Hi [[ session.user.profile.firstName ]]

How secure is your Office 365 deployment?

Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

Consider these statistics from IDC:

• Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
• Over 90% of threats to enterprises emanate from email
• 65% of threats go undetected for weeks/months

IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

Learn how to enhance your Office 365 security to:

• Shield Email From Phishing, Sophisticated Malware and Spam
• Neutralize Advanced Threats and Targeted Attacks
• Safeguard Your Sensitive Data
•Control Access with Strong Authentication

Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
Recorded Jun 16 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
Presentation preview: How secure is your Office 365 deployment?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Power of The Proxy Jul 6 2017 5:00 am UTC 30 mins
    Timothy Chiu, Senior Director, Product Marketing
    The reality & one of the biggest challenges for IT today is that there’s a complex user definition – there are now many options for connectivity via multiple types of devices, and the truth is, there is a lack of security for many of these new devices both on premise and in the cloud.

    The traditional security perimeter that your IT team used to be able to define surrounding cloud security is now dissolving. So if you are adopting more cloud services, putting more employees in remote or distributed offices, or are concerned about the increasing number of cyber threats you are reading about in the headlines, join us for this session to better understand what it means to be a proxy, why that’s so important today, and how that plays against what our competitors are saying about us.

    Register for our webinar ‘Power of The Proxy’ today!
  • Protect Against Ransomware Recorded: Jun 22 2017 56 mins
    Adam Licata, Senior Product Marketing Manager, Symantec; Damon Covey,Director of Product Management, Symantec
    Ransomware attacks are on the rise and wreaking havoc like never before. Attend this webinar to find out some of the key things you can do to greatly reduce the chance of Ransomware ever becoming an issue for your organization. We will discuss how to set up a strong defense across email, web, endpoints, and workloads.

    Join us for this free session today!
  • Dealing with Skills Gap in Cyber Security Recorded: Jun 15 2017 61 mins
    Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan
    As cyber threats in the business world evolve, so do the skill requirements on Cyber Security specialists. In 2017, 55% of enterprises required at least three months to fill open Cyber Security positions and 37% reported that less than 1 in 4 candidates have the qualifications they need (1). Building and maintaining a capable Cyber Security team today is a challenge.

    A fundamental shortage of Cyber Security professionals, coupled with high attrition rates, can lead to organisations failing to acquire or retain the expertise necessary to respond to an ever-evolving threat landscape.

    To better help you prepare against this situation, we have arranged for a webinar session, where we will explore the skills gap in the different stages of a Cyber Security programme, and provide recommendations on how to:

    •Create and operationalise a robust cyber security team
    •Build and upskill existing talent
    •Address the skills gap in different stages of your Cyber Security programme
    •Source skilled security professionals differently

    (1) Source: ISACA’s State of Cyber Security 2017: Current Trends in Workforce Development
  • SEP 14 Webinar Series: Easy Ways to Improve Your Security Posture Recorded: May 30 2017 30 mins
    Kirk Gibbons, System Engineer, Symantec
    Effective communication between the network and the endpoint is critical to quickly identifying advanced threats and preventing the spread of infection. The more automated the process the less damage an attack can do.

    Join us to learn what tight integration between Symantec Endpoint Protection and Secure Web Gateway looks like. You will discover:

    •Why tighter integration between the network and endpoint improves security posture
    •How new REST APIs help orchestrate a rapid response at the endpoint
    •What the future plans are for new APIs, integrations, and global threat intelligence

    Lastly, watch a demo that showcases how easy it is to integrate Symantec Endpoint Protection and Secure Web Gateway and what orchestrated response looks like.

    We look forward to welcoming you in our webinar.

    Register today!
  • 2017 Internet Security Threat Report (ISTR): A Review of the Threat Landscape Recorded: May 23 2017 54 mins
    Peter Sparkes, Senior Director, Cyber Security Services, Symantec
    2016 was a year marked by extraordinary attacks, with cyber attackers conducting multi-million dollar virtual bank heists, attempting to disrupt electoral process, and organising some of the biggest distributed denial of service (DDoS) attacks on record, powered by a botnet of IoT devices.

