Hi [[ session.user.profile.firstName ]]

O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What?

As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
Recorded Feb 15 2019 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Symantec
Presentation preview: O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What?
  • Channel
  • Channel profile
  • Strengthen Endpoint Security with Real-time Visibility and Remediation Apr 10 2019 5:00 pm UTC 60 mins
    Damon Covey, Sr. Director and Rob Barker, Product Manager
    In today’s world of increasing threats, there is a greater need to reduce the latency in data collection and act quickly based on that data. Join us on March 13 for a special webinar focused on our new real-time visibility and remediation capabilities to help protect and secure endpoints.

    In this webinar, we will discuss and demonstrate how Symantec endpoint management provides:

    Real-time management
    •gain deep visibility into your organization’s endpoints and software
    •make better-informed decisions
    •take faster actions such as identifying vulnerabilities and quickly deploying the appropriate patches and updates

    Integration with Symantec Endpoint Protection (SEP)
    •quarantine endpoints that fail a compliance scan to prevent the spread of infection
    •monitor the health of the SEP agent and quickly remediate if needed
    or the health of the SEP agent and quickly remediate if needed

    Don’t miss this great opportunity to learn how Symantec endpoint management solutions can strengthen endpoint security and maximize user productivity.
  • 2019 Internet Security Threat Report (ISTR): The New Threat Landscape Mar 28 2019 5:00 pm UTC 60 mins
    Kevin Haley, Director Product Management, Security Technology & Response, Symantec
    As ransomware shows early signs of decline, new forms of attack emerge to take its place. Stealthy techniques allow attackers to fly under the radar, placing enterprises at increasing risk.

    Join us as we discuss these trends and more:

    - Formjacking was the breakthrough threat of 2018, as cryptojacking and ransomware show signs of decline. However enterprises continue to face the problem of targeted ransomware.

    - Living off the land and supply chain attacks are now a staple of the new threat landscape.

    - Cloud users facing challenges on multiple fronts through data leaks from cloud storage and low-level chip vulnerabilities.

    - Targeted attack groups show increasing interest in operational targets; greater number of groups adopting destructive malware.

    Please Join Us, Register Today
  • How to Automate Security and Compliance for DevOps Mar 27 2019 6:00 pm UTC 48 mins
    Raj Patel: Vice President Cloud Platform Engineering, Symantec and Sameer Vasanthapuram: Partner Solutions Architect,AWS
    There is a natural tension between decentralized, distributed DevOps and the traditional command-and-control approach of classic security management. When moving to the cloud, organizations must learn how to decentralize and democratize the security process.

    Join us to learn how to automate security into the DevOps toolchain and strike a balance between agility and security in the cloud.

    During this session, you will learn:

    -How DevOps and InfoSec teams can align to the new DevSecOps paradigm

    -Why continuous compliance management is a new business imperative

    -How to build security in to your Continuous Integration/Continuous Development pipeline

    Register Today
  • How to Protect Your Business Critical Operations in AWS Mar 21 2019 6:00 pm UTC 52 mins
    Deena Thomchick, Sr. Director, Cloud Security, Symantec
    When Securing AWS the Top 5 Things to Consider

    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    - Monitor activity and security configurations
    - Control access and prevent risky changes or privileged misuse
    - Detect malicious insiders and compromised accounts
    - Keep S3 buckets private and secure confidential data with DLP
    - Defend S3 buckets from advanced malware threats
  • Cloud Security: Thinking Beyond the Perimeter Mar 19 2019 6:00 pm UTC 55 mins
    Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester
    Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.

    Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;

    - The inherent security challenges of cloud

    - Security strategies and imperatives

    - How organizations are approaching and need to approach cloud security today.

    Please Join Us, Register Today
  • See How Easy It Is to Hack an iPhone in under 30 Seconds (Video Demo) Recorded: Mar 14 2019 2 mins
    Symantec
    As we become increasingly reliant on mobile devices, its vital to ensure we are being safe and protecting ourselves from potential threats.

