Browse communities
Browse communities
Presenting a webinar?

Understanding Email Data Protection

Brian Tokuyoshi, Product Marketing Manager
Email is an essential form of communication, but it also a potential source of compliance and data loss issues. If an email gets in the hands of an unauthorized party, it could lead to exposure of personal information, a breach of the separation of duties, or even require data breach notification.

In order to keep email communication secure, organizations are turning towards data protection solutions. But which one? There are many different approaches to email data protection and it can be hard to sort out which is the best method for your company.

In addition, with proper data protection, email can lead to significant cost savings through the adoption of electronic statement delivery. Find out how to adapt your green initiatives to lead to hard savings.

In this session, learn:

* How compliance and data breach notification laws affect email communication
* Different approaches to email data protection
* Facts about PGP solutions for email
Mar 18 2010
46 mins
Understanding Email  Data Protection
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (115)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Η Κορυφαία Κρυπτογράφηση για την Απόλυτη Προστασία Δεδομένων Recorded: Mar 15 2012 2 mins
    Paris Kaskas, Technology Sales Consultant
    Στην σημερινή εποχή της ύφεσης και της αβεβαιότητας η κλοπή ή απώλεια δεδομένων μπορεί να επιφέρει τρομακτικές επιπτώσεις στην λειτουργία αλλά και στην φήμη στον χώρο των επιχειρήσεων και των οργανισμών.
    Δείτε πως μπορείτε εύκολα, άμεσα και οικονομικά να προστατεύσετε την ευαίσθητη πληροφορία σας με την πρωτοπόρα λύση κρυπτογράφησης της Symantec.
  • Integrare Data Loss Prevention con Encryption per una più efficace protezione de Recorded: Dec 13 2011 53 mins
    Davide Veneziano, Technical Sales Organization
    This webcast is in Italian.

    Come le soluzioni Symanteci Data Loss Prevention e Symantec PGP possono essere integrate per offrire una protezione della proprietà intellettuale estremamente efficace e flessibile.
  • Getting Started with DLP: Quick Wins for Success Recorded: Nov 8 2011 28 mins
    Mike Jones, Senior Manager, EMEA Product Marketing
    Are you thinking about deploying data loss prevention (DLP), but not sure where to start? Join this webcast to learn how you can achieve quick wins and reduce your data loss risk. You'll hear best practices based on customer experiences.

    During this webcast, attendees will learn:

    - Key DLP Requirements
    - How DLP Works
    - Key pre-technology lessons from customers
    - Key rollout lessons
    - How to move your DLP project forward
  • Smarter Than You Think: DLP Learns to Protect Hard-to-Find IP Recorded: Oct 11 2011 35 mins
    Mike Jones, Senior Manager, EMEA Product Marketing
    Are you worried about protecting your intellectual property (IP), but can’t get your arms around it? Finding data is like looking for the proverbial needle in the haystack. IP is buried in documents, spreadsheets and reports across your network. A new DLP technology based on machine learning, a branch of artificial intelligence, now makes it simpler to find and protect IP.

    During this webinar, viewers will learn:

    • The Challenge of Finding IP
    • A New Way to Find & Protect IP
    • How Vector Machine Learning Works
    • Automated Zero-Day Protection for Data
    • The New ABCs of DLP: Describe, Fingerprint & Learn
  • Covering Your Bases, Encrypting Your Data in More Places: Encryption & Mobility Recorded: Sep 29 2011 56 mins
    Brian Tokuyoshi, Senior Product Marketing Manager, Symantec
    The benefits of mobile computing come at a price for information security professional. Employees want the benefit of being able to access information on the go, but what risks does mobility pose to sensitive data? In this session, learn about the deployment issues associated with protecting data on the go. Ensure that employees can handle data safely when using smartphones, laptops and removable storage.
  • Getting Started with Data Loss Prevention: Quick Wins for Success Recorded: Sep 15 2011 57 mins
    Joseph O’Laughlin, Product Marketing Manager, Symantec and John Townsend, Manager, Information Protection & Security, DTE
    Are you thinking about deploying data loss prevention (DLP), but not sure where to start? Join this webcast to learn how you can achieve quick wins and reduce your data loss risk. You’ll hear best practices from an InfoSec veteran who has had success with DLP.

