Hi [[ session.user.profile.firstName ]]

Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning

5-Part Webinar Series: Endpoint Protection…what really matters?

Part 1 of 5: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning

Threats are becoming more sophisticated with new attacks becoming commonplace. These unknown threats can be devastating for an organization making endpoint protection more critical than ever. The best weapon in your endpoint protection arsenal to combat unknown threats is Machine Learning.

Join us to discover:

•How machine learning addresses unknown threats

•Why Symantec Endpoint Protection 14 machine learning is unique

•Where it fits in a layered solution

In addition to a lively discussion we’ll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don’t stand a chance.

Register Today
Recorded Jan 26 2017 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Diya, Systems Engineer, Symantec
Presentation preview: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
  • Channel
  • Channel profile
  • Extending Your Symantec Identity Solutions with Our Security Services Platform Aug 20 2020 5:00 pm UTC 60 mins
    Vadim Lander, CTO, Identity Security, Broadcom
    As you transition to Digital IAM, take stock of how you are using your Symantec Identity Security solutions today and how to extend them into the future. Broadcom has developed a security services platform that will do just that – allow you to implement IAM business services used to secure, manage, and provision access underpinned by a unified, cloud-native architecture of policy, risk, session, and analytics with a common data model.

    Join Vadim Lander to learn how these services seamlessly integrate with your existing solutions so that you can transition to Digital IAM while driving automation and security benefits.
  • Privileged Identity Management: Building a Zero Trust Organization Aug 6 2020 3:00 pm UTC 17 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    In the Forrester Report, “A Practical Guide to Zero Trust Implementation”, Forrester recommends that companies implement privileged identity management as part of their Zero Trust projects. However, some organizations may not see the connection between Zero Trust and PIM.

    In part 3 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss how PIM technologies help organizations achieve Zero Trust.

    They will also cover the “least privilege” model and wrap up this series with advice on best practices for implementing or enhancing PIM capabilities.
  • Aggressive and Unpredictable: The Threat Posed by North Korean Cyber Attackers Aug 5 2020 4:00 pm UTC 60 mins
    Dick O'Brien, Principal Research Editor Sylvester Segura, Threat Intelligence Analyst Javier Santoyo, Technical Director
    While no organization should assume that it is at low risk of a state-sponsored attack, this is doubly the case when it comes to North Korea-linked groups. While attackers linked to the country’s regime have been heavily involved in espionage-type attacks, they have branched out into destructive sabotage attacks and a range of financially motivated attacks. Organizations of all sizes may be potential targets and take steps to mitigate the risk of attack.

    Join Dick O’Brien, principal research editor, and Sylvester Segura, threat intelligence analyst, from Symantec’s Critical Attack Discovery and Intelligence team, along with Javier Santoyo, technical director for Symantec Endpoint Security, to learn about:
    • The North Korean cyber ecosystem
    • The varying motivations behind attacks by North Korean groups
    • A deep dive into the operations of Stonefly, a North Korean group heavily involved in stealing industrial and military secrets
    • How customers can best use Symantec products to protect themselves from these threats
  • Privileged Identity Management: What is Privilege and How is it Changing? Jul 30 2020 3:00 pm UTC 13 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    The concept of “privileged” has grown beyond traditional IT users. In many organizations, we now have business users with business roles that give them the ability to download an entire customer database from their CRM or Marketing Automation systems.

    In part 2 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss the need to redefine what it means to be “privileged” and what that means for your business.
  • Privileged Identity Management: Customer Challenges and Maturity Jul 23 2020 3:00 pm UTC 14 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    In recent years we have seen changes in how we view privileged identity management. Initially, the main emphasis was on securing root and reigning in the super admins; yet lately, we have seen virtual and cloud environments introduce new types of privileged accounts.

    In part 1 of this series, Merritt Maxim, VP, Research Director from Forrester, and Clayton Donley, VP of Symantec Identity Security will discuss:

    • Customer challenges associated with a dynamically changing environment
    • Emerging requirements not being addressed by PIM vendors today

    They will also provide insight into the maturity path that customers are facing.
  • How Enterprises Can Effectively Operate Zero Trust Environments Jul 21 2020 5:00 pm UTC 60 mins
    Manoj Sharma, Technical Director of Zero Trust, Symantec; Dr. Chase Cunningham, Principal Analyst, Forrester
    Join us as Dr. Chase Cunningham, Principal Analyst at Forrester, and Manoj Sharma, Technical Director at Symantec, discuss why zero trust is becoming an urgent priority for enterprises focused on protecting their users and data, and offer timely recommendations on how to build and operate a zero-trust architecture.

    Tune into this webinar to explore and get answers about:
    • What it really means to implement the zero trust model vs. traditional perimeter defenses
    • How security teams are operationalizing zero trust to enable cloud migration and remote workforce scenarios
    • How to assess your zero trust maturity and plan your own implementation journey

    *This session is eligible for CPE credits with ISC(2).
  • Webinar: Mudando a vida das pessoas em tempos de Pandemia Jul 21 2020 1:00 pm UTC 60 mins
    Alexandre Siqueira- HCL , Wagner Brunca - Broadcom.
    Webinar Language: Portuguese

    Transformação Digital - Mudando a vida das pessoas em tempos de Pandemia. Como a tecnologia pode literalmente transformar a vida das pessoas. Cenários reais e novas propostas trazendo inspiração para o novo normal.
  • How Symantec Detected and Prevented the WastedLocker Ransomware Attack Jul 16 2020 5:00 pm UTC 60 mins
    Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division
    Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.

    Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?

    Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET

    You will learn:
    - The details of these attacks
    - How Symantec discovered them
    - What you can do to protect your organization going forward
  • Navigating the Path to Digital Identity: Operationalize Security with SecDevOps Jul 16 2020 3:00 pm UTC 60 mins
    Vadim Lander, CTO, Identity Security, Broadcom
    The new IAM architecture is based on many micro-perimeters, each a single user, session, device or application. As a result, you need to integrate IAM into the fabric of your applications. How do we get there? You can’t wave a magic wand or issue a top-down mandate that changes all the rules overnight. Because the new Digital IAM needs to coexist with your existing IAM infrastructure, a managed transition is needed to bring identity services closer to the applications to operationalize management of identity & security.

    Join Vadim Lander for a deep dive on navigating the path to Digital IAM.
  • Securing the Digital Transformation with Symantec SASE Recorded: Jul 1 2020 47 mins
    Michael Mauch, Product Manager, Network Security Architecture, Symantec Enterprise Division, Broadcom
    Securing the Digital Transformation - especially with a large remote workforce - has never been more essential for today's organizations. Workers must remain productive wherever they are, but a poorly implemented solution will only add complexity and cost, eliminating many of the benefits of moving to the cloud.

    Security professionals are rapidly coalescing around a Secure Access Service Edge (SASE) approach to enable a successful digital transformation journey that delivers a smooth, low-latency connectivity which satisfies the needs of both users and those that are required to protect them.

    Please join, Michael Mauch, Product Manager, Network Security Architecture, Symantec Enterprise Division, Broadcom as he discusses:

    • The importance of SASE in your digital transformation journey
    • Best practices in deploying a SASE architecture to accelerate the
    adoption of cloud and mobile applications
    • How Symantec’s Integrated Cyber Defense Platform protects
    customer data, prevents attacks and optimizes security operations
  • Achieving Better ROI and TCO with your Endpoint Solution Recorded: Jun 25 2020 44 mins
    Chris Sherman, Senior Analyst, Forrester, Domingo Guerra, Head-Endpoint Security GTM and Archana Rajan, Head-PM, Symantec
    When it comes to solving endpoint challenges, one of the hardest problems is staying up-to-date on the right tools to defend against evolving threats. Harder yet, is unifying them into one seamless solution. For many CISOs, purchase decisions become an endless cycle of weighing costs against critical features and people required to operate them. In the end, there are always trade-offs, and often full protection is not achieved.

    In this webinar, our guest speaker and Forrester Senior Analyst, Chris Sherman, joins Symantec Head of Endpoint Security GTM, Domingo Guerra, and Head of Endpoint Security Product Management, Archana Rajan. Together, they will discuss the key building blocks required for the best endpoint protection today.
  • What’s Next for Cyber Security and Symantec? Recorded: Jun 23 2020 62 mins
    Art Gilliland, SVP and GM, Symantec Enterprise Division of Broadcom, Jon Oltsik, Senior Principal Analyst. ESG
    A lot has happened since Symantec was acquired by Broadcom but one constant is the evolving threat landscape and the need for even more advanced protection, detection and response. Symantec, as a division of Broadcom, has made a significant amount of progress since the acquisition and is more focused than ever to deliver on its strategy of integrated cyber defense, operational efficiency and customer driven innovation to meet the growing demands of cyber security.

    Join Art Gilliland, SVP & GM of the Symantec Enterprise Division of Broadcom and Jon Oltsik, Senior Principal Analyst from ESG, on June 23rd for an interactive, conversation about cyber security including:

    - Symantec’s progress since the Broadcom acquisition
    - Impact of COVID-19 on cyber security
    - An industry outlook on the post-pandemic era

    We look forward to this discussion and hope you will join us for the webinar and actively participate by submitting your questions and comments.
  • The Rise of the Decentralized Identity Platform: Ready for the Transition? Recorded: Jun 18 2020 59 mins
    Vadim Lander, CTO, Identity Security, Broadcom
    Our world of digital business is different today, yet some organizations have yet to embrace and capitalize on the disruption that has taken place thanks to mobility and digital transformation. A fresh approach is needed where IAM is integrated into the fabric of applications.

    Join Vadim Lander, to learn what is needed to bring identity services closer to your applications and transition to the new micro-perimeter environments to help enable the business while providing the necessary level of protection.
  • The What, Why and How of Implementing a Zero Trust Security Model Recorded: Jun 18 2020 60 mins
    Michael Dubinsky, Head of Product Management, Symantec Enterprise Division, Broadcom
    As organizations move to redesign their security architecture to a Zero Trust security model, some are struggling to prioritize the capabilities needed to achieve their desired Zero Trust outcomes, whilst not drowning in costs and complexity. Please join the Symantec Enterprise Division for a special webinar focused on how Symantec’s solutions can help implement a Zero Trust security model for your organization.

