Hi [[ session.user.profile.firstName ]]

Don’t allow security & data regulations to slow business transformation

The adoption of SaaS is accelerating faster than expected. However, as this SaaS adoption accelerates, enterprises are discovering various legal and regulatory data compliance responsibilities that maybe challenging to address in a seamless manner or potentially slow down the adoption of SaaS applications and potentially innovation.

Discover..

• How enterprises can leverage the full value of SaaS applications such but fully meet complex data compliance needs without impacting the usability of the SaaS application. Learn how sensitive data can be protected yet leverage the full benefits of the SaaS application without breaking SaaS application functionality such as searching, sorting and reporting of sensitive data.

• The different methods of data obfuscation such as 'data tokenization' and 'data encryption' and understand the specifics when meeting and demonstrating data compliance in a SaaS environment.

• If SaaS vendor application encryption can be relied upon to address your enterprises data compliance requirements when the sensitive data is encrypted just at rest. What are the data compliance implications of key management and who controls the encryption keys?
Recorded Nov 9 2016 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sunil Choudrie, Global Solutions Marketing Mngr - Symantec & Ravi Pather, VP EMEA, Cloud Data Protection Solutions - Bluecoat
Presentation preview: Don’t allow security & data regulations to slow business transformation
  • Channel
  • Channel profile
  • Not All Endpoint Protection Platforms Are Created Equal Sep 12 2017 10:00 am UTC 60 mins
    Torry Campbell, Senior Director Product Management, Symantec
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Preparing for GDPR Aug 17 2017 2:00 pm UTC 45 mins
    Symantec
    Identity, Data Protection & Securing the Modern Business

    Almost every successful cyber attack relies on a compromised identity. With cybercrime on the rise and attackers becoming more sophisticated, organizations worldwide need to remain vigilant in protecting their data assets and staying up to date on important regulation. Identity management, authentication and encryption, as well as compliance are essential to securing the modern business. The world's top security experts will discuss how technology, regulation and culture work together to build a robust cybersecurity posture.

    PREPARING FOR GDPR
    GDPR will be the word on every security professional's mind for the next 12 months; get the lowdown on the steps to take and the considerations to make to be ready for May 2018.

    Register now for the second of our series in August looking at proactive technologies that can detect signs of a data breach and help respond more quickly and comprehensively.
  • Introducing Mobile Threat Defense for the Cloud Generation Aug 1 2017 3:00 pm UTC 60 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Defend Your Endpoints Against Ransomware Attacks Recorded: Jul 24 2017 16 mins
    Yvonne Dresser, Senior Manager Product Strategy, Symantec
    Small and medium-sized businesses are not immune to targeted attacks, such as ransomware and zero-day threats, and require a powerful yet simple solution to protect their endpoints against these advanced threats. Watch this short webinar to learn how Symantec Endpoint Protection Cloud (SEP Cloud) protects PC, Mac, and mobile endpoints and servers with its advanced multi-layered threat prevention solution.
  • Comparing Next Generation Firewalls to Proxy Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure.
  • Taking Proxy to the Cloud Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service.
  • Protecting Sensitive Data in the Cloud Recorded: Jul 21 2017 2 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    In this short video learn how Proxy and DLP enables information security on prem or in the cloud
  • Proxy Essentials Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.
  • Finanziell motivierte Attacken - Auszug aus Security Threat Report ISTR 22 Recorded: Jul 19 2017 58 mins
    Candid Wueest
    Internet Security Threat Report ISTR
    Analyst: Candid Wueest

    Sprache: DEUTSCH


    Hintergrund:
    Die Malware-Angriffe im Finanzwesen waren doppelt so häufig wie Ransomware-Attacken:
    •Die Threat-Landschaft im Finanzwesen stand 2016 ganz im Zeichen dreier Trojaner.
    •Die Finanzabteilungen der Unternehmen rücken zunehmend in den Fokus der Angreifer.

    Wenn Medien aktuell über IT-Security berichten, steht fast immer Ransomware im Mittelpunkt. Andere Threats – etwa die Malware, mit der Cyberkriminelle Einrichtungen des Finanzwesens und deren Endkunden ins Visier nehmen – erhalten dafür so gut wie keine Beachtung. Dabei ist auch diese Bedrohung höchst real und höchst gefährlich, sowohl für die Einrichtungen selbst als auch für die Verbraucher: Wie der Internet Security Threat Report 2017 belegt, sind Angriffe auf Banken und Bankkunden wesentlich häufiger als Ransomware-Attacken. Jedes Jahr werden in diesem Bereich über 1,2 Millionen Threats entdeckt – mehr als doppelt so viele wie bei der Ransomware.