    Join our Senior Director of Cyber Security Services for Asia Pacific and Japan, Mr Peter Sparkes, in this webinar for an in-depth analysis on the latest cyber threats trends, and find out why:

    • Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    • One in 131 emails contained a malicious link or attachment – highest rate in five years
    • Ransomware infections increased by 36 percent, with size of ransoms spiking 266 percent
    • CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000

    Be the first to gain insight into the latest cyber threat trends in the Asia Pacific region, and learn about best practices and steps you can take to improve your security posture in 2017.

    Register for the Symantec 2017 Internet Security Threat Report Webinar today.
  • Don't Cry Over WannaCry Ransomware Recorded: May 15 2017 39 mins
    Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • What’s New in Symantec IT Management Suite 8.1? Recorded: Apr 20 2017 58 mins
    Damon Covey, Director of Product Management, Symantec
    Want to know what’s new in Symantec’s latest release of IT Management Suite version 8.1? Join us as we discuss the exciting new features such as Windows 10 and Office 365 Patch Management, Mac OS Profile Management, Symantec Endpoint Protection and Compliance integration and many more, all of which have been introduced in this latest launch.

    Join our webinar “What’s New in Symantec IT Management Suite 8.1?” to learn about:
    • How Symantec IT Management Suite will simplify and help keep Windows 10 and Office 365 up to date
    • Dealing with Windows 10 cumulative updates
    • Handle large updates in bandwidth constrained environments
    • Support for AWS Marketplace, Mac application metering and profile management
    • Integration with your existing Symantec Endpoint Protection & Control Compliance Suite
    • Enhanced support for Ghost Solution Suite
    • Network discovery support via Simple Network Management Protocol v3
    • Off-box data migration and much more


    We look forward to having you for this live session.
  • SEP 14 Webinar Series: Zero-Day Attacks and What To Do About Them? Recorded: Apr 11 2017 43 mins
    Christopher Covert, Enterprise Products Group – Solution Product Manager, Asia Pacific & Japan, Symantec
    All applications have vulnerabilities and attackers are incented to find them. Once the vulnerability has been discovered, the longer it remains unpatched, the greater the risk of a breach, potential loss of information, and damage to reputation.

    Join us to learn what can be done to block exploit attacks on day zero:

    • What behaviors and techniques are used to block attacks
    • Why exploit prevention plays a critical part in endpoint protection
    • How Memory Exploit Mitigation works

    Then see Memory Exploit Mitigation in action with a demo Symantec Endpoint Protection.

    Register Today!
  • What does the European GDPR mean for businesses in Asia Pacific? Recorded: Mar 23 2017 55 mins
    Brian Fletcher, Director - Government Affairs, Symantec and Thio Tse Gan, Practice Lead - Cyber Risk Services, Deloitte SEA
    With the advent of Big Data came not only new ways to optimise business and marketing processes, but also new concerns over the control and privacy of personal data. This gave rise to the General Data Protection Regulation (GDPR), a modernisation and harmonisation of data protection laws in the European Economic Area.

    The GDPR gives individuals greater control over their personal data, while also streamlining regulation and fostering consumer trust in businesses. However, with implementation just around the corner in 2018, over 90% of businesses are still underprepared for compliance within the next two years(1).

    Join this webinar to learn about:
    •What GDPR entails and what the timelines are
    •Who's who in the protection of personal data
    •Business concerns with the GDPR
    •Key steps of the journey towards GDPR compliance
    •How Symantec Control Compliance Suite Assessment Manager (CCS AM) can help your organisation with GDPR compliance

    (1) Vanson Bourne Survey, 2016
  • SEP 14 Webinar Series: Block The Risk Of Ransomware Recorded: Mar 14 2017 30 mins
    Jonathan Korba, System Engineer, Symantec
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be impacted again.

    Join us to learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    •What are your options if you’re targeted by a ransomware attack
    •Why Symantec Endpoint Protection 14 can address ransomware better than other solution
    •How Symantec technologies work together for maximum protection

    And if that wasn't enough, watch Symantec Endpoint Protection 14 in action. We will share a demo with you that showcases the power of its advanced technologies.
  • Effective Patch Strategies for Windows 10 and Office 365 Recorded: Feb 9 2017 50 mins
    Damon Covey, Director of Product Management, Symantec
    Are you aware of the changes Microsoft introduced for providing updates to Windows 10 and Office 365? These changes for feature and cumulative updates and roll-ups have caused confusion and additional complexity for many enterprises.

