Information Developer at Symantec, and guest speaker Heidi Shey, Principal Analyst at Forrester, to learn about:
- The latest research about attack groups targeting telecoms firms
- Tactics, tools, and procedures used by attackers
- Security priorities, challenges, and budgets among global telecoms companies
- Steps telcos need to take to protect their organizations and customer data
Art Gilliland, Senior VP and GM, Symantec Enterprise Division of Broadcom and members of his leadership team
Join Art Gilliland, SVP and GM, Symantec Enterprise Division of Broadcom, and members of his leadership team as they answer your top questions from our recent Innovation and Strategy webinar series. On this webinar, we will cover questions we didn’t have time to answer live during the series about Support, Licensing, and Partners.
We look forward to connecting with you to answer your questions and provide further details on how Symantec is driving innovation and customer success.
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.