Hi [[ session.user.profile.firstName ]]

Play 'Follow the URL' to outsmart the latest Dridex attacks

Experts estimate that over 90% of all emails contain a URL and URLs are the primary 'call to action' for spam, phishing and malicious emails.

Typically, URL blacklists have been an effective weapon to block unwanted emails. However as the threat landscape continues to change and attackers are adopting more and more evasive techniques a new approach is required.

Real time URL Link Following, which is unique to Symantec Email.cloud, combining the best of Symantec's Threat Intelligence with an innovative approach to following and block URL links in real time.

Come join us for this webinar as we discuss how Symantec's Real time URL link Following has evolved from fighting the abuse of web shorteners to being an essential arsenal in the fight against modern malware and ransomeware attacks.
Recorded Jun 7 2016 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jane Wong, Director, Enterprise Security Products at Symantec and Dermot Harnett, Director STAR, at Symantec
Presentation preview: Play 'Follow the URL'  to outsmart the latest Dridex attacks
  • Channel
  • Channel profile
  • Toutes les plateformes de protection ne se valent pas Sep 12 2017 12:00 pm UTC 75 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Prévenir, détecter, répondre et contrôler, le tout via un seul agent

    Savez-vous que McAfee n'apparait plus en tant que leader dans le Magic Quadrant ? Combien d'agents/modules vous recommandent-ils pour protéger vos terminaux ? Combien de serveurs pour gérer l'infrastructure ? Et avec tout ça, avez-vous le niveau requis de protection contre les menaces avancées ?

    Symantec propose la solution de sécurité des terminaux la plus complète du marché - de la prévention et la détection des menaces, jusqu'à la réponse et au contrôle, avec la plus grande efficacité et haute performance.

    Lors de ce webcast, vous en saurez plus sur comment :

    · améliorer considérablement votre posture de sécurité et de protection grâce aux technologies next-gen telles que Advanced Machine Learning et Exploit Prevention

    · lancer des procédures d'investigation et de réponse à incidents grâce au même agent utilisant la solution intégrée Endpoint Detection and Response

    - obtenir automatiquement un assessment des risques et mesurer l'efficacité du changement de vos politiques via une console cloud

    · réallouer certaines ressources IT sur des projets plus structurants et réduire la compléxité grâce à l'intégration dans un seul agent

    · migrer facilement et rapidement

    Une demo vous sera également proposée pour vous montrer comment Symantec contre les ransomwares et menaces inconnues grâce à ses technologies Next-gen au sein d'un même agent léger.
  • Not All Endpoint Protection Platforms Are Created Equal Sep 12 2017 10:00 am UTC 60 mins
    Torry Campbell, Senior Director Product Management, Symantec
    Prevent, detect, respond and assess, all through a single agent

    Did you know McAfee is no longer a leader in industries Magic Quadrant? While your endpoint security is at risk, how many agents/modules do they require you to install? How many servers? And with all that, are you getting the right level of endpoint protection against advanced threats?

    Symantec provides the most complete endpoint security in the world - from threat prevention, detection, response and assessment with the highest efficacy and performance.

    In this webinar, you’ll learn how to:

    · Drastically improve your protection and security posture with various next-gen capabilities like Advanced Machine Learning and Exploit Prevention

    · Perform incident investigation and response using the same agent using the integrated Endpoint Detection and Response solution

    - Obtain automated security risk assessment and track effectiveness against security policy changes via a cloud console

    · Lower your IT burden and reduce complexity with everything built into a single agent

    · Facilitate a painless migration and get your IT staff up-to-speed

    Finally, see a demo that showcases how Symantec stops ransomware and unknown threats with Next-gen technologies built into a single light weight agent.

    Register Today!
  • Protéger vos terminaux et serveurs contre les ransomwares Aug 23 2017 12:30 pm UTC 45 mins
    Aymen Ben Aouicha, Ingénieur Avant-Vente, Symantec France
    En tant que PME, vous n'êtes pas immunisées contre les attaques ciblées, les ransomwares et les vulnérabilités Zero Day. Vous avez besoin d'une solution simple et efficace pour protéger vos terminaux contre ces menaces avancées. Assistez à ce court webcast pour savoir comment Symantec Endpoint Protection Cloud (SEP Cloud) protège vos PC, Mac, mobiles et serveurs grâce à ses technologies multicouches de protection des menaces.
  • Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise Recorded: Aug 22 2017 30 mins
    Michael Mauch
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.