    Join our webinar to learn:
    - What these changes are
    - How these changes can impact managing your environment, especially for patch management
    - How IT Management Suite will simplify keeping Windows 10 and Office 365 up to date
  • ATM Threats to the Financial Sector Recorded: Jan 24 2017 54 mins
    Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific & Japan
    There’s a new threat in town – Jackpotting. It utilises malware directly infected onto ATMs, requiring no card skimmers that can be easily detected, no time needed to steal credentials, and grants access to every single dollar held in the machine.

    ATM machines may not follow the strict patch management regimes that corporate machines do, leaving their operating system potentially much more vulnerable to malware attacks. Beyond the monetary loss, being Jackpotted can also negatively impact the brand, and expose the bank to regulatory action from lack of due diligence in risk management.

    Hear how Symantec Cyber Security Services can help deliver a solution for these types of attacks. Through the combination of Data Center Security (DCS) and Managed Security Services (MSS) monitoring, you will receive prompt validated detection of both pre and post compromise attempts in near real-time, allowing faster responses and remediation.
  • Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead Recorded: Dec 20 2016 64 mins
    Nick Savvides, Manager, Cyber Security Strategy, Asia Pacific & Japan, Symantec Corporation
    2017 will see even more IoT devices introduced into business networks, along with an increasingly mobile workforce enabled by cloud applications and services. This rapid evolution of the workplace necessitates a re-look at where the security industry should focus on, in the ongoing battle against cybercriminals.

    As 2016 comes to an end, our Security Intelligence team have compiled a list of the top security predictions for 2017 and beyond.

    Attend our ‘Security in 2017 and Beyond: Symantec’s Predictions for the Year Ahead’ webinar and join our discussion of the upcoming threat landscape.
  • Next Generation Endpoint Protection: Hype or Hope? Recorded: Nov 22 2016 64 mins
    Adrian Sanabria, Senior Security Analyst at 451 Research & Kevin Haley, Director Security Response at Symantec
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Attend this webcast to hear from 451 Research Security Analyst, Adrian Sanabria as he takes a closer look at the state of the market for Endpoint Protection. Symantec’s, Director of Security Response, Kevin Haley, joins Adrian, as he discusses the latest developments with Symantec Endpoint Protection 14 and it gives hope to customers trying to navigate this changing market.

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more

    Register Now
  • How to Gate, Watch and Guard your Sensitive Data Everywhere Recorded: Nov 8 2016 60 mins
    Sunil Choudrie, Global Solutions Manager Symantec and Jamie Manuel, Sr. Marketing Manager
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.
    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.
    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Symantec Advanced Threat Protection (ATP) Integration with SIEM/Workflow Recorded: Oct 20 2016 48 mins
    Alan Lee, Senior Manager, Product Management, Advanced Threat Protection, Symantec
    Symantec Advanced Threat Protection (ATP) – the industry’s leading network, email and endpoint protection solution – is upgrading its capabilities again this October. The new release of Symantec ATP adds Security Information and Event Management (SIEM) and workflow integration with Public API, Splunk, Service Now and more.

    This upcoming webinar explores how these new integrations can simplify threat management by giving you a better view of your security posture, enabling your security teams to quickly detect and respond to internal and external attacks, minimising the risk to safeguard your business.

    Join our upcoming webinar and learn about:
    •The importance of workflow for Incidence Response
    •How ATP uses data from Symantec Global Intelligence Network to detect potential targeted attacks
    •How integrating ATP with your SIEM solution allows for a unified view into your environment to help uncover attacks
    •The integrated incident response process that supports security incident investigation and remediation
    •The follow up actions required to close an incident
  • Phishing Readiness: People can be the weakest link Recorded: Sep 22 2016 38 mins
    Mr Noel Cheok, Strategy & Security Practice Leader, Cyber Security Services, Asia Pacific and Japan, Symantec
    Technology has become so integrated into our lives that messaging has become a habitual action. Unfortunately, this lack of mindfulness allows attackers to circumvent even the strongest cybersecurity technologies and defenses, through phishing emails and malicious hyperlinks.

    In an organisation, people are often the weakest link in the chain of cyber-security. Even the most conscientious employee may fall victim to a well-crafted phishing email, which can appear legitimate to untrained eyes.

