Hi [[ session.user.profile.firstName ]]

Preventing Ransomware Infections via Office 365 is New Territory. Now What?

The move to cloud applications such as Office 365 has brought many benefits, but has also come with a price Organizations have lost security visibility and control.(1 min 39 sec.video)
Recorded Feb 15 2019 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Symantec
Presentation preview: Preventing Ransomware Infections via Office 365 is New Territory. Now What?
  • Channel
  • Channel profile
  • Explore the Benefits of Endpoint Detection and Response Tools and Services Jul 18 2019 5:00 pm UTC 58 mins
    Jon Oltsik, Sr. Analyst, ESG and Bob Shaker, Adam Glick and Steve Meckl from Symantec
    Plagued by sophisticated threats, increasing workloads, and an ever-expanding attack surface, security teams are turning to Endpoint Detection & Response (EDR) tools and Managed Endpoint Detection and Response (MEDR) services.

    Join ESG and Symantec as we discuss how organizations are using solutions to improve their threat detection and response efforts.

    We'll cover:

    - Trends impacting threat detection efforts

    - How organizations are using EDR and MEDR solutions

    - The benefits of using an MEDR service

    Register Today
  • Breached! Next Generation Network Forensics for the Cloud Jul 11 2019 5:00 pm UTC 60 mins
    Karl Vogel, Worldwide Solutions Architect, Symantec and Dennis Carpio, Sr. Director Business Development, Ixia
    The average cost of a breach is US$4 million. What do you do if this happens to you? Do you know the extent of the breach? Did it hit your network infrastructure? Did it extend to your cloud workloads?

    In this webinar learn:

    • Best practices around network and cloud forensics and breach response.

    • Hear real-life scenarios that were handled by Symantec’s Incident Response experts.

    • See a demo of how Symantec Security Analytics in the cloud provides the details that expose the full source and scope of any threat or attack targeting your information assets.

    • See how you can arm your Incident Response team to significantly speed the time to conduct and complete network and cloud forensic investigations.

    Please Join Us, Register Today
  • Implementing a Zero Trust framework to Secure Modern Workflows Jun 27 2019 5:00 pm UTC 60 mins
    Salah Nassar,Director Product Marketing, Symantec and Tim Murphy, Sr. Manager Network Product Marketing, Symantec
    Cloud-based computing has erased the traditional network perimeter and created new attack surfaces.

    Join our cloud security experts to learn how new product enhancements within the Symantec Integrated Cyber Defense Platform are delivering on the promise of Zero Trust while reducing cost and complexity for network security professionals.

    Learn how new integrated tools can help you:

    • Simplify enforcement of Zero Trust security policies across Web, email, and cloud application access.

    • Implement real-time, in-line security controls over the use of any cloud application from any device, including unmanaged and bring-your-own devices.

    • Enforce granular security controls over IaaS, SaaS, email and web traffic - for both managed and unmanaged devices

    • Consistently apply DLP policies on information being sent to cloud and web destinations, and perform threat inspection for content downloads

    Register Today
  • Symantec Cloud & Web Access Security (Video: 2:47 mins) Recorded: Jun 13 2019 3 mins
    Symantec
    Symantec has an integrated set of cloud-delivered gateway services for securing modern enterprise cloud and web access.
  • What’s New with Symantec Endpoint Management Recorded: Jun 12 2019 57 mins
    Brian Sheedy, Lead Principal TEC, Endpoint Management, Symantec and Rob Barker, Director, Product Management, Symantec
    At Symantec, we continue to innovate and add new capabilities to our endpoint management solutions. Please join us on June 12 for a special webcast focused on the latest updates to IT Management Suite 8.5 included in our most recent release update (RU2).

    We will discuss and demo new features and enhancements to patch management, bandwidth throttling, peer-to-peer downloading, the software portal, and much more!

    Don’t miss this great opportunity to learn the latest news and information on Symantec endpoint management!
  • Expert Guide to CASB Deployment Success Recorded: Jun 6 2019 30 mins
    Eric Andrews, Vice President of Cloud Security, Symantec and Steve Riley, Senior Director Analyst, Gartner
    There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying and getting the full value out of your Cloud Access Security Broker (CASB) from visibility to data security to threat protection.