    In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    ●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
    ●Symantec BC Proxy SG is the best security defense.
    ●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
  • Secure Web & Cloud Gateway: Security & Threat-Protection for the Enterprise Recorded: Aug 18 2017 28 mins
    Michael Mauch
    For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.

    Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.

    In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.

    ●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
    ●Symantec BC Proxy SG is the best security defense.
    ●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
  • Preparing for GDPR: Are identity management and authentication core to GDPR? Recorded: Aug 17 2017 48 mins
    Sian John, Symantec & Enza Iannopollo, Forrester
    You’re preparing for GDPR. You’re auditing your information. You’re reviewing your security systems. But is this enough? Join us at Part Two of this BrightTALK webinar series where Symantec experts and a guest speaker from Forrester discuss how to ensure your security strategy is primed for GDPR.

    You’ll learn the proven milestones to bring together the people, policies and processes that will make your GDPR preparations more successful – and how other businesses have done so.
    Other topics will include:

    •Identifying gaps in your strategy
    •How to prioritise remediation and investments
    •How to protect user identities and authentication so that they can’t be used to break into your personal and sensitive information.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Recorded: Aug 17 2017 63 mins
    Josh Downs, BrightTALK; Stuart McKenzie, Mandiant; Sian John, Symantec; Nigel Tozer, Commvault & Tim Hickman, White & Case
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Introducing Mobile Threat Defense for the Cloud Generation Recorded: Aug 1 2017 61 mins
    Sri Sundaralingam, Head of Product Marketing, Enterprise Security Products, Symantec and Varun Kohli, VP Marketing, Skycure
    Learn how you can protect both BYOD and corporate managed mobile devices from ransomware and advanced threats.

    Malware targeting mobile devices are growing at an alarming rate. According to Symantec ISTR 22 report, mobile malware detections doubled in 2016 to a total of 18.4 million and there were 606 new mobile vulnerabilities found in 2016 on both iOS and Android mobile operating systems.

    This has increased the risks to BYOD and corporate managed mobile devices to malware attacks, suspicious wireless networks and man-in-the-middle attacks.

    Existing management tools like Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) are not able to defend users against these types of threats. Enterprises need advanced mobile security with high efficacy with easier deployment options as they continue to expand Bring Your Own Device (BYOD) and corporate managed mobility initiatives.
  • Defend Your Endpoints Against Ransomware Attacks Recorded: Jul 24 2017 16 mins
    Yvonne Dresser, Senior Manager Product Strategy, Symantec
    Small and medium-sized businesses are not immune to targeted attacks, such as ransomware and zero-day threats, and require a powerful yet simple solution to protect their endpoints against these advanced threats. Watch this short webinar to learn how Symantec Endpoint Protection Cloud (SEP Cloud) protects PC, Mac, and mobile endpoints and servers with its advanced multi-layered threat prevention solution.
  • Comparing Next Generation Firewalls to Proxy Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    Learn about the complementary capabilities of Secure Web Gateways and Next Generation Firewalls and why each is important in an enterprise’s security infrastructure.
  • Taking Proxy to the Cloud Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This quick video reviews the important capabilities a cloud-based proxy solution can provide enterprises and discusses key aspects of Symantec’s Web Security Service.
  • Protecting Sensitive Data in the Cloud Recorded: Jul 21 2017 2 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    In this short video learn how Proxy and DLP enables information security on prem or in the cloud
  • Proxy Essentials Recorded: Jul 21 2017 3 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec
    This short video highlights the key capabilities of Secure Web Gateway proxies that enterprises need to implement to secure their use of web and cloud applications.
  • Finanziell motivierte Attacken - Auszug aus Security Threat Report ISTR 22 Recorded: Jul 19 2017 58 mins
    Candid Wueest
    Internet Security Threat Report ISTR
    Analyst: Candid Wueest

    Sprache: DEUTSCH


    Hintergrund:
    Die Malware-Angriffe im Finanzwesen waren doppelt so häufig wie Ransomware-Attacken:
    •Die Threat-Landschaft im Finanzwesen stand 2016 ganz im Zeichen dreier Trojaner.
    •Die Finanzabteilungen der Unternehmen rücken zunehmend in den Fokus der Angreifer.

