InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Getting Hit with Targeted Attacks? Symantec Endpoint Behavioral Isolation

Presented by

Mark Gentile, Chief Architect, Aryiro Toan, Endpoint PM, Liam O'Murchu, Director, Security Technology & Response, Symantec

About this talk

Punch Up Protection with Symantec Behavioral Isolation -- Now With the recent rise of targeted attacks, attack surface reduction has become a critical part of every company's cyber security strategy. This powerful security technique uses intelligent rules to block attackers seeking to paralyze critical operations. Join us for this webinar on Thursday, February 18, 2021, 11 am PST, where Symantec’s Endpoint Security Chief Architect Mark Gentile and Endpoint Product Manager Aryiro Toan will talk about: • Why attack surface reduction is a necessary component of your endpoint protection strategy • How you can identify risky behaviors and block them • What Symantec is doing to enhance its full-feature endpoint offering and make it even easier to keep the bad guys out Our Speakers: - Mark Gentile, Chief Architect, Endpoint Security Solutions, Symantec Endpoint Security, Broadcom - Aryiro Toan, Endpoint Product Manager, Symantec Endpoint Security, Broadcom - Liam O'Murchu, Director, Security Technology & Response, Broadcom
(Deactivated) Symantec

(Deactivated) Symantec

92555 subscribers77 talks
Integrated Cyber Defense
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both. Visit: http://www.broadcom.com/products/cyber-security
Related topics