    Join this webinar to learn:

    •. A guidance framework on CASB adoption

    •. Tips for deploying a CASB to secure services like Office 365, G Suite, and AWS

    •. How to secure the use of cloud apps and services even when users are going direct to apps from unmanaged devices

    • Key insights on CASB options including integrations with DLP and Secure Web Gateways

    Please Join Us, Register Today
  • What Cyber Threats are Lurking in your Network ? Recorded: May 30 2019 45 mins
    Alan Hall, Director of Product Marketing and Andre Engel, Sr.Consultant Cyber Security–SOC and Incident Response SME
    Do you know what’s lurking in your network?

    How strong are your defenses against today’s attacks? Nothing gives you a better understanding of your security posture than a deep analysis of your historic traffic.

    Using your own data, Symantec Security Analytics will uncover what’s hiding in your network. Is encrypted traffic leaving you blind? Are malicious files getting through? Are you aware of high-risk traffic? Are you currently under attack?

    Join us on this webinar:

    • Gain insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment.

    • Review results from real assessments, from real customers.

    • Learn how to get a complete and accurate picture of hidden cyber threats that may be hiding in your network

    Register Today
  • Gartner Recommendations for Modern Endpoint Security Recorded: May 30 2019 20 mins
    Peter Firstbrook, VP Analyst at Gartner, and Art Gililand, EVP, GM Enterprise Products at Symantec
    Modern endpoint security demands a reprioritization and renewed focus on security fundamentals. Security teams drowning in complexities need a more efficient way to deploy and manage effective protection, system hardening, and detection and response for the dynamic, diverse endpoint environments they operate.

    Join Peter Firstbrook, VP Analyst at Gartner, and Art Gililand, EVP, GM Enterprise Products at Symantec, as they discuss:

    •. Proactive tactics teams are using to improve their security posture

    •. Pain points and threat trends driving the rapid rise in Endpoint Detection and Response solutions

    •. Features and capabilities customers should look for in a modern endpoint solution

    View Now
  • GDPR One Year Later Recorded: May 23 2019 61 mins
    Ilias Chantzos, Sr. Director, Government Affairs, Symantec and Ramses Gallego, Strategist, Symantec
    The General Data Protection Regulation (GDPR) has been in effect since last year. The GDPR places a number of onerous cybersecurity and data breach notification obligations for organizations globally with strong enforcement powers for the data protection authorities.

    Compliance with GDPR remains as challenging with today’s threat landscape making the risk of data breach bigger than ever. Join us as we bring together global Chief Information Security Officers to discuss, what's happened in the year since GDPR launched.

    Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance.

    We’ll also discuss the latest insights in these key areas:

    •. The latest GDPR guidance from data protection authorities on breach notifications.

    •. How is enforcement happening and the link between data protection and operational security

    •. Processing of personal data – Challenges posed by different data categories and the risks posed by shadow IT.

    •. Data Transfer requirements and how the regulatory environment is shaping

    Please Join Us, Register Today
  • GDPR: Enemy Within (Video: 2 mins) Recorded: May 21 2019 3 mins
    Symantec
    Who's the real enemy when it comes to data exposure ?

    Uncover data loss blind spots in sanctioned and unsanctioned cloud apps. Now you can extend data loss prevention (DLP) everywhere – both on–premises and to the cloud with Symantec DLP Cloud and Symantec CloudSOC.
  • GDPR: File Sharing - Be Prepared (2 min video) Recorded: May 21 2019 3 mins
    Symantec
    File Sharing - Beware / Be Prepared

    Extend visibility and control to cloud apps with a cloud security solution that combines best-in-class DLP and CASB technologies from Symantec.
  • GDPR: Shadow IT Challenge (Video: 1 min / 44 sec) Recorded: May 21 2019 2 mins
    Symantec
    With GDPR every organization needs better visibility and better control over data.

    Extend visibility and control to cloud apps with a cloud security solution that combines best-in-class DLP and CASB technologies from Symantec.
  • Identify, Prioritize, and Remediate Vulnerabilities Recorded: May 16 2019 47 mins
    Sharad Ghag, Principal Product Manager, Symantec Corporation
    The number of security vulnerabilities discovered over the last few years has rapidly increased. 2018 was a record setting year with a total of 14,760 – more than double the amount from just 2 years earlier. In addition, many of the recent breaches have been due to known software vulnerabilities that had a patch available but had not yet been applied by the organization leaving them dangerously exposed. Identifying vulnerabilities, knowing which ones pose the greatest risk, and performing remediation is a major challenge for many organizations.

    Please join us on Thursday, May 16 for a special webcast. We will discuss and demo how to quickly and efficiently identify, prioritize, and remediate vulnerabilities using Symantec Control Compliance Suite Vulnerability Manager.