    During this video, we will demonstrate how easy it is for a hacker to take full control of a mobile device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure) protects the device and data from attacks.
  • Cyber Security Platform Shift Recorded: Feb 27 2019 20 mins
    Art Gilliland, Exec. VP & GM, Symantec | Peter Doggart, VP, Symantec | Jon Oltsik, Snr. Principal Analyst, ESG
    Cyber threats continue to evolve and target enterprise weaknesses, while the cost and complexity of operating cyber security are increasing. And the old way of fighting cyber-attacks using fragmented tools no longer works. How do organisations adapt their cyber security technology strategies?

    There's a seismic shift happening in cyber security. Integrated platforms are the future.

    Join us for a webinar to hear how Symantec and our partners are working together to drive down the cost and complexity of cyber security, while protecting enterprises against sophisticated threats.

    In this webinar, you will learn about:

    •. New customer research demonstrating the need for integrated platforms

    • Unprecedented industry collaboration around the platform shift in cyber security

    •. Broad ecosystem support of Symantec’s Integrated Cyber Defense Platform (ICD)

    •. How the ICD platform drives customer adoption and value

    •. New innovations extending the value of the ICD platform

    View Now
  • The Importance of Building Your Zero Trust Program on a Solid Platform Recorded: Feb 26 2019 63 mins
    Gerry Grealish, Symantec and Salah Nassar, Symantec
    Zero Trust is an architectural model that guides security teams on how to apply Zero Trust tenants to address the modern threat landscape. The model advocates a holistic approach to information security and puts special focus on processes and technologies that secure your data, wherever it resides.

    The objective is to strengthen data security and obfuscation – to limit risk derived from excessive user privileges and access. Benefits also include improved security detection and response with analytics and automation.

    Understanding key concepts at a high level is one thing. Properly implementing the model can be much more challenging.

    Join us in this webinar where we’ll look at:

    • Requirements for adopting a Zero Trust model across the entire security stack

    • Key considerations as you plan your Zero Trust programs

    • Benefits of a platform versus fragmented approach

    You’ll gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it.

    Please Join Us, Register Today
  • Ask the Experts—Securing Data and Email in Office 365 Recorded: Feb 21 2019 62 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • You're concerned with Account Takeover on Office 365. Now What? Recorded: Feb 15 2019 2 mins
    Symantec
    You're Concerned with Account Takeover on O365 Now What? (1 min /52 seconds Video)
  • O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What? Recorded: Feb 15 2019 2 mins
    Symantec
    As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
  • Preventing Ransomware Infections via Office 365 is New Territory. Now What? Recorded: Feb 15 2019 2 mins
    Symantec
    The move to cloud applications such as Office 365 has brought many benefits, but has also come with a price Organizations have lost security visibility and control.(1 min 39 sec.video)
  • How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Recorded: Feb 14 2019 42 mins
    Sameer Vasanthapuram, Kevin Stultz and Paul Hortop
    Snapper, a New Zealand-based company, needed a security solution to protect their customer data in Amazon Simple Storage Service (Amazon S3) from advanced threats and malware. In our upcoming webinar, learn why the flexibility and scalability of Symantec Cloud Workload Protection for Storage (CWP for Storage) made it the right solution for Snapper.

    In this webinar, you’ll learn:

    - How CWP for Storage protects against the latest threats and malware

    - Ways CWP for Storage delivers scalable security that integrates with DevOps workflows

    Register Today
  • Redefining Endpoint Security - How to Better Secure the Endpoint Recorded: Feb 13 2019 56 mins
    Joakim Lialias,Symantec / Sundeep Vijeswarapu, PayPal / Fernando Montenegro, 451 Research
    Symantec Unites Superior Protection, Automation and Artificial Intelligence in its most Advanced Endpoint Security Solutions.

    As attackers become more sophisticated, advanced protection and hardening are necessary for added layers of security.

