Hi [[ session.user.profile.firstName ]]

Cómo gestionar y proteger sus datos críticos, sin importar dónde estén

Cuando se trata de su información crítica, ¿cómo puede estar seