Hi [[ session.user.profile.firstName ]]

Risk Insight – An Actionable Approach For Your Security Posture

Determining the effectiveness of your security posture is fraught with challenges. You have products in place, but how do you make sense of all the data. And how do you balance the day-to-day operations with the need to proactively improve your security posture?

Learn how Risk Insight can help you gain the insight you need:

· Communicate to executive leadership a 360 degree view of your security posture compared to your industry peers

· Investigate using granular data analysis to identify your most vulnerable endpoints, riskiest users, and more

· Utilize automated reports from data already available in your environment

In addition we’ll show you Risk Insight in action, with a demo that showcases the power of the analytics and the simplicity of the interface.

Watch On-Demand Any Time
Recorded Mar 3 2017 23 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Marcelo Oliveira, Sr. Director of Product Management, Symantec
Presentation preview: Risk Insight – An Actionable Approach For Your Security Posture
  • Channel
  • Channel profile
  • We’re on Your Cloud Journey: Symantec Endpoint Security May 27 2021 6:00 pm UTC 60 mins
    Adam Licata, Director Endpoint Product Management, Symantec Endpoint Security, Broadcom
    As the drive to cloud adoption continues to accelerate, Symantec Endpoint Security is streamlining the path for those enterprises on the journey. Join us for a webinar with Endpoint Product Management Director Adam Licata, Thursday, May 27, 2021, 11 am PST, to learn more about our expanded Endpoint Security cloud features. In this session, you will:

    • Learn about the most important new features recently released on our Endpoint cloud console
    • Find out how you can use them to defend against today’s increasingly aggressive attacks
    • See a demo of how they enhance protection, simplify detection and response and integrate with SEP Mobile and more.

    Our Speaker
    Adam Licata, Director Endpoint Product Management, Symantec Endpoint Security, Broadcom
  • Endpoint Security: See More, Find More, Do More May 13 2021 6:00 pm UTC 60 mins
    Bill Bowles III, Client Services Consultant, Symantec Endpoint Security, Broadcom
    Discover the Rich Capabilities in Symantec EDR

    In these days of growing threats and increasing demands on your time in the SOC, are you looking for ways to get more value out of your Symantec Endpoint Detection and Response (EDR) feature? Join us for a webinar on Thursday, May 13, 2021, 11 am PST, for a live demo and talk where Client Services Consultant Bill Bowles will share his special tips and tricks for maximizing your time and increasing your effectiveness when using Symantec EDR. You will:

    • Learn about the integration between our Targeted Attack Analytics tool and EDR with a demo of how it can help with detection and response to aggressive attacks such as SolarWinds.
    • Find out how to query the Endpoint directly as well as the dataset provided by EDR for evidence of compromise.

    Our Speaker
    Bill Bowles III, Client Services Consultant, Symantec Endpoint Security, Broadcom
  • Is Mobile a Weak Link in Your Endpoint Protection? Apr 29 2021 6:00 pm UTC 45 mins
    Devyn Prasad, Product Manager, Symantec Endpoint Security Mike Soto, Mobile Product Engineer, Symantec Endpoint Security
    Now that work from home has become a regular routine, mobile devices are playing an even more critical role in business. At the same time, mobile has increasingly become an attractive target for malicious actors. Join us in a webinar on April 29, 2021, 11 am PT, with Symantec Mobile Engineers Mike Soto and Devyn Prasad who will discuss the key factors every enterprise should consider when building their mobile defense. In this session, you will:

    • Find out why skipping mobile protection in your security plan is not an option
    • Learn why you need mobile technologies that protect against a wide range of mobile threats without sacrificing employee productivity
    • Hear the details of the important elements of a robust mobile defense
    • See a real-world attack illustrating what can happen if a malicious actor successfully pulls off an attack

    Our Speakers
    Devyn Prasad, Product Manager, Symantec Endpoint Security
    Mike Soto, Mobile Product Engineer, Symantec Endpoint Security
  • Securing the Future of Remote Work with CloudSOC Mirror Gateway Apr 28 2021 5:00 pm UTC 60 mins
    Dori Varas, Senior Product Management, Stephen Hearty, Senior Product Marketing
    In your rush to get employees up and running from home, did you have time to optimise the security experience? The future of remote work is here to stay and it’s essential that all your employees have a secure way to access cloud services.