    Wenn Medien aktuell über IT-Security berichten, steht fast immer Ransomware im Mittelpunkt. Andere Threats – etwa die Malware, mit der Cyberkriminelle Einrichtungen des Finanzwesens und deren Endkunden ins Visier nehmen – erhalten dafür so gut wie keine Beachtung. Dabei ist auch diese Bedrohung höchst real und höchst gefährlich, sowohl für die Einrichtungen selbst als auch für die Verbraucher: Wie der Internet Security Threat Report 2017 belegt, sind Angriffe auf Banken und Bankkunden wesentlich häufiger als Ransomware-Attacken. Jedes Jahr werden in diesem Bereich über 1,2 Millionen Threats entdeckt – mehr als doppelt so viele wie bei der Ransomware.

    Melden Sie sich noch heute zu unserem Webcast an:
    Internet Security Threat Report ISTR
    Zur Bedrohungslage im Finanzwesen

    Alle Teilnehmer erhalten eine Executive Summary, die wesentliche Erkenntnisse und Analysen beinhaltet:
    •Gezielte Angriffe auf Banken und Bankkunden
    •Infektionsvektoren, Häufigkeit und Ausbreitung
    •Taktiken, Technologien und Abläufe
    •Angriffe auf Geldautomaten, Point-of-Sale-Systeme und Mobilgeräte


    Melden Sie sich bitte noch heute an!
  • Year in Review: Financial Sector Threat Activity Recorded: Jul 13 2017 59 mins
    Candid Wueest, Threat Researcher, Symantec Security Response
    Financial institutions are increasingly facing attacks on multiple fronts. Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions.

    While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing a new type of attack in the form of large-scale financial heists. Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards.

    In its annual review of the financial threat landscape Symantec takes a look at the most prevalent and significant financial threats.

    In the webcast we will review:

    -The top threats facing financial institutions

    -Explore the most common techniques employed in financial attacks

    -Provide case studies of the most high-profile financial attacks of the past 12 months

    Register today
  • Integrating threat Isolation with SWG and SMG (4:00pm GMT) Recorded: Jul 11 2017 32 mins
    Mark Urban, VP Prod Mgmt/Prod Mktg, Symantec and Marketing and Business Development, Fireglass
    Threat Isolation gives you safe access to uncategorized websites, without risk of malware infection.

    This is powerful and impactful technology, which is why Gartner’s recent Strategic Planning Assumption for the category predicted that by 2021, 50% of enterprises would adopt browser isolation and, as a result, would experience a 70% reduction in attacks compromising end user systems.

    Find out how Symantec is integrating Threat Isolation with Web Security and Email Security to keep you safe from ransomware and advanced threats.
  • Symantec Information Centric Security Recorded: Jul 5 2017 2 mins
    Darren Thomson, CTO and Vice-President of Technology, EMEA, Symantec
    One of the common problems facing a CIO is knowing where their data is! Symantec’s new Information Centric Security platform combines Symantec’s CASB, encryption, DLP and authentication technologies to track and follow data and impose a security regime on the data wherever it is.
  • Security Analytics Recorded: Jul 5 2017 24 mins
    Andy Shepherd, Senior Systems Engineer, Symantec
    Andy discusses Symantec Security Analytics, using full Packet Capture, and shows you how analysing system logs can help you to pinpoint and identity activity and incidents that require further investigation.
  • Life in the SOC Trenches Recorded: Jul 5 2017 10 mins
    Stefan Sarnblom Senior Principal Specialist Security Engineer & Andy Shepherd, Senior Systems Engineer, Symantec
    Andy and Stefan discuss what the day to day work for an analyst in a SOC looks like with David McClelland - what do they, how do they do it, and what they need to think about to review, analyse, and validate threats.
  • Securing your Workloads in the Cloud Recorded: Jul 5 2017 15 mins
    Steve Broadwell, Senior Systems Engineer, Symantec
    Steve shares his insights on protecting the cloud and demos Symantec Cloud Workload Protection. Moving your move workloads from the datacenter into the cloud and importantly how you protect your workloads in the cloud.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Play 'Follow the URL' to outsmart the latest Dridex attacks
  • Live at: Jun 7 2016 5:00 pm
  • Presented by: Jane Wong, Director, Enterprise Security Products at Symantec and Dermot Harnett, Director STAR, at Symantec
  • From:
Your email has been sent.
or close