Intelligent Endpoint Security: l’importanza di un approccio moderno
Componente fondamentale del programma di sicurezza di un’azienda, la sicurezza degli endpoint è indispensabile per acquisire la visibilità necessaria a rilevare rapidamente le minacce e contenerle prima che i criminali riescano ad accedere a risorse preziose. L’identificazione di specifici malware e di tecniche di aggressione sofisticate richiede un approccio che unisca le misure di sicurezza preesistenti a strategie di difesa evolute, in grado di proteggere il patrimonio delle risorse aziendali.
In questo webinar scoprirai:
• Perché aziende di ogni grandezza sono sempre più spesso nel mirino di criminali che usano tattiche avanzate e attacchi zero-day studiati per aggirare gli antivirus tradizionali e restare invisibili sui sistemi.
• Quali sono le tecnologie oggi comunemente usate nelle soluzioni di protezione dalle minacce – dalle sandbox e dall’apprendimento automatico avanzato ai sistemi di analisi dei comportamenti – per identificare rapidamente gli endpoint infetti e determinare la portata di un attacco
• Perché la visibilità degli endpoint è un componente essenziale delle soluzioni di protezione di reti, web e messaggi
RecordedAug 11 201648 mins
Your place is confirmed, we'll send you email reminders
Darren Thompson, Vice President & CTO EMEA, Symantec
Cloud computing has rendered the traditional security stack irrelevant, as traffic partners change, new devices are added, and cloud applications pop up virtually overnight. It’s time for the Cloud Generation to rethink requirements for enterprise security.
Darren Thompson, Vice President and CTO in EMEA, walks customers through how changing usage models mandates a cloud generation architecture in enterprise security. He’ll walk you through the power of Symantec’s Integrated Cyber Defense platform—unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.
For business, the web is both essential and dangerous. As more workers go mobile and workloads move to the cloud, the reliance and peril of the web is only going to grow. You need visibility into all this Web traffic, so you can protect your business from the threats it introduces.
Secure web gateways (SWGs) can deliver the insights and controls you need to mitigate the risks of the web. They pick up where next-generation firewalls (NGFWs) leave off, providing the Layer 7 termination and in-depth inspection of web traffic (port 80 and 443) required to uncover and protect against the increasingly sophisticated web threats targeting your business.
In this webinar learn how a proxy-based architecture provides unique security and threat-protection advantages for the enterprise in this new normal of remote users/offices, cloud apps, mobile devices.
●A proxy-based architecture is ESSENTIAL to meeting the needs of the Cloud Generation.
●Symantec BC Proxy SG is the best security defense.
●Symantec Proxy SG dramatically improves threat protection, while reducing costs of other security infrastructure.
From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources.Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.
Join Symantec's leading threat expert, Orla Cox as she shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:
- The Coin Mining Gold Rush
- Shifting Trends in Ransomware
- Targeted Attacks by the Numbers
- Infecting the Software Supply Chain
- The Surge in Mobile Threats
As businesses move to cloud services like Office 365, file sharing, email, chat, and collaboration apps make it easy to share information to get work done, however confidential datais now at greater risk.of falling into the wrong hands.(Watch Video Now)
Robert Arandjelovic, Director Product Marketing, Symantec and Featuring Guest Speaker, Heidi Shey, Senior Analyst, Forrester
Traditional perimeters vanish as organizations move to the cloud and employees work in a world of both sanctioned and unsanctioned applications. Companies must rethink their approach to securing data in this new environment.
Join us on this webinar with Robert Arandjelovic from Symantec and guest speaker Heidi Shey from Forrester Research as they discuss;
- The inherent security challenges of cloud
- Security strategies and imperatives
- How organizations are approaching and need to approach cloud security today.
Mike Chen, Tim Murphy, Robert Arandjelovic | Live Q&A with Karthik Ramakrishnan
Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.
Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?
In this webinar we'll discuss:
- Why you should embrace cloud-based network security
- The tools you need to provide protection against a variety of attacks
- Why a proxy belongs at the center of your cloud service
- Cloud migration strategies
- Integrations that orchestrate defenses across control points and attack vectors
Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing.
With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
Today’s threats aim to do more than just steal intellectual property. They hijack software updates, destroy devices, steal resources, and take advantage of trusted tools within your network. To top it off, these threats are notoriously difficult to detect.
Join leading threat expert, Kevin Haley, as he shares insights on trends shaping the threat landscape and how to best-protect your organization.
Key Learning Objectives:
• Insights on cryptojacking, fileless threats and ransomware
• Capabilities you need to protect yourself from these threats
• Best practices for more efficient and effective endpoint security
Robert Arandjelovic, Product Marketing Director ; Gavin Fulton, Endpoint Security Expert
Today’s threat landscape continues to evolve, with attackers using increasingly stealthy techniques that are difficult for traditional security controls to detect. New point solutions are emerging to stop one specific means of attack, but it’s impossible to deploy them all without incurring significant cost and complexity.
Join us as we demonstrate how Symantec’s Complete Endpoint Security can enable you to deliver comprehensive endpoint security to your customers – featuring an array of state-of-the-art capabilities like the newly-introduced Deception as well as advanced detection and response – all within a single agent.
Cyber criminals today are relentless, and they only need to be successful once. With each passing year, not only does the sheer volume of threats increase, but the threat landscape becomes more diverse.
From the explosion of coinmining activity in 20181, to the 600% rise in targeted activity against IoT devices1, attackers are still working relentlessly to discover new avenues to infect networks and steal data, while also covering their tracks.
Join Orla Cox, Director of Security Response at Symantec for this insight-packed webinar, including:
• How targeted attacks are evolving to exploit new technologies like IoT.
• The increasing diversity of cyber attacks, and the new method that hackers are using to infect networks and steal information
• A roundup of the year’s most high-profile attacks, and a look at what to expect in the year to come
Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
Its your job to secure email, sensitive data and apps in Office 365. Now What?
Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.
Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:
- Get the most out of your Office 365 instance by enhancing the security
- Understand what Microsoft offers and how Symantec compliments their security offering
- Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps
Deena Thomchick, Senior Director of Cloud Security, Symantec Linda Park, Senior Manager, IaaS Security & Compliance, Symantec
Organizations are using more cloud services for more business-critical activities. At the same time organizations face growing privacy regulations, a high rate of data loss (accidental exposures and breaches), and ever-increasing attacks on their cloud assets.
It is challenging to get the visibility and security you need to protect your Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) clouds as cloud security offerings have been both limited in scope and fragmented across point products.
Let us show you what’s new and how our solutions will give you the most complete visibility, data security, threat protection and compliance management for your public cloud services with integrated cloud security.
Learn more about our latest innovations in cloud security for SaaS, PaaS, and IaaS
•.New Integrated Compliance Management for IaaS – the first Cloud Security Posture Management (CSPM) solution integrated with Cloud Access Security Broker (CASB) and Cloud Workload Protection Platform (CWPP) offering detailed compliance remediation.
•. Fastest Acting Cloud App Security – the first API-based CASB that can remediate security issues in seconds, with new Fast APIs for Microsoft and Box.
•. Broadest & Deepest Cloud App Coverage – CASB data security and threat protection for any cloud app, including custom apps.
•. Best DLP and Threat Protection for IaaS Storage – Gartner Magic Quadrant leading Data Loss Prevention (DLP) and threat protection now integrated with Cloud Workload Protection(CWP) and Gartner Magic Quadrant leading CloudSOC CASB.
Symantec definiert die Web- und Cloud-Security neu. Wir haben Advanced Threat Protection, CASB SaaS-Kontrollen, Webrisiko und Datensicherheit in unsere Web-Gateway-Lösungen (ehemals BLUE COAT) integriert, um Ihnen eine einfache Möglichkeit für die sichere Nutzung von Cloud-Anwendungen und -Architekturen zu bieten.
Damit erhalten Sie eine echte hybride Architektur aus universellen Richtlinien, mit denen Sie die Cloud-Nutzung aller Benutzer über einen cloudbasierten Web Security Service steuern können, hochgradig skalierbaren virtuellen Appliances für Private und Public Clouds sowie einer umfassenden Auswahl an On-Premises-Appliances
Doug Cahill, Senior Analyst and Group Director, ESG and Abhishek Srivastava, Sr. Director Product Management, Symantec
Enterprises migrating workloads from traditional data centers to Infrastructure-as-a-Service (IaaS) providers are discovering that a "lift-and-shift" approach to security doesn't work. Traditional on-premises security tools do not scale with workloads and storage in dynamic cloud environments or support the continuous integration and delivery (CI/CD) workflows central to modern DevOps practices. And while some workloads are well suited to the public cloud, others often remain on-premises or in private clouds, necessitating multiple security solutions and multiple consoles generating alerts. An efficient, single console security solution is needed to protect workloads and storage against advanced threats and malware across today's heterogeneous hybrid cloud environments.
What is a hybrid cloud and how is it different from securing a traditional data center?
Why is the development of applications for the cloud different and how does it impact security?
What are some solutions currently available for protecting my hybrid cloud workloads and how do they do it?
Ken Tom, Sr. Manager, Product Marketing, Symantec and Sheetal Venkatesh, Principal Product Manager, Symantec
In the typical enterprise, employees use hundreds of apps that significantly expand the endpoint attack surface-whether IT is aware, or not. Clearly, apps are a fact of life and employees will use them as they see fit. The best defense is application whitelisting, but attackers show us otherwise: In fact, all 10 of the Top 10 attacker groups use whitelisted software to infect endpoints. And with long patching cycles and insufficient training, IT security teams need something more.
However, a win-win approach exists so that users can benefit from any productivity app they want without compromising the security of the entire infrastructure.
Join us for a first-look webinar into Symantec Endpoint Protection Hardening, whose isolation capabilities allow end users to download and use any app safely.
Join us to learn how you can:
- Discover and assess the risk of applications on your endpoints automatically.
- Shield known good applications to prevent vulnerability exploits.
- Isolate suspicious and malicious applications to stop privileged operations automatically.
In addition, we'll show you SEP Hardening in action with a demo that showcases how you can keep your endpoints safe and your employees productive.
Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.
This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.
Join us to learn how Symantec Email Security can:
- Isolate malicious threats in links and attachments to prevent malware payloads and credential theft.
- Pre-empt phishing attacks with real-world simulations and built-in user security awareness tools, tracking readiness over time.
- Anticipate future campaigns with comprehensive security analytics gathered from previous attacks against your organization.
- Fully secure your Office 365 or Google G Suite apps with integrated DLP and CASB for both advanced data and threat protection.
In addition, we will show you Symantec Email Threat Isolation, in action, with a demo that showcases safe rendering of links.
Dieser Webcast greift in deutscher Sprache den Inhalt auf, der von
der Royal Bank of Canada mit dem Titel:
"Ensuring that your Mobile Threat Management
Platform fits your priorities" veröffentlicht wurde.
Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.
Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.
Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:
- Why is it important to secure mobile devices?
- What is your advice to your peers who are starting their mobile security journey?
- What are the most important requirements of a mobile security solution?
By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.
Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec
Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.
Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.
Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.
During this webinar, you'll learn:
•Why traditional security monitoring tools cannot provide visibility into cloud compliance risks
•Why Security and DevOps teams need automated cloud security
posture management (CSPM) tools to remove compliance bottlenecks
•How to migrate your legacy infrastructure to the cloud without compromising security and compliance
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.
We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.