Hi [[ session.user.profile.firstName ]]

Symantec | Broadcom: Innovation and Strategy for Your Success

Symantec is better positioned than ever to drive innovation and customer success since becoming a division of Broadcom. We are excited to connect with you and share how we are providing our customers with additional value now that we have Broadcom’s resources and support behind our organization.

Join this webinar to learn:
- How Symantec’s Enterprise Division is addressing key customer challenges across advanced threats, privacy and compliance, and digital transformation
- Symantec’s vision, strategy, and customer-driven innovations
- Answers to common questions we have received since becoming part of Broadcom

We look forward to connecting with you and hope you will join us for this and the other webinars in our executive webinar series.
Recorded Mar 25 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Art Gilliland, Senior VP & GM, Symantec Enterprise Division of Broadcom
Presentation preview: Symantec | Broadcom: Innovation and Strategy for Your Success
  • Channel
  • Channel profile
  • New Symantec Secure Web Gateway = Greater Flexibility and Stronger Security Recorded: Sep 23 2020 60 mins
    Paul Kao, Product Management, Symantec Enterprise Division, Alan Hall, Product Marketing, Symantec Enterprise Division
    Join Symantec’s Network Security Team to find out what’s new with Symantec’s industry-leading Secure Web Gateway solution and what it means for security teams. Better protection, greater performance, simplified licensing, new features, and more!

    We’ll uncover the new hardware and licensing options and how it will help you strengthen your security posture, on-premises, in the cloud or any hybrid combination. Secure your network, users, and data with the most advanced threat protection available.
  • Threat Risk Levels: Taking Your Intelligence Services to the Next Level Recorded: Sep 16 2020 59 mins
    Matt Willden, Product Mgr., Symantec Intelligence Services, Chris Larsen, Architect - WebPulse Symantec Threat Research Lab
    Enterprise network security teams need to implement granular and effective controls over their web traffic, even when a category assignment is not available from their web filters. The key is to customize and deploy threat risk control policies based on specific business needs and risk tolerance levels. Doing this helps eliminate high-risk web traffic, while allowing access to sanctioned websites and applications with acceptable risk levels.

    Join Matt Willden, Product Manager for Intelligence Services from Symantec Enterprise Division of Broadcom and Chris Larsen, Architect from the Symantec WebPulse Threat Research Lab as they provide insight into:

    - How Threat Risk Levels work and differ from URL categories
    - Why they go deeper than web filtering and categorization
    - Strategies using threat risk levels with web isolation technology
    - Examples of their success in real-world application
    - Answers to your questions

    We look forward to this discussion and hope you will join us for the webinar and actively participate by submitting your questions and comments.
  • Symantec's Complete Endpoint Security Solution: A Deep Dive Into New Features Recorded: Sep 10 2020 59 mins
    Adam Licata, Director, Endpoint Product Management, Symantec and Alpesh Mote, Director, Endpoint Product Management, Symantec
    In these challenging times, companies need a seamless endpoint solution to address expanding exposures such as the new, work-from-home environment.

    Join us in this webinar to see how we use cloud management in our Symantec Endpoint Security (SES) offerings to address the entire attack chain, including: attack surface reduction, attack & breach prevention, and detection & response. During this webinar, Symantec Directors of Endpoint Product Management Adam Licata and Alpesh Mote will provide a discussion and demonstration of new features in our SES solution. In this session, you will:

    · Learn about the new features, such as Behavioral Isolation, Threat Hunter, and much more
    · See a demo and find out more about specific use cases
    · Get to ask questions about how SES can work in your organization
  • Symantec's Complete Endpoint Security Solution: A Deep Dive Into New Features Recorded: Aug 26 2020 60 mins
    Adam Licata, Director, Endpoint Product Management, Symantec and Alpesh Mote, Director, Endpoint Product Management, Symantec
    In these challenging times, companies need a seamless endpoint solution to address expanding exposures such as the new, work-from-home environment.

    Join us in this webinar to see how we use cloud management in our Symantec Endpoint Security (SES) offerings to address the entire attack chain, including: attack surface reduction, attack & breach prevention, and detection & response. On August 26, 10 am PT, Symantec Directors of Endpoint Product Management Adam Licata and Alpesh Mote will provide a discussion and demonstration of new features in our SES solution. In this session, you will:

    · Learn about the new features, such as Behavioral Isolation, Threat Hunter, and much more
    · See a demo and find out more about specific use cases
    · Get to ask questions about how SES can work in your organization
  • Extending Your Symantec Identity Solutions with Our Security Services Platform Recorded: Aug 20 2020 56 mins
    Vadim Lander, CTO, Identity Security, Broadcom
    As you transition to Digital IAM, take stock of how you are using your Symantec Identity Security solutions today and how to extend them into the future. Broadcom has developed a security services platform that will do just that – allow you to implement IAM business services used to secure, manage, and provision access underpinned by a unified, cloud-native architecture of policy, risk, session, and analytics with a common data model.

    Join Vadim Lander to learn how these services seamlessly integrate with your existing solutions so that you can transition to Digital IAM while driving automation and security benefits.
  • How Symantec Detected and Prevented the WastedLocker Ransomware Attack Recorded: Aug 13 2020 47 mins
    Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division
    Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.

    Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?

    Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET

    You will learn:
    - The details of these attacks
    - How Symantec discovered them
    - What you can do to protect your organization going forward
  • Privileged Identity Management: Building a Zero Trust Organization Recorded: Aug 6 2020 17 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    In the Forrester Report, “A Practical Guide to Zero Trust Implementation”, Forrester recommends that companies implement privileged identity management as part of their Zero Trust projects. However, some organizations may not see the connection between Zero Trust and PIM.

    In part 3 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss how PIM technologies help organizations achieve Zero Trust.

    They will also cover the “least privilege” model and wrap up this series with advice on best practices for implementing or enhancing PIM capabilities.
  • シマンテックウェビナー - ゼロトラストセキュリティモデルの導入方策 Recorded: Aug 6 2020 61 mins
    に開催されるウェビナーでは、Broadcom
    今後のセキュリティ対策をより高度化する上で、「ゼロトラスト」という考え方が重要視されつつあります。組織が「ゼロトラスト」モデルに基づいたセキュリティアーキテクチャの再設計を進める中で、コストや複雑さに悩まされることなく、望ましい「ゼロトラスト」を達成するための方策が求められています。

    8 月 6日 (木) 午前 11 時 (日本時間) に開催されるウェビナーでは、Broadcom のシマンテックエンタープライズ事業部の山内 正が、シマンテック製品を活用したゼロトラストセキュリティモデルの導入支援についてご紹介申し上げます。

    このウェビナーでは、以下のような貴重な情報を提供します。
    •「ゼロトラスト」セキュリティモデルを採用することで解決する主な課題
    •今日、これらの課題を優先的に取り組むことが重要な理由
    •「ゼロトラスト」セキュリティ対策シナリオの概要と、シマンテックのポートフォリオがエンドツーエンドの実装を可能にし、コストと複雑さの障壁を取り除く方法
  • Aggressive and Unpredictable: The Threat Posed by North Korean Cyber Attackers Recorded: Aug 5 2020 45 mins
    Dick O'Brien, Principal Research Editor, Sylvester Segura, Threat Intelligence Analyst, Javier Santoyo, Technical Director
    While no organization should assume that it is at low risk of a state-sponsored attack, this is doubly the case when it comes to North Korea-linked groups. While attackers linked to the country’s regime have been heavily involved in espionage-type attacks, they have branched out into destructive sabotage attacks and a range of financially motivated attacks. Organizations of all sizes may be potential targets and take steps to mitigate the risk of attack.

    Join Dick O’Brien, principal research editor, and Sylvester Segura, threat intelligence analyst, from Symantec’s Critical Attack Discovery and Intelligence team, along with Javier Santoyo, technical director for Symantec Endpoint Security, to learn about:
    • The North Korean cyber ecosystem
    • The varying motivations behind attacks by North Korean groups
    • A deep dive into the operations of Stonefly, a North Korean group heavily involved in stealing industrial and military secrets
    • How customers can best use Symantec products to protect themselves from these threats
  • Securing Your Remote Workforce with Symantec Recorded: Aug 5 2020 62 mins
    Manoj Sharma, Technical Director, Symantec Enterprise Division, Broadcom
    Organizations have been building towards a remote workforce for many years but Covid-19 was the single, most compelling event that propelled it forward at lightning speed, creating a myriad of security challenges and risks.
    Securing a remote workforce has never been more essential for today's organizations. Workers must remain productive wherever they are, but a poorly implemented solution only adds complexity and cost, eliminating many of the benefits that come with embracing digital transformation.

    Please join, Manoj Sharma, Technical Director, Symantec Enterprise Division, Broadcom on Wednesday August 5 at 1pm AEST/11am SG time as he discusses the Symantec Secure Remote Access Framework and learn about:
    • The challenges and risks of securing a remote workforce
    • Best practices for empowering a secure remote workforce on your digital transformation journey
    • How Symantec can help you confidently enable a remote workforce without adding risk or complexity
  • How Symantec’s Zero Trust for Data Solution Can Prevent Your Next Data Breach Recorded: Aug 4 2020 55 mins
    Michael Dubinsky, Head of PM, Henk Van Achterberg, Technical Architect, Symantec Enterprise Division, Broadcom
    A key challenge for many CISOs driving and securing an organization’s undergoing digital transformation is protecting the corporate data from unauthorized or malicious access, while maintaining visibility and compliance in order to stay protected against data breaches.

    Please join, Michael Dubinsky, Head of Product Management for Zero Trust and Henk Van Achterberg, Technical Architect for Zero Trust, Symantec Enterprise Division, Broadcom as they discuss:

    • How to effectively secure your data and workloads regardless of who, where or what device is performing the access
    • The importance of maintaining visibility, control and compliance
    • How Symantec’s “Zero Trust for Data” protects your data, prevents attacks and optimizes security operation
  • Privileged Identity Management: What is Privilege and How is it Changing? Recorded: Jul 30 2020 13 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    The concept of “privileged” has grown beyond traditional IT users. In many organizations, we now have business users with business roles that give them the ability to download an entire customer database from their CRM or Marketing Automation systems.

    In part 2 of this series, Merritt Maxim, Vice President, Research Director from Forrester, and Clayton Donley, Vice President of the Identity Security Business will discuss the need to redefine what it means to be “privileged” and what that means for your business.
  • Symantec Competition: They Can't Handle the Truth Recorded: Jul 30 2020 61 mins
    Art Gilliland, SVP & GM, Kevin O’Leary, VP of Network R&D, Saritha Chadalavada, Email PM, Nate Fitzgerald, Web PM, Symantec
    The Symantec acquisition by Broadcom is opening up tremendous opportunities to streamline operations and to drive increased focus of our large R&D investment and product strategy in the key areas where we have established Enterprise Security market leadership. Our focus on customer innovation has created fear in our competition, who have spent the last six months aggressively going after market share while we integrated into Broadcom. While competition is understandable, we did not expect the degree with which Zscaler and Proofpoint would be so “economical with the truth” - making outright false claims.

    Join Art Gilliland, SVP & GM of the Symantec Enterprise Division of Broadcom and subject matter experts from the Symantec Network R&D and Engineering teams as we walk through the real strength of Symantec’s Network Security Portfolio, address some of the egregious claims made and explore why Zscaler and Proofpoint find the truth so challenging. During this hour we will look at:

    - Why the Broadcom acquisition has set up Symantec to reach new heights
    - How Proofpoint is challenged in telling the truth
    - Outlandish statements Zscaler has made to distort reality

    We can guarantee what we present is ethical and the truth. Reserve your seat today, this will be a discussion you won’t want to miss.
  • Symantec Competition: They Can't Handle the Truth Recorded: Jul 29 2020 61 mins
    Art Gilliland, SVP & GM, Kevin O’Leary, VP of Network R&D, Saritha Chadalavada, Email PM, Nate Fitzgerald, Web PM, Symantec
    The Symantec acquisition by Broadcom is opening up tremendous opportunities to streamline operations and to drive increased focus of our large R&D investment and product strategy in the key areas where we have established Enterprise Security market leadership. Our focus on customer innovation has created fear in our competition, who have spent the last six months aggressively going after market share while we integrated into Broadcom. While competition is understandable, we did not expect the degree with which Zscaler and Proofpoint would be so “economical with the truth” - making outright false claims.

    Join Art Gilliland, SVP & GM of the Symantec Enterprise Division of Broadcom and subject matter experts from the Symantec Network R&D and Engineering teams as we walk through the real strength of Symantec’s Network Security Portfolio, address some of the egregious claims made and explore why Zscaler and Proofpoint find the truth so challenging. During this hour we will look at:

    - Why the Broadcom acquisition has set up Symantec to reach new heights
    - How Proofpoint is challenged in telling the truth
    - Outlandish statements Zscaler has made to distort reality

    We can guarantee what we present is ethical and the truth. Reserve your seat today, this will be a discussion you won’t want to miss.
  • Privileged Identity Management: Customer Challenges and Maturity Recorded: Jul 23 2020 14 mins
    Clayton Donley, VP, Symantec Identity Security, Merritt Maxim, VP, Research Director, Forrester
    In recent years we have seen changes in how we view privileged identity management. Initially, the main emphasis was on securing root and reigning in the super admins; yet lately, we have seen virtual and cloud environments introduce new types of privileged accounts.

    In part 1 of this series, Merritt Maxim, VP, Research Director from Forrester, and Clayton Donley, VP of Symantec Identity Security will discuss:

    • Customer challenges associated with a dynamically changing environment
    • Emerging requirements not being addressed by PIM vendors today

    They will also provide insight into the maturity path that customers are facing.
  • How Enterprises Can Effectively Operate Zero Trust Environments Recorded: Jul 21 2020 61 mins
    Manoj Sharma, Technical Director of Zero Trust, Symantec; Dr. Chase Cunningham, Principal Analyst, Forrester
    Join us as Dr. Chase Cunningham, Principal Analyst at Forrester, and Manoj Sharma, Technical Director at Symantec, discuss why zero trust is becoming an urgent priority for enterprises focused on protecting their users and data, and offer timely recommendations on how to build and operate a zero-trust architecture.

    Tune into this webinar to explore and get answers about:
    • What it really means to implement the zero trust model vs. traditional perimeter defenses
    • How security teams are operationalizing zero trust to enable cloud migration and remote workforce scenarios
    • How to assess your zero trust maturity and plan your own implementation journey

    *This session is eligible for CPE credits with ISC(2).
  • Webinar: Mudando a vida das pessoas em tempos de Pandemia Recorded: Jul 21 2020 63 mins
    Alexandre Siqueira- HCL , Wagner Brunca - Broadcom.
    Webinar Language: Portuguese

    Transformação Digital - Mudando a vida das pessoas em tempos de Pandemia. Como a tecnologia pode literalmente transformar a vida das pessoas. Cenários reais e novas propostas trazendo inspiração para o novo normal.
  • How Symantec Detected and Prevented the WastedLocker Ransomware Attack Recorded: Jul 16 2020 48 mins
    Kevin Haley, Director of Security Response, Eric Chien,Technical Director, Broadcom, Symantec Enterprise Division
    Evil Corp is not just a fictional company from “Mr. Robot”. It's a real-world sophisticated cyber crime gang of the same name that has continued on undeterred by FBI indictments of its leaders. Evil Corp recently launched a new targeted ransomware attack called WastedLocker against some of the largest U.S. companies and could have easily knocked them all out.

    Symantec threat hunters discovered and identified a breach inside dozens of corporate networks and were able to protect these companies before ransomware was deployed and caused damage. Want to hear more about how the attack worked, how Symantec discovered it and what to expect next from WastedLocker?

    Join us for a conversation between Eric Chien, Symantec Technical Director, and Kevin Haley, Director of Security Response on July 16th at 10am PT/1pm ET

    You will learn:
    - The details of these attacks
    - How Symantec discovered them
    - What you can do to protect your organization going forward
  • Navigating the Path to Digital Identity: Operationalize Security with SecDevOps Recorded: Jul 16 2020 58 mins
    Vadim Lander, CTO, Identity Security, Broadcom
    The new IAM architecture is based on many micro-perimeters, each a single user, session, device or application. As a result, you need to integrate IAM into the fabric of your applications. How do we get there? You can’t wave a magic wand or issue a top-down mandate that changes all the rules overnight. Because the new Digital IAM needs to coexist with your existing IAM infrastructure, a managed transition is needed to bring identity services closer to the applications to operationalize management of identity & security.

    Join Vadim Lander for a deep dive on navigating the path to Digital IAM.
  • Securing the Digital Transformation with Symantec SASE Recorded: Jul 1 2020 47 mins
    Michael Mauch, Product Manager, Network Security Architecture, Symantec Enterprise Division, Broadcom
    Securing the Digital Transformation - especially with a large remote workforce - has never been more essential for today's organizations. Workers must remain productive wherever they are, but a poorly implemented solution will only add complexity and cost, eliminating many of the benefits of moving to the cloud.

    Security professionals are rapidly coalescing around a Secure Access Service Edge (SASE) approach to enable a successful digital transformation journey that delivers a smooth, low-latency connectivity which satisfies the needs of both users and those that are required to protect them.

    Please join, Michael Mauch, Product Manager, Network Security Architecture, Symantec Enterprise Division, Broadcom as he discusses:

    • The importance of SASE in your digital transformation journey
    • Best practices in deploying a SASE architecture to accelerate the
    adoption of cloud and mobile applications
    • How Symantec’s Integrated Cyber Defense Platform protects
    customer data, prevents attacks and optimizes security operations
Integrated Cyber Defense
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.

Visit: http://www.broadcom.com/products/cyber-security

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Symantec | Broadcom: Innovation and Strategy for Your Success
  • Live at: Mar 25 2020 3:00 pm
  • Presented by: Art Gilliland, Senior VP & GM, Symantec Enterprise Division of Broadcom
  • From:
Your email has been sent.
or close