    Join our webinar for first-hand insights on the newest cloud-delivered endpoint security solutions and hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research as they discuss:

    • How to gain a better understanding about the trends that are driving the need for a more comprehensive endpoint security approach.

    • How PayPal is using Symantec Endpoint Security to protect their endpoints.

    • How Symantec is redefining endpoint security with its new complete cloud-delivered endpoint defense:

    - Introducing never seen before innovation to deliver best-in-class prevention

    - Hardening Detection and Response to help customers achieve superior threat prevention,

    - Quicker identification of attackers and more tightly integrated technology and human expertise lead to better response and faster remediation

    - Security professionals and IT teams are strapped for time – streamlined management and automation will reduce significant burden

    Don't miss this great opportunity to get the latest information on taking steps towards simplifying Endpoint Security for your organization

    Register Today
  • Symantec Control Compliance Suite 12.5 Recorded: Feb 12 2019 61 mins
    Suresh Ramkumar, Principal Product Manager, Symantec
    Symantec Control Compliance Suite 12.5 is here!

    Please join us for a special webcast on Tuesday, February 12 to learn more about this exciting release.

    We will discuss and demo some of the cool new features such as

    •Support for REST APIs to enable integration and automation around commonly used functionality like assets, jobs and standards management

    •Support for offline data collection with CCS agents to enable usage in air-gapped networks

    •Integration with BMC Remedy for ticketing by leveraging CCS APIs and the Symantec Workflow Engine

    Don't miss this great opportunity to get the latest information on Control Compliance Suite 12.5!
  • Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear Recorded: Jan 30 2019 42 mins
    Adam Glick, Effectiveness Team Lead, Symantec
    Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear.

    Key Learning Objectives:

    - Get an overview of the MITRE ATT&CK framework

    - See how Symantec EDR’s Advanced Attack Detections and MITRE ATT&CK support work together to expose threats

    - Learn how an integrated single agent approach to prevention, detection and response can stop even the most stealthy attack methods

    Please Join Us, Register Today
  • What is a Powershell attack? Recorded: Jan 26 2019 3 mins
    Symantec
    Malicious PowerShell attacks increased by 661% over the course of only 6 months in 2018. Here, we take an in-depth look at this cyber crime trend.
  • What is Cryptojacking? Recorded: Jan 25 2019 3 mins
    Symantec
    Cryptojacking has shaken up the cyber security landscape over the last two years. Here, we take an in-depth look at this cyber crime trend.
  • Cloud Security Challenges and Risks Recorded: Jan 23 2019 37 mins
    John McNiece,Sr. Product Manager, Symantec and Arnav Ghosh, Product Manager, Symantec
    The Cloud Generation brings a host of new challenges --- vulnerability to increasingly malicious attacks; inability to gain a unified view across multiple cloud and on-premises environments; disparate security policies and tools; and massive traffic to monitor, analyze, and protect.

    Join us for a live webinar where we will take a closer look at some of the greatest security challenges companies are facing as they move to the cloud. We will discuss what companies are experiencing and the solutions they are adopting to bolster their response.

    In this session, you will:

    •. Hear real-world security scenarios as witnessed by a former SOC analyst

    •. Learn why the cloud has been particularly challenging to secure

    •. Find out how Symantec Managed Security Services (MSS) can help to strengthen and improve your cloud strategy through Managed Cloud Defense

    Please Join Us, Register Today
  • 2018 - The year in cyber crime Recorded: Jan 10 2019 49 mins
    Orla Cox, Director of Security Response, Symantec
    Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.

    From the explosion of coinmining activity in 2018, to the 600% rise in targeted activity against IoT devices, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.

    Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:

    • How targeted attacks are evolving to exploit new technologies like IoT.

    • The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information

    • A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come

    Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: O365 Is Great for Collaboration but Not for Preventing Data Exposure. Now What?
  • Live at: Feb 15 2019 5:45 pm
  • Presented by: Symantec
  • From:
Your email has been sent.
or close