    Join our upcoming webinar and learn about:
    -Why individuals fall victim to cyber-attacks
    -How to measure each employee’s susceptibility
    -How to identify individuals/departments most at risk
    -How smarter, individualised training helps

    Turn your weakest links into your strongest defenders against cyber-attacks today.
  • Intelligent Endpoint Security: Why Taking A Modern Approach Matters Recorded: Aug 18 2016 61 mins
    Robert Westervelt, Research Manager at IDC Security and Alejandro Borgia, VP Product Management at Symantec
    Endpoint security is a critical component in an organization's security program and is needed to gain the visibility necessary to rapidly detect threats and contain them before criminals gain access to critical resources.

    Join us for an interactive discussion and learn more about:

    • How emerging security technologies are helping organizations defend against targeted attacks that use zero-days and evasion tactics to evade detection

    • What technologies typically make up modern threat protection solutions and how they enable incident responders to quickly identify infected endpoints and determine the scope of an attack

    • Why endpoint visibility must be combined with network, web, and messaging security solutions to create a security architecture that works cohesively to reduce the amount of time an attacker has on infected systems

    • How risk assessment plays a role in strengthening your security to preempt future attacks
  • What makes a Next Gen SOC? Recorded: Jul 21 2016 52 mins
    Mr Peter Sparkes Senior Director, Cyber Security Services, Asia Pacific and Japan, Symantec
    As the business landscape redefines itself with the adoption of big data, mobile computing and social media, traditional Security Operations Centres (SOC) that only monitor an organisation’s network no longer provide adequate protection.

    In a Next Gen SOC, data monitoring extends beyond the organisation, into its cloud services, key executives’ personal email accounts, mobile devices, and more. Equipped with complex tools, strict processes, and experienced security analysts, a Next Gen SOC provides real-time and actionable intelligence, to better protect your organisation from the latest threats.

    Join our upcoming webinar and learn about:

    - Core requirements for a Next Gen SOC
    o Flexible Log Collection
    o Big Data Processing
    o Advanced Analytics
    o Real-Time Intelligence
    - SOC-centric services: Incident Response and Advanced Intelligence
    - SOC operating models – Building your own SOC, Operating Models & Extending Services
    - Developing the next generation of security professionals
  • How secure is your Office 365 deployment? Recorded: Jun 16 2016 59 mins
    Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
    Are you concerned about securing your users and data in cloud based collaboration applications like Office 365? You’re not alone. Over 35% of Microsoft Exchange installed base is now on Office 365. Many of these enterprises are actively seeking to extend the same level of security and consistent policies they have in place for existing on-premise and cloud applications, to Office 365.

    Consider these statistics from IDC:

    • Over 50% enterprises have users that access their Office 365 applications using unmanaged mobile devices
    • Over 90% of threats to enterprises emanate from email
    • 65% of threats go undetected for weeks/months

    IT administrators lose traditional visibility and control when enterprises move email, content creation, file sharing, and collaboration to the cloud; making it harder to detect inappropriate behavior. This makes it critical for organizations to extend the basic security capabilities of Office 365 and ensure consistency in the level of security across all their cloud services.

    Securing cloud applications like Office 365 is a shared responsibility between the cloud service provider and the tenant. Analysts like Gartner and IDC recommend assessing third party security products as a best practice in a comprehensive Office 365 security framework.

    Join us for this webcast where we tackle the challenge of securing Office 365 head on and show you how your organization can take Office 365 security to a new level.

    Learn how to enhance your Office 365 security to:

    • Shield Email From Phishing, Sophisticated Malware and Spam
    • Neutralize Advanced Threats and Targeted Attacks
    • Safeguard Your Sensitive Data
    •Control Access with Strong Authentication

    Symantec can help your organization enhance your security for Office 365 while enabling employee collaboration and productivity. Let us show you how!
Webinars targeted to software security professionals
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton suite of products for protection at home and across all of their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit http://www.symantec.com/en/aa/index.jsp or connect with us on Facebook, Twitter, and LinkedIn.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How secure is your Office 365 deployment?
  • Live at: Jun 16 2016 5:00 am
  • Presented by: Teresa Law, Sr. Product Marketing Manager, Symantec & Sunil Choudrie, Solutions Marketing Manager, Symantec
  • From:
Your email has been sent.
or close