    Melden Sie sich noch heute zu unserem Webcast an:
    Internet Security Threat Report ISTR
    Zur Bedrohungslage im Finanzwesen

    Alle Teilnehmer erhalten eine Executive Summary, die wesentliche Erkenntnisse und Analysen beinhaltet:
    •Gezielte Angriffe auf Banken und Bankkunden
    •Infektionsvektoren, Häufigkeit und Ausbreitung
    •Taktiken, Technologien und Abläufe
    •Angriffe auf Geldautomaten, Point-of-Sale-Systeme und Mobilgeräte


    Melden Sie sich bitte noch heute an!
  • Year in Review: Financial Sector Threat Activity Recorded: Jul 13 2017 59 mins
    Candid Wueest, Threat Researcher, Symantec Security Response
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • Integrating threat Isolation with SWG and SMG (4:00pm GMT) Recorded: Jul 11 2017 32 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Symantec Information Centric Security Recorded: Jul 5 2017 2 mins
    Darren Thomson, CTO and Vice-President of Technology, EMEA, Symantec
    One of the common problems facing a CIO is knowing where their data is! Symantec’s new Information Centric Security platform combines Symantec’s CASB, encryption, DLP and authentication technologies to track and follow data and impose a security regime on the data wherever it is.
  • Security Analytics Recorded: Jul 5 2017 24 mins
    Andy Shepherd, Senior Systems Engineer, Symantec
    Andy discusses Symantec Security Analytics, using full Packet Capture, and shows you how analysing system logs can help you to pinpoint and identity activity and incidents that require further investigation.
  • Life in the SOC Trenches Recorded: Jul 5 2017 10 mins
    Stefan Sarnblom Senior Principal Specialist Security Engineer & Andy Shepherd, Senior Systems Engineer, Symantec
    Andy and Stefan discuss what the day to day work for an analyst in a SOC looks like with David McClelland - what do they, how do they do it, and what they need to think about to review, analyse, and validate threats.
  • Securing your Workloads in the Cloud Recorded: Jul 5 2017 15 mins
    Steve Broadwell, Senior Systems Engineer, Symantec
    Steve shares his insights on protecting the cloud and demos Symantec Cloud Workload Protection. Moving your move workloads from the datacenter into the cloud and importantly how you protect your workloads in the cloud.
  • Customer Story: Williams Martini Racing Recorded: Jul 5 2017 13 mins
    Clive Finlay, Symantec
    Clive discusses how the Williams Martini Racing team use Symantec technologies to help secure their data across endpoints, the datacenter and in the cloud.
  • Symantec Information Centric Encryption Recorded: Jul 5 2017 18 mins
    Sunil Choudrie, Global Product Marketing Manager, Symantec
    Sunil introduces Information Centric Encryption and shows how Symantec is innovating to help organisations not just protect sensitive data, but also ensure that this protection follows the data wherever it goes, ensuring that only the intended user has access.
  • The Human Nature of Cyber Security Recorded: Jul 5 2017 21 mins
    Dr Jessica Barker, Independent Information Security Consultant
    How to understand the risk and human behavior in an Organisation, while engaging and educating people in cyber security to encourage the behaviours you want.
  • Re-centering the value of security ((or The Law of Unintended Consequences) Recorded: Jul 5 2017 20 mins
    Darren Thomson, CTO and Vice-President of Technology, EMEA, Symantec
    As more and more everyday items become connected, the gathering and correlation of their data will change our lives. Whilst enormously exciting, it is time that we started to focus on the question of "Should We?" as well as "Could We?" This session will consider the implications of current innovation in the "Internet of Things (IoT)" and how the security industry will need to evolve to protect us all in the years to come.
  • Malicious Network of Things Recorded: Jul 5 2017 23 mins
    Waylon Grange, Senior Security Researcher, Symantec
    The security of the Internet of Things has long been debated, with researchers showing the vulnerability of virtually any device to hacking. This year, cyber criminals and targeted attacks have regularly used "Things" to infiltrate, exfiltrate, and attack: Metasploit modules for light bulbs and DDoS attacks from web cameras (Mirai) are two examples. This presentation will provide unique insight into professional attack campaigns leveraging the IoT.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Don’t allow security & data regulations to slow business transformation
  • Live at: Nov 9 2016 11:00 am
  • Presented by: Sunil Choudrie, Global Solutions Marketing Mngr - Symantec & Ravi Pather, VP EMEA, Cloud Data Protection Solutions - Bluecoat
  • From:
Your email has been sent.
or close