Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products, Symantec
Data, devices, applications are no longer confined to the traditional perimeter. They now co-exist on-premises and in the cloud, and enterprises are scrambling to secure this new operating environment. Not surprisingly, Symantec’s 2017 Internet Security Threat Report (ISTR) identified that the number of sophisticated attacks targeting enterprises across the network and the cloud is on the rise.
Join us for our webinar “Putting the Power of Proxy to Work” to learn how:
- Enterprises use Secure Web Gateway’s unique proxy capabilities to improve threat prevention and data security as they move to the cloud
- Cloud-delivered security services can protect your remote employees, enabling a secure and compliant “direct-to-net” network architecture when adopting cloud apps like Office 365
- A defense-in-depth approach to combatting malware provides high levels of detection with extremely low false positives, easing the operational burden on your security organization
Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.
This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.
Join us to discover how you can:
· Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention
· Gain enhanced visibility into suspicious activity across your endpoint estate
· Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc
In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.
Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?
Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.
Join us to learn how to enable safe cloud adoption while maintaining compliance.
• How to address security and compliance challenges when migrating to the cloud
• How to support GDPR compliance in the cloud
• Leverage a single data protection solution for email, storage, network, endpoints, and cloud
Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec
On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.
It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.
The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.
The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.
Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:
1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.
2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.
3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.
Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.
The threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have lead to operational complexity for organizations who face a severe shortage of skilled IT security personnel.
Learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
Matt Mosley, Director of Product Management, CSS and Antonio Forzieri, Global Practice Lead, CSS from Symantec
Every cybersecurity organization is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.
New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.
How does your Security Operations Center (SOC) keep up?
Join us to learn how to scale and extend the capabilities of your SOC.
We’ll review topics such as:
- Automated security event analysis
- Human security event analysis and prioritization
- Threat visibility across key on-premise and cloud control points
- Consumption of technical and strategic threat intelligence
Tim Murphy, Sr. Manager, Network Product Marketing, Symantec and Bob Blair, Sr. Systems Engineer, SSL Visibility, Symantec
Google recently announced that 71 of the top 100 sites are now using HTTPS, nearly double from a year ago. Accelerated adoption of strong encryption practices, including TLS 1.3, is good for consumers and enterprises alike. However, highly secure encryption also presents challenges for security professionals. SSL/TLS encryption is also becoming popular with cybercriminals, looking to hide malware and other advanced threats. Consequently, without a solution that enables secure inspection, many network security tools that address advanced threats will be blind to them. Join us in this webcast where we’ll look at:
-Challenges of intercepting TLS traffic while maintaining high security
-The Impact of TLS 1.3 and importance of preserving session integrity
-Benefits of centralized encrypted traffic management
-Architectural considerations before you deploy
Ken Durbin, CISSP Strategist, CRM & Threat Intel, Symantec and Geoff Cooke, Virtual CISO Services Consultant, CynergisTek
Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series
The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.
Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environments, and the impact it has provided.
To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235
Timothy Chiu - Senior Director of Product Marketing, Symantec
Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.
Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.
In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.
Key Learning Objectives:
•Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks
•Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.
•Learn how to boost productivity for businesses without incurring any additional risk.
Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.
In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
The last year has been dominated by costly attacks, newsworthy breaches ransomware and economic espionage. Cybercrime has gotten bigger and bolder and the financial rewards have gotten much bigger. Cyber attacks have started to become a regular occurrence in the news,. This webcast will review
• Review the threat landscape of 2017
• Who or what has been to blame in these ransomware and cyber attacks
• What lessons can you the security professionals take from the year
• What solutions can help secure you as we move into 2018.
Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).
On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.
Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
-Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
-Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
-Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
-Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.