    During this webcast, attendees will learn:

    • Security Trends Driving DLP Projects
    • Key DLP Requirements
    • How DLP Works
    • The True Life Story of DTE Energy’s DLP Program
  • Protecting Your Information in the Age of WikiLeaks Recorded: Sep 13 2011 2 mins
    Mike Jones, Senior Manager, EMEA Product Marketing
    We’ve entered a new era in which organizations suddenly find their most confidential information splashed across the Internet. In the wake of this intense media attention, you may be asking yourself, “What steps can I take to help my company avoid this same fate?”

    Symantec has been working with financial services customers who are concerned about preventing these same issues. We have developed a set of best practices that can help defend against these types of breaches.

    Viewers will learn:

    • How to identify the internal and external risks that could lead to a data breach
    • Recommended counter measures from financial services customers on how to defend against these types of breaches
  • Building Trusted Banking Apps for the iPad – How Hidden 2FA Helped USAA Recorded: Sep 1 2011 47 mins
    Brendon J. Wilson, Senior Product Marketing Manager, User Authentication
    Users are increasingly adopting smart phones and tablet devices as their default computing platform. In response to this trend, businesses are delivering applications to these devices to deliver new products, streamline customer service, and drive customer satisfaction. However, exposing information via mobile devices risks exposing users’ information to unauthorized access. Reducing this risk demands an authentication solution for your mobile application that balances the need for security with a simple user experience.

    Join Symantec’s User Authentication group for this one-hour webcast to learn how USAA, a leading provider of financial services, embedded Symantec strong authentication into its mobile application to deliver a superior and secure user experience that accelerated adoption of its mobile banking application.
  • Hardware Based Encryption is Here, Now What? Recorded: Aug 18 2011 39 mins
    Kelvin Kwan, Product Marketing Manager
    IT organizations have been asking about support for Opal-compliant self-encrypting drives for quite awhile now. Opal-compliant hardware availability is slowly trickling out to the purchasing public. The question then becomes, “It’s here! What do I do next?”

    Join us for this informative session on hardware-based encryption as we’ll talk about managing these new hardware based encrypted drives, as well as your existing software based encrypted drives. We’ll discuss the advantages and disadvantages of self-encrypting drives vs. the standard non-encrypting drives. We’ll also discuss deployments and management of self decrypting drives, and managing these hybrid encryption environments.
  • The Trusted Front Door: Cloud-based Authentication Solutions Recorded: Aug 4 2011 60 mins
    Brendon J. Wilson, Sr. Product Marketing Manager, User Authentication
    The perimeter around the modern enterprise has become increasingly porous over the past five years. Employees that traditionally resided within the organization’s four walls have altered their work patterns and become increasingly mobile. At the same time, the accelerating pace of business has forced enterprises to open their networks to business partners to obtain or deliver new services faster, and more cost-effectively. While these new patterns of behavior drive productivity, they also increase an organization’s exposure to risk. A key struggle for a modern enterprise is enabling access to sensitive networks, applications, and data – but only to the right individuals. This session will detail how modern strong authentication solutions can provide secure access to sensitive information and applications, while accounting for the unique needs of different business partners, employees, and customers.
  • What’s New with Symantec Encryption Recorded: Jul 28 2011 51 mins
    Brian Tokuyoshi, Sr. Product Marketing Manager
    IT organizations with the mandate to encrypt information are finding that there is more data in more places. This leads to the question of how to build a proper strategy to ensure that it is protected in all places, and keep it running with strong management tools.

    In this session, learn about how IT issues such as mobility and management affect encryption requirements.

    Attend this session if you have questions such as:

    • How can I let my employees use iPads with encrypted email?
    • What considerations do I need to think about with hardware-based encryption?
    • How can I make sure that my encryption deployments are always well managed?

    Join this webcast to find out what’s new with Symantec’s encryption solutions, and get a clear understanding on how to protect more data in more places.
  • Smarter Than You Think: DLP Learns to Protect Hard-to-Find IP Recorded: Jun 30 2011 53 mins
    Linda Park, Sr. Product Marketing Manager and Phil DiCorpo, Sr. Product Manager
    Are you worried about protecting your intellectual property (IP), but can’t get your arms around it? Finding data is like looking for the proverbial needle in the haystack. IP is buried in documents, spreadsheets and reports across your network. A new DLP technology based on machine learning, a branch of artificial intelligence, now makes it simpler to find and protect IP.

    During this webinar, viewers will learn:

    • The Challenge of Finding IP
    • A New Way to Find & Protect IP
    • How Vector Machine Learning Works
    • Automated Zero-Day Protection for Data
    • The New ABCs of DLP: Describe, Fingerprint & Learn
  • Nach Hackerangriff auf RSA SecurID: Sind Sie noch geschützt? Recorded: Jun 27 2011 29 mins
    Matthias Senft, Senior Systems Engineer, TC TrustCenter GmbH - Now part of Symantec
    In den letzten Wochen haben Hacker angeblich mithilfe duplizierter RSA SecurID-Token versucht, in die hochsensiblen Netzwerke mehrerer Unternehmen einzudringen. Diese Angriffe erfolgten nach vorangegangenen Zusicherungen von RSA, dass während eines Einbruchs bei RSA gestohlene Informationen nicht für direkte Angriffe auf seine Kunden verwendet werden könnten.

    Als Folge dieser Angriffe besteht bei vielen Unternehmen ein verstärktes Interesse an einer sicheren Alternative, um das Risiko eines ähnlichen Sicherheitsverstoßes auf ein Minimum zu reduzieren.

    Informieren Sie sich in unserem Webcast über:
    • Mögliche Auswirkungen, die diese Art von Angriff auf die Risikoanfälligkeit Ihres Unternehmens haben kann, und welche Kosten dadurch entstehen können
    • Eine Strategie, um schnell und problemlos wichtige Systeme auf eine sichere Alternative umzustellen
    • Möglichkeiten, diesen Sicherheitsvorfall als Chance für Ihr Unternehmen zu nutzen
    • Lukrative finanzielle Anreize, mit denen Symantec Ihnen den Wechsel erleichtert
  • After The RSA SecurID Breaches: Are You Still Protected? Recorded: Jun 23 2011 58 mins
    Brendon Wilson, Sr. Product Marketing Manager
    In recent weeks, attackers allegedly using duplicate RSA SecurID tokens have attempted to gain access to several organizations’ sensitive networks. These attacks follow previous assurances by RSA that information extracted during the RSA breach could not be used to enable a successful direct attack against its customers.

    In the wake of these attacks, many organizations are now seeking a secure alternative to mitigate the risk of experiencing a similar breach.

    Join us for this hour webcast to learn:

    • The potential impact this kind of breach could have on your organization’s risk and costs
    • A strategy to quickly and easily migrate critical systems to a secure alternative
    • How you can transform this incident into an opportunity for your business

    This session will be repeated at 12h00 BST
  • After the RSA SecurID Breaches: Are You Still Protected? Recorded: Jun 23 2011 36 mins
    Mike Jones, Senior Manager, EMEA Product Marketing
    In recent weeks, attackers allegedly using duplicate RSA SecurID tokens have attempted to gain access to several organisations' sensitive networks. These attacks follow previous assurances by RSA that information extracted during the RSA breach could not be used to enable a successful direct attack against its customers.

    In the wake of these attacks, many organisations are now seeking a secure alternative to mitigate the risk of experiencing a similar breach.

    Join us for this webcast to learn:

    • The potential impact this kind of breach could have on your organisation's risk and costs
    • A strategy to quickly and easily migrate critical systems to a secure alternative
    • How you can transform this incident into an opportunity for your business
    • A fantastic financial incentive Symantec has to further help your transition

    This session will be repeated at 12h00 EST.
  • Data Loss Prevention (DLP) Techniques Recorded: Jun 16 2011 50 mins
    Clive Finlay, Senior Principal Presales Consultant, Symantec
    This session will focus on how to get the most from your Data Loss Prevention (DLP) technologies, through some new functionalities.

    DLP simplifies the detection and protection of enterprises’ most valuable information – their intellectual property. During this webinar, fInd out more about Symantec's major new release of the leading data security suite features including:

    - The ability to streamline remediation of Data at Rest - network folder risk scoring

    - Added Protection at the Endpoint through Application File Access Control
  • Protecting Your Information in the Age of WikiLeaks Recorded: Jun 1 2011 49 mins
    Robert Hamilton, Sr. Product Marketing Manager, Symantec
    We’ve entered a new era in which organizations suddenly find their most confidential information splashed across the Internet. In the wake of this intense media attention, you may be asking yourself, “What steps can I take to help my company avoid this same fate?”

    Symantec has been working with financial services customers who are concerned about preventing these same issues. We have developed a set of best practices that can help defend against these types of breaches.

