Hi [[ session.user.profile.firstName ]]

Symantec IT Management Suite 8.0 Launch

The release of Symantec IT Management Suite 8.0 is rapidly approaching! Please join us for a special webcast on Wednesday, March 23 to learn how version 8.0 will make managing and protecting your IT environment even easier.

This event will feature a panel of customers who participated in our early adopter program. They will share their experience testing and using version 8.0.

IT Management Suite 8.0 includes several new exciting features and enhancements including:

• Expanded software license management capabilities and views
• FIPS compliance
• UI improvements
• Increased scalability

Don't miss this great opportunity to get the latest news and information on IT Management Suite 8.0.
Recorded Mar 23 2016 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hugo Parra, Director of Product Management; Damon Covey, Director of Solutions Product Management
Presentation preview: Symantec IT Management Suite 8.0 Launch
  • Channel
  • Channel profile
  • Systemhärtung: Schutz Ihrer Systeme auch wenn Patch Management keine Option ist! Jul 4 2017 12:00 pm UTC 60 mins
    Olaf Mischkovsky; Alexander Peters
    Wie der jüngste WannaCry Cyber Angriff gezeigt hat sind nicht gepatchte Systeme ein beliebtes Einfalltor für Schadcode unterschiedlichster Art und ein aktives Patch Management ist unbestritten eine der kritischsten Maßnahmen zum Schutz ihrer IT-Landschaft und sollte somit auf keinen Fall vernachlässigt werden.

    Allerdings gibt es in der Praxis in unterschiedlichsten Umgebungen (Produktion, Embedded Systeme, ältere oder statische Applikationsumgebungen um nur einige wenige zu nennen) valide und vielfältige Gründe warum Systeme nicht auf dem aktuellen Stand gehalten werden können.
    An dieser Stelle gibt es auch immer wieder Schwachstellen für die keine oder zumindest zum Zeitpunkt des Bekanntwerdens noch keine Updates zur Verfügung stehen und wir möchten in diesem Webcast aufzeigen wie mit Hilfe einer aktiven Systemhärtung Ihre System trotzdem geschützt werden können.

    Des Weiteren werden wir Ihn aufzeigen wie mit Hilfe einer solchen Lösung auch aktuelle und gepatchte Systeme auf einen höheres Schutzniveau gebracht werden können.
  • Methoden und Techniken bei gezielten Ransomware Attacken Jun 28 2017 9:00 am UTC 60 mins
    Candid Wueest, Andre Engel
    Aktuell werden gezielt Webserver, Cloud Datenbanken und IoT-Geräte durch ein professionelles Vorgehen kompromittiert

    Lernen Sie die technischen Details kennen, wie diese Angreifer vorgehen und wie Sie sich davor schützen können.
    Vor einiger Zeit hat die WannaCry Malware viele Unternehmen daran erinnert, wie verheerend ein erfolgreicher Ransomware Angriff sein kann. Glücklicherweise war WannaCry vergleichsweise einfach konzipiert. Es gibt jedoch wesentlich versiertere Angreifer, welche sich auf gezielte Ransomware Attacken gegen hochsensible Unternehmen-Daten spezialisiert haben.
    Mit APT-ähnlichen Methoden und Techniken werden die relevanten Unternehmensbereiche gezielt kompromittiert und per Lateral-Movement das interne Netz unterwandert. Webserver, Cloud-Datenbanken bis hin zu Industrieanlagen werden so gezielt angegriffen und von hochprofessionellen Erpressern blockiert bis zigtausende von Euros an Lösegeldzahlung geleistet werden. Selbst IoT Geräte wurden bereits „Opfer“ von Ransomware.

    In dem Webcast behandeln wir die Themen:

    •Infektionsvektoren von Ransomware (Email,Web und Exploits)
    •Rückblick WannaCry; Details über die Links zur Lazarus Gruppe und die Programmierfehler
    •TTP der SamSam Gruppe und anderen gezielten Ransomware-Attacken
    •Ransomware auf IoT (Unternehmen mit SmartTV und Mitarbeiter mit SmartWatch)
    •Einblick in den aktuellen Internet Security Threat-Report (ISTR) von Symantec
  • Countdown to GDPR with Symantec Recorded: Jun 22 2017 63 mins
    Keeping a handle on your organisation’s sensitive and personal information is a tough challenge. More data, more technology, more ways to communicate and more remote users. Start your journey to GDPR with the powerful integration of Symantec products and the join our webinar with our panel of experts to really understand how to navigate the technology to ensure your GDPR journey is a smooth one, and one that enhances your cyber and security processes at the same time.

    Now that the General Data Protection Regulation (GDPR) is almost here, you need better visibility over:

    1.Information risk – where it is, who uses it, and how much risk it’s at from breach, loss or misuse
    2.IT risk – so you can see how well protected information is within servers, networks, and the devices that house and transact it
    3.User risk – to know how much risk user behaviour poses to your information, systems, operations and brand reputation

    Join us for the first of our GDPR series, addressing technologies that help organisations determine data risk and protect data, devices, and networks against that risk.

    Register now for the second of our series in August looking at proactive technologies that can detect signs of a data breach and help respond more quickly and comprehensively.
  • EDR : une nouvelle approche face aux APT Recorded: Jun 15 2017 39 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Face aux APT de plus en plus intelligentes, quelles sont les méthodes à mettre en place pour minimiser les risques et adopter une stratégie plus efficace d'EDR (Endpoint Protection and Response) ?
    Assistez à ce webcast pour en savoir plus sur :
    - la protection supplémentaire apportée par l'EDR,
    - comment implémenter une solution EDR sans ajouter de complexité,
    - les critères d'évaluation de l'EDR.
  • A Step-By-Step Approach for Endpoint Detection & Response Recorded: Jun 14 2017 32 mins
    Scott Hardie & Gavin Fulton
    No question: Advanced Persistent Threats (APTs) are getting smarter. New question: what steps can you take to minimize the risks and create a more effective Endpoint Detection and Response (EDR) strategy?

    Register for our webinar series and learn a step–by–step method for eradicating endpoint threats. You’ll discover:
    •How EDR protects endpoints.
    •How to implement EDR without an extra agent.
    •Evaluation criteria for EDR solutions.
    Watch the webcast, then see our demo.
  • [Video Panel] Fighting Ransomware: Lessons from WannaCry Recorded: Jun 8 2017 50 mins
    Josh Downs, BrightTALK, Darren Thomson, Symantec; Chris Ross, Barracuda Networks
    - BrightTALK at Infosecurity Europe 2017 -

    One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.

    This expert panel will cover how the ransomware spread, why there's been an explosion over the last few years, why businesses are especially vulnerable and how the malware is more and more intertwined with crypto currencies.

    Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
  • Block The Risk Of Ransomware Recorded: May 18 2017 34 mins
    Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection
  • Securing Financial Services: Authentication, Encryption & Data Protection Recorded: May 17 2017 62 mins
    Financial institutions are the number one target for cyber criminals. So you need industry-leading information security to make sure you’re protected.

    This webinar explores how authentication and encryption are leading the way in advanced data protection. You’ll hear the industry’s leading thinkers discuss topics like preventing ransomware and guarding against cyber attacks.

    And with the risk of GDPR penalties getting closer, you’ll hear about how best practice data governance and compliance can help you avoid heavy fines.
  • Don't Cry Over WannaCry Ransomware Recorded: May 15 2017 39 mins
    Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • The Power of the Proxy Recorded: May 10 2017 17 mins
    Timothy Chiu is a Senior Director of Product Marketing for Symantec
    Have you wondered why security companies use proxy technology?

    Listen to our recorded webinar on the “Power of the Proxy” and find out:

    - Why proxy architecture is the most secure technology available on the network

    - How it enables the most advanced security products available today, including Symantec’s Secure Web Gateway products.
  • A New Dawn of Data Privacy Recorded: May 10 2017 3 mins
    Everything changes in 2018

    Is your organisation ready for the GDPR implementation in 2018? Our GDPR video perspective sets out the task ahead.
  • The 2017 ISTR: A Review Of The Threat Landscape Recorded: May 4 2017 59 mins
    Orla Cox, Director Development
    Cyber criminals are exploiting a new trend in 2017: it's easier to trick your users than to exploit software. Get the latest Internet Security and Threat Report (ISTR), volume 22 and learn why subversion is now a bold new tactic.

    Get the facts in this highly respected research report and learn why:
    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    •One in 131 emails contained a malicious link or attachment – highest rate in five years
    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom
    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000
  • Cyber Attack Trends 2017 Recorded: Apr 27 2017 57 mins
    Thomas Hemker, Candid Wueest
    Cyber Attack Trends 2017
  • Easy Ways To Improve Your Security Posture Recorded: Apr 27 2017 36 mins
    Kirk Gibbons System Engineer, Symantec and Q&A with Gavin Fulton & Sunil Choudrie
    Imagine if you could respond to vulnerabilities, in real-time, and prevent the spread of infection through your network. It’s possible—if your network and endpoints are fully integrated.

    •Do you know what makes it possible for Symantec to instantly deploy protection and detection improvements at the endpoints?
    •Ever learn how new REST APIs effectively orchestrate automated, rapid response at the endpoint?
    •Are you aware of what new advancements are on the horizon to prevent new, unknown threats?

    Learn how Symantec Endpoint Protection 14 and Secure Web Gateway work together to detect, protect and provide rapid response to known and, most importantly, unknown threats.
  • Interview: CTO of Symantec on advanced cybersecurity Recorded: Apr 24 2017 22 mins
    Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Zero-Day Attacks and What To Do About It Recorded: Apr 20 2017 35 mins
    Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • Block The Risk Of Ransomware Recorded: Mar 30 2017 34 mins
    Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • Effective Patch Strategies for Windows 10 and Office 365 Recorded: Mar 9 2017 44 mins
    Damon Covey, Director of Solutions Product Management, Symantec
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Comment protéger et surveiller vos données sensibles en tous lieux Recorded: Feb 24 2017 44 mins
    Hervé Doreau, Directeur Technique - Symantec France
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • Cyberangriffe verhindern - sensible Daten schützen Recorded: Feb 23 2017 59 mins
    Thomas Hemker, Matthias Senft
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Symantec IT Management Suite 8.0 Launch
  • Live at: Mar 23 2016 3:00 pm
  • Presented by: Hugo Parra, Director of Product Management; Damon Covey, Director of Solutions Product Management
  • From:
Your email has been sent.
or close