    Register today!
  • Integrating Security Across Your Cloud Recorded: May 14 2019 30 mins
    Robert Arandjelovic, Director Product Marketing, Symantec
    As companies move their applications and operations from on-prem data centers to the cloud, a variety of security concerns become more complex.

    Applying security controls to servers outside of the physical control of IT means depending on web services and remote management. And since your data might not be in a single cloud – one benefit of cloud computing is spreading your data among multiple physical servers – data management can be difficult.

    This webcast will look at how data is managed, performance is monitored and analytics are collected and normalized across the cloud infrastructure. It will also look at how security operations are managed and executed in this ever-changing environment.

    Register Today
  • Cloud Workload Assurance: A Journey from visibility to compliance on the Cloud Recorded: May 2 2019 49 mins
    Daniel Frey (Sr. Manager, Prod Marketing) and Anand Visvanathan (Dir. Prod Management)
    Misconfigurations of cloud services can lead to gaping holes in your cloud environment and present low hanging fruit for attackers. Cloud users need a proactive, automated approach to monitoring and securing the cloud control plane.

    In this webinar, you’ll learn:

    • How as a user you can tackle the most pressing problems that face some companies during their cloud journey

    • Configuration Errors: Monitor changes happening to cloud services in real-time and maintain your “gold standard” security posture.

    • Painstaking Triage: Automate the remediation process to handle any security issues for both inline as well as offline workflows.

    Please Join Us, Register Today
  • The Office 365 Dilemma – How Secure is Secure? Recorded: Apr 30 2019 31 mins
    Sunil Choudrie, Senior Strategist, Symantec
    Office 365 has captured the imagination of many organizations, offering a wide range of productivity applications in a single platform. However, as organizations race to the cloud they realise that solving the security challenges may not be as straightforward as they hoped.

    The Office 365 platform encompasses communication, content creation and distribution applications stored in a cloud environment that’s open to all (any user, any device). In short, this single platform reflects the full range of security challenges that any organisation faces, so no wonder security deserves a deeper think.

    Join Sunil Choudrie, a Security Strategist from Symantec where he will discuss the security implications and key considerations for organizations that have moved, or are planning to move to Office 365.
  • CloudSoc + Cloud Workload Assurance Demo Video Recorded: Apr 12 2019 2 mins
    Symantec
    The cloud makes your teams faster and more agile. But they’re leaning on infrastructure as a service faster than you can secure it. With Symantec’s Cloud Security you are able to see who is using the cloud, how they are using the cloud, and if your information is at risk. Watch this demo to see how we can help you prevent against cloud misconfigurations, misuse, and data loss.
  • Cloud Workload Protection + Cloud Workload Assurance Demo Video Recorded: Apr 12 2019 2 mins
    Symantec.
    What if security was baked in to your development workflow in a way that didn’t slow you down? Symantec Cloud Workload Protection (CWP), integrates into your DevOps workflows, automating security so you don’t have to think about it.

    Watch this demo to see how CWP helps you build securely while still shipping fast.
  • Cloud Workload Assurance Demo Video Recorded: Apr 12 2019 2 mins
    Symantec
    It’s no news flash that misconfigurations cause the majority of cloud security failures. But how do you prioritize security tasks with your limited resources?

    Symantec Cloud Workload Assurance minimizes misconfigurations through automated discovery and continuous monitoring of your cloud environments. Watch this video to see how!
  • Strengthen Endpoint Security with Real-time Visibility and Remediation Recorded: Apr 10 2019 47 mins
    Rob Barker, Product Manager
    In today’s world of increasing threats, there is a greater need to reduce the latency in data collection and act quickly based on that data. Join us on March 13 for a special webinar focused on our new real-time visibility and remediation capabilities to help protect and secure endpoints.

    In this webinar, we will discuss and demonstrate how Symantec endpoint management provides:

    Real-time management
    •gain deep visibility into your organization’s endpoints and software
    •make better-informed decisions
    •take faster actions such as identifying vulnerabilities and quickly deploying the appropriate patches and updates

    Integration with Symantec Endpoint Protection (SEP)
    •quarantine endpoints that fail a compliance scan to prevent the spread of infection
    •monitor the health of the SEP agent and quickly remediate if needed
    or the health of the SEP agent and quickly remediate if needed

    Don’t miss this great opportunity to learn how Symantec endpoint management solutions can strengthen endpoint security and maximize user productivity.
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing Ransomware Infections via Office 365 is New Territory. Now What?
  • Live at: Feb 15 2019 3:35 pm
  • Presented by: Symantec
  • From:
Your email has been sent.
or close