    Viewers will learn:

    • How to identify the internal and external risks that could lead to a data breach
    • Recommended countermeasures from financial services customers on how to defend against these types of breaches
  • Yellow Thursdays Webcast: Symantec PGP Email Encryption Overview Recorded: May 19 2011 46 mins
    Wolf Schreiner, Product Leader, Encryption, Symantec EMEA
    This is an in-depth look of how to use Symantec email encryption solutions including the Symantec PGP Universal Gateway Email and Symantec PGP Desktop email . Symantec PGP Email encryption application which can be adapted to a wide variety of enterprise needs. In this web cast we’ll examine how to protect email and enable organisations to encrypt email both internally and externally to allow 3rd parties to share the benefits of encrypted communications distributed to partners and customers. We’ll also demonstrate how PGP Universal Server is able to provide centralised key generation and lookup, and improved logging, reporting and overall management of keys.

    This is a technical presentation and a detailed understanding of encryption techniques is recommended.
  • Integrating Endpoint Encryption and Endpoint DLP Recorded: Apr 27 2011 62 mins
    Sandler Rubin, Senior Product Manager, Symantec Corporation
    Please join us to hear how you can protect against loss and theft of your IP, through the latest integration of Symantec Data Loss Prevention (DLP) and Endpoint Encryption.

    According to the latest Forrester research, most companies are under-invested in protecting their IP. If you’re like most of your peers, you’ve already taken steps to protect credit card data – but what are you doing to protect your IP?
    Through this integration of DLP and Endpoint Encryption, you can:
    •Quickly identify laptops and desktops that contain your IP and take steps to clean them up
    •Protect against laptop loss or theft that may lead to exposure of your IP
    •Reduce legal costs associated with IP theft by blocking malicious activity
    •Monitor and apply policy around how your IP is being used while employees are off your trusted network
    In this age of Stuxnet and WikiLeaks, malicious attacks are designed specifically to capture IP - with potentially devastating results. Attend this webcast to learn how you can protect your firm from these emerging threats through defense in depth at the endpoint from Symantec
    .
  • Two-Factor-Authentication (German) Recorded: Jan 25 2011 41 mins
    Matthias Senft, Sales Engineer, TC TrustCenter - Now part of Symantec
    Identitätsdiebstahl, Phishing und Online-Betrug verursachen wachsende Besorgnis beim Verbraucher und führen bei Anbietern zu steigenden Kosten durch Schadensbehebung, Bußgelder und Imageeinbußen. Auch die zunehmende Notwendigkeit, externen und internen Mitarbeitern, Dienstleistern und Geschäftspartnern Zugriff auf Unternehmensdaten zu ermöglichen, führt zu einem erhöhten Bedarf an starker Authentifizierung.

    Eine empfohlene Methode zum Schutz der digitalen Identitäten ist die Zwei-Faktor-Authentisierung, die vertrauenswürdig, benutzerfreundlich und kostengünstig einsetzbar ist. Bei der Zwei-Faktor-Authentisierung wird zur Verifizierung einer Identität oder einer Transaktion Wissen (z. B. Benutzername und Passwort) mit Besitz (ein Credential z. B. in Form eines Token) kombiniert.

    In unserem Webcast stellen wir Ihnen die Einsatzmöglichkeiten von Zwei-Faktor-Authentisierung und die Besonderheiten unserer Cloud-basierten VIP Authentication Services vor. Erfahren Sie in unserem Webcast, wie Sie bei der Umsetzung von Zwei-Faktor-Authentisierung mit VIP einen deutlichen Kostenvorteil und Geschwindigkeitsvorsprung gegenüber typischen Marktlösungen erzielen können.

    Webcast Inhalte:
    - Einsatzszenarien von Zwei-Faktor-Authentisierung
    - VIP Authentication Services: Vorteile einer Cloud-basierten Zwei-Faktor-Authentisierung
    - Im mobilen Einsatz: VIP Access for Mobile
Webcasts targeted to software security professionals
Symantec Corporation is a global leader in Email and Data Encryption software and Data Loss Prevention providing Trusted Data Protection. Our presenters usually are combined with a customer, analyst or partner. We plan a webcast once a month and they are targeted to software security professional.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Understanding Email Data Protection
  • Live at: Mar 18 2010 3:30 pm
  • Presented by: Brian Tokuyoshi, Product Marketing Manager
  • From:
Your email has been sent.
or close
You must be logged in to email this