    During this webinar, Symantec will discuss:
    The main challenges that are solved by adopting a Zero Trust security model
    Why it’s crucial to prioritize and address these challenges today
    An overview of the Zero Trust scenarios and how Symantec's portfolio enables an end-to-end implementation while removing the cost and complexity barriers
  • シマンテックウェビナー – アイデンティティセキュリティ Recorded: May 28 2020 61 mins
    石尾 尚二郎

  • シマンテックウェビナー - エンドポイントセキュリティ Recorded: May 21 2020 60 mins
    シマンテックエンタープライズ部門 山内正
    -Symantec Endpoint Security Complete が提供する SOC (セキュリティ管理組織)向けのきわめて有用な機能群
    -実証済みのセキュリティをすべてのデバイスで活用し、シマンテックのポートフォリオとパートナーの提供ソリューションを統合させることによって、お客様の新たなレベルの運用効率と ROI 達成をご支援するシマンテックの取り組み
    -高度な漏えい防止機能、新しい脅威調査(Threat Hunting)機能、自動環境適応型機械学習など、シマンテックの継続的な研究開発
  • Delivering All Port & Protocols Network Protection to a Distributed Workforce Recorded: May 20 2020 51 mins
    Alex Campbell, Symantec Network Protection Product Manager; Tim Murphy, Symantec Network Protection Product Marketing
    Enterprises are depending on cloud services like never before to enable direct-to-net access
    for users outside of their traditional offices. Consequently, there are many new facets to the network edge—all of which must be secured. Security architects need solutions that increase infrastructure visibility and extend threat protection at all network edges, ensuring greater user protection from modern-day security threats. These solutions must be scalable, and maintain high performance standards, covering the Internet fully—securing all ports and protocols of traffic.

    The Symantec Network protection team will show you:
    ● The benefits of pushing security to the service edge
    ● Why you want a cloud-delivered Secure Web Gateway to orchestrate your security stack
    ● How a Cloud Firewall can enhance the protection of your remote users
    ● Techniques to speed your digital transformation

    We will also set aside time after the presentation to address any questions you have. Please register for our free webinar today to ensure live participation or a recording of the event.
  • Cyber-threats to Telcos: A Deep Dive into Attack Groups and Your Defense Plan Recorded: May 14 2020 40 mins
    Brigid O'Gorman, Senior Information Developer at Symantec, Heidi Shey, Principal Analyst at Forrester
    Over the course of 2019, Symantec’s attack investigations team identified at least 25 telecoms providers that were compromised by state-sponsored APT groups, with 18 groups actively targeting the sector in that timeframe. This could lead to serious consequences for organizations, impairing trust, and damaging reputation.

    Join Brigid O'Gorman, Senior Information Developer at Symantec, and guest speaker Heidi Shey, Principal Analyst at Forrester, to learn about:

    - The latest research about attack groups targeting telecoms firms
    - Tactics, tools, and procedures used by attackers
    - Security priorities, challenges, and budgets among global telecoms companies
    - Steps telcos need to take to protect their organizations and customer data
  • シマンテックウェビナー – 情報セキュリティ Recorded: May 12 2020 62 mins
    シマンテックエンタープライズ事業部 山内 正
    シマンテック製品をご愛用いただいている皆様にとっては、ブロードコムによるシマンテックの事業と技術の買収がどのような影響をもたらすか、疑問に感じる点もおありかと存じます。そこで 5月 12 日(火)午前 11 時に開催されるウェビナーへのご参加をお勧めいたします。このウェビナーでは「情報セキュリティ」ソリューションを中心に、以下のテーマについてご説明申し上げます。

    -「情報セキュリティ分野」でご提供するCloudSOC CASB、DLP、Secure Access Cloudに関するビジョンとその戦略、お客様のメリット

    - ゼロトラストに対するアプローチともたらすメリット(可視化の拡大、セキュリティの複雑さの軽減、ビジネスの成果の向上)
  • Symantec Innovation & Strategy Webinar Series: Your Questions Answered Part 2 Recorded: May 7 2020 59 mins
    Art Gilliland, Senior VP and GM, Symantec Enterprise Division of Broadcom and members of his leadership team
    Join Art Gilliland, SVP and GM, Symantec Enterprise Division of Broadcom, and members of his leadership team as they answer your top questions from our recent Innovation and Strategy webinar series. On this webinar, we will cover questions we didn’t have time to answer live during the series about Support, Licensing, and Partners.

    We look forward to connecting with you to answer your questions and provide further details on how Symantec is driving innovation and customer success.
Integrated Cyber Defense
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.

Visit: http://www.broadcom.com/products/cyber-security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Tackle Unknown Threats with Symantec Endpoint Protection 14 Machine Learning
  • Live at: Jan 26 2017 6:00 pm
  • Presented by: Chris Diya, Systems Engineer, Symantec
  • From:
Your email has been sent.
or close