    Discover how Symantec CloudSOC Mirror Gateway provides high level security on unmanaged devices without needing an agent or the use of reverse proxy technologies.

    Join us for a special webinar as we address:

    - The challenges with providing secure access for unmanaged devices (BYOD) and the limitations of Reverse Proxy.
    - What is CloudSoc Mirror Gateway, how it secures cloud access for your remote workforce, and the benefits to your organization.
    - How to implement a data centric Zero Trust security solution that secures the future of remote working.
  • Zero Trust – How it Works Apr 27 2021 3:00 am UTC 55 mins
    Vadim Lander, Identity Security CTO & Distinguished Engineer
    In his first webinar in his Zero Trust series, Vadim Lander described the complete picture of a Zero Trust environment – the ultimate goal. In this webinar Vadim will go into detail of how it works in the context of API infrastructure with continuous analytics and authorization within every session. He will also cover how to bring it into your traditional IAM environment so it can benefit too.
  • Extended Detection and Response (XDR): The Promise. The Potential. The Journey. Recorded: Apr 22 2021 59 mins
    Dave Gruber, Senior Analyst, Enterprise Strategy Group, Adam Licata, Director Product Management Endpoint Security, Symantec
    The promise of Extended Detection and Response (XDR) is significant—cyber security companies across the globe are jumping on the XDR bandwagon, with many repositioning existing offerings as XDR products. But with so many XDR offerings available, which solution is the right fit for your organization?

    Dave Gruber of the Enterprise Strategy Group (ESG) and Adam Licata of Symantec explore what XDR is, what different approaches to XDR exist, and ESG research showing how security teams want to adopt it.

    Join us for a special webinar as we fact-check the state of XDR:

    - What is XDR and what value can it deliver?
    - XDR today vs. the future potential of XDR
    - Breaking down of XDR and its core capabilities
    - Symantec’s approach to enabling XDR
  • Delivering on Outcomes of XDR: Threat Analytics and Visualization Recorded: Apr 21 2021 61 mins
    Kyle Black, Technical Director Jeremy Follis, Technical Director, Network Security
    Extended Detection and Response (XDR) helps drive stronger security and faster response times, if as promised, it enables your security operations center to focus on mitigating the most urgent threats. How? Collecting telemetry across all control points, normalizing it, and then applying analytics to uncover trends in malicious events, user behavior, or network anomalies. Delivering that deeply rich correlated and aggregated intelligence to your security operations team in a simple and visual way allows your team to quickly respond to previously unknown risks. XDR drives efficiencies, allowing your Level 1 security analyst to do Level 2 work by connecting the dots for them.

    Join us on April 21, 9 am PT (12pm ET) for a special webinar with Kyle Black and Jeremy Follis of Symantec at Broadcom, as they talk in-depth about threat analytics and visualization.
    • What is XDR and how does it help the Security Operations Center (SOC)?
    • What security telemetry is collectable and how important is data normalization?
    • What types of threat analyses can be done automatically and what’s the net result?
    • Why is tracking user and device behavior critical to threat detection?
    • How does visualizing threat analytics help a security analyst?
  • Endpoint Security: Hunt Down and Stop Stealthy Attacks Recorded: Apr 20 2021 58 mins
    Vikram Thakur, Technical Director, Symantec Endpoint Security
    When setting priorities on where to focus limited resources, SOC teams often lack context to identify clues that may reveal a critical attack unfolding in their environments. Join us for a webinar led by Technical Director Vikram Thakur, who will talk about how Symantec’s Threat Hunters utilizes in-house analytics to assist SOCs in contextualizing and responding to such attacks. Through the discussion, you will:

    • Learn more about the types of analytics that are critical for making sense of alerts and incidents emerging from your network
    • Find out how data is evaluated in the greater context of your vertical or geolocation to expose more and improve the quality of your threat research
    • Discover how threat hunters assess and notify you with enriched incident details
    • Listen to examples of how the Symantec Threat Hunter feature has helped enterprises to expose and put a stop to evolving attacks.

    Our Speaker
    Vikram Thakur, Technical Director, Symantec Endpoint Security
  • Threat Intelligence from Symantec Endpoint Security Complete Recorded: Apr 15 2021 51 mins
    Adam Licata, Director Endpoint Security Product Management and Kevin Haley, Director, Symantec Security Response
    The process of sifting through clues about threats in your environment is often manual and time-consuming. It’s something you’d like to shortcut, especially when an attack could be at your doorstep.

    Join us for a webinar with Endpoint Product Management Director Adam Licata, and Director Security Response Kevin Haley, Thursday, April 15, 2021, 11 am PST, to learn about our new Threat Intelligence API, available through Symantec Endpoint Security (SES) Complete. The new feature jumpstarts the research process, putting Symantec’s Global Intelligence Network (GIN) at your fingertips – on a platform you probably already use.

    In this session, you will:

    • Find out about how you can use real-time threat enrichment to accelerate investigations
    • Learn more about our integrations with other TIPs, SIEMs and SOARs.
  • Endpoint Security is Mission Critical Recorded: Apr 14 2021 60 mins
    Adam Bromwich, VP and GM, Symantec Endpoint Security, Broadcom
    Global cyber threats have become increasingly aggressive, and enterprises are experiencing living-off-the-land and supply chain attacks at a staggering rate. Join us for a webinar with VP and GM of Endpoint Security Adam Bromwich, Wednesday, April 14, 1 pm AEST/11 am SGT, to learn more about how Symantec has been flexing its engineering muscle to counter these attacks and laying plans for further R&D investment in 2021. In this session, you will find out about:

    • Endpoint portfolio enhancements that strengthen defenses against crippling attacks
    • Our vision for the Endpoint Security portfolio in 2021 and beyond

    Our Speaker
    Adam Bromwich, VP and GM, Symantec Endpoint Security, Broadcom
  • Endpoint Security: Bolster Defenses Against Stealthy Attacks! Recorded: Apr 1 2021 57 mins
    Roi Abitboul, Head of Threat Defense, Symantec Endpoint Security, Broadcom
    Active Directory (AD) is the threat actor’s chosen attack vector. As the most widely used service for managing and controlling resources in an enterprise, AD provides complete visibility into where the sensitive data lives and who has permission to access it. Join us in a webinar, April 1, 2021, 11 am PST, where Head of Threat Defense Roi Abitboul discusses the challenges of protecting this highly vulnerable IT asset. You will:

    • Learn how you can address stealthy attacks by containing attackers, disrupting their reconnaissance and preventing them from using AD to move laterally to other assets
    • Discover how you can greatly reduce time, effort, and error in containing breaches on the endpoint.
    • View a live demo of Symantec’s Threat Defense for Active Directory feature and see how you can protect your organization against stealthy attacks.

    Our Speaker
    Roi Abitboul, Head of Threat Defense, Symantec Endpoint Security, Broadcom
  • Delivering on Outcomes of XDR: Cross-Control Point Visibility Recorded: Mar 31 2021 61 mins
    Kyle Black, Technical Director, Symantec and Jeremy Follis, Technical Director Network Security, Symantec
    Extended Detection and Response (XDR) holds great promise for enterprise customers. A holistic XDR approach integrates and controls all control points—laptops, mobile devices servers, cloud, network, identities, and even third-party products.
    Join us on March 31, 9 am PT (12pm ET) for a special webinar with Kyle Black and Jeremy Follis of Symantec, a Division of Broadcom, as they talk in-depth about cross-control point visibility.
    • What is cross-control point visibility and why is it important?
    • What control points are the most crucial to monitor?
    • What role does Network Detection and Response play in XDR?
    • What data is collectable and how important is data normalization?
    • How can information from one control point help another?
  • Zero Trust – How it Works Recorded: Mar 25 2021 56 mins
    Vadim Lander, Identity Security CTO & Distinguished Engineer
    In his first webinar in his Zero Trust series, Vadim Lander described the complete picture of a Zero Trust environment – the ultimate goal. In this webinar Vadim will go into detail of how it works in the context of API infrastructure with continuous analytics and authorization within every session. He will also cover how to bring it into your traditional IAM environment so it can benefit too.
  • Endpoint Security: Hunt Down and Stop Stealthy Attacks Recorded: Mar 18 2021 59 mins
    Vikram Thakur, Technical Director, Symantec Endpoint Security
    When setting priorities on where to focus limited resources, SOC teams often lack context to identify clues that may reveal a critical attack unfolding in their environments. Join us for a webinar led by Technical Director Vikram Thakur, March 18, 2021, 11 am PT who will talk about how Symantec’s Threat Hunters utilizes in-house analytics to assist SOCs in contextualizing and responding to such attacks. Through the discussion, you will:

    • Learn more about the types of analytics that are critical for making sense of alerts and incidents emerging from your network
    • Find out how data is evaluated in the greater context of your vertical or geolocation to expose more and improve the quality of your threat research
    • Discover how threat hunters assess and notify you with enriched incident details
    • Listen to examples of how the Symantec Threat Hunter feature has helped enterprises to expose and put a stop to evolving attacks.

    Our Speaker
    Vikram Thakur, Technical Director, Symantec Endpoint Security
  • Endpoint Security is Mission Critical Recorded: Mar 4 2021 61 mins
    Adam Bromwich, VP and GM, Symantec Endpoint Security, Broadcom
    Global cyber threats have become increasingly aggressive, and enterprises are experiencing living-off-the-land and supply chain attacks at a staggering rate. Join us for a webinar with VP and GM of Endpoint Security Adam Bromwich, Thursday, March 4, 11 am PST, to learn more about how Symantec has been flexing its engineering muscle to counter these attacks and laying plans for further R&D investment in 2021. In this session, you will find out about:

    • Endpoint portfolio enhancements that strengthen defenses against crippling attacks
    • Our vision for the Endpoint Security portfolio in 2021 and beyond

    Our Speaker
    Adam Bromwich, VP and GM, Symantec Endpoint Security, Broadcom
  • Extended Detection and Response (XDR): The Promise. The Potential. The Journey. Recorded: Feb 24 2021 60 mins
    Dave Gruber, Senior Analyst, Enterprise Strategy Group, Adam Licata, Director Product Management Endpoint Security, Symantec
    The promise of Extended Detection and Response (XDR) is significant—cyber security companies across the globe are jumping on the XDR bandwagon, with many repositioning existing offerings as XDR products. But with so many XDR offerings available, which solution is the right fit for your organization?

    Dave Gruber of the Enterprise Strategy Group (ESG) and Adam Licata of Symantec explore what XDR is, what different approaches to XDR exist, and ESG research showing how security teams want to adopt it.

    Join us on February 24, 8 am PT (11am ET) for a special webinar as we fact-check the state of XDR:

    - What is XDR and what value can it deliver?
    - XDR today vs. the future potential of XDR
    - Breaking down of XDR and its core capabilities
    - Symantec’s approach to enabling XDR
  • Getting Hit with Targeted Attacks? Symantec Endpoint Behavioral Isolation Recorded: Feb 18 2021 54 mins
    Mark Gentile, Chief Architect, Aryiro Toan, Endpoint PM, Liam O'Murchu, Director, Security Technology & Response, Symantec
    Punch Up Protection with Symantec Behavioral Isolation -- Now

    With the recent rise of targeted attacks, attack surface reduction has become a critical part of every company's cyber security strategy. This powerful security technique uses intelligent rules to block attackers seeking to paralyze critical operations. Join us for this webinar on Thursday, February 18, 2021, 11 am PST, where Symantec’s Endpoint Security Chief Architect Mark Gentile and Endpoint Product Manager Aryiro Toan will talk about:

    • Why attack surface reduction is a necessary component of your endpoint protection strategy
    • How you can identify risky behaviors and block them
    • What Symantec is doing to enhance its full-feature endpoint offering and make it even easier to keep the bad guys out

    Our Speakers:
    - Mark Gentile, Chief Architect, Endpoint Security Solutions, Symantec Endpoint Security, Broadcom
    - Aryiro Toan, Endpoint Product Manager, Symantec Endpoint Security, Broadcom
    - Liam O'Murchu, Director, Security Technology & Response, Broadcom
  • Demystifying SASE and Creating a Foundation for Your Digital Transformation Recorded: Jan 21 2021 61 mins
    Michael Dubinsky, Head of Cloud Network Security Product Management; Manoj Sharma, Leader of Symantec Technical Director Org
    Many enterprises are embracing an all-in approach to digital transformation as prescribed in the SASE framework, while others want to adopt SASE but don’t know where to begin and need to do it at a measured pace. Others yet aren’t concerned about what you call it - they simply need to support a new remote working paradigm.

    Fortunately, wherever they are in SASE maturity, there is a set of SASE truths that everyone needs to understand. Symantec has embraced SASE principles long before they had a name, and our subject matter experts understand these SASE truths as well as anyone.

    Join Michael Dubinsky, Head of Product for Symantec Cloud Network Security Solutions and Manoj Sharma, Leader of Symantec Technical Director Organization as they provide insight into:

    • Core use cases where adopting SASE can help you today
    • Implementation strategies that maximize performance while reducing user friction
    • The single platform approach and what other vendors aren’t telling you
    • SASE maturity and finding the right path for your digital transformation
    • A live demonstration of Symantec SASE capabilities

    We will also set aside time after the presentation to address any questions you have.
  • Enhanced Application Visibility and Control with your Secure Web Gateway Recorded: Jan 19 2021 54 mins
    Matt Willden, Intelligence Services Product Manager, and Tim Murphy, Network Security Product Marketing, from Symantec
    Whether it’s WebEx, LinkedIn, GitHub, or a number of other SaaS applications, it’s becoming hard to imagine how we were once productive without them. However, there can be enormous risk if representatives of a company have unfettered access to these applications. Collaboration apps shouldn’t become unsupervised channels for information exchange. There can be an implied company endorsement when an employee “likes” social media content. Data leakage can happen when developers share information. While leading CASB solutions, like Symantec CloudSOC, can provide deep and broad control over a wide universe of applications, don’t overlook the functionality that can be delivered with your Symantec Secure Web Gateway (SWG).

    Join Matt Willden, Network Security Product Manager as we demonstrate our latest SWG enhancements and look at:
    • How your SWG can detect more than 35,000 applications that might be running on your network
    • How to control those 35,000+ applications individually or collectively with controls for more than 250 application groups
    • Applying security and compliance metadata for better policy governance
    • Controlling specific activities for nearly 200 popular Collaboration, Social Media, and Developer applications

    It’s not a full CASB. But if you spend some time, you just might find, you get what you need.

    Register today, invite a friend and stick around till the end so we can answer your questions.
  • "Don’t Surf, Don’t Click!” The Better Way to Access Websites and Download Files Recorded: Jan 19 2021 57 mins
    Sunil Choudrie, Product Strategy and Chris Newman, Product Manager, Symantec, Richard Hosgood, Dir. Engineering, Votiro
    Now, more than ever, you have to trust your workforce. To support remote teams, organizations are making greater use of web-based applications, systems, and content portals. But trust alone isn’t enough to keep employees—and the organization—safe. Webpages carry risk of malware delivered through browser exploits, and can flip from good to bad in an instant. Even if the page is good, the contents may carry risk (e.g. web email or social media). And that’s before we even think about weaponized files that users might download from the web!

    Telling your staff to not use the web or download files impacts both business productivity and morale. Instead, find out how they can safely browse the web and download files without risk of breach.

    Join this webinar to learn:
    • What webpage and file download risks you need to be most concerned about in 2021
    • How Symantec Web Isolation keeps users safe
    • The options available to design Isolation into your security system
    • How Votiro technology integrates with Symantec Isolation to sanitize file downloads
Integrated Cyber Defense
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.

Visit: http://www.broadcom.com/products/cyber-security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Risk Insight – An Actionable Approach For Your Security Posture
  • Live at: Mar 3 2017 5:30 pm
  • Presented by: Marcelo Oliveira, Sr. Director of Product Management, Symantec
  • From:
Your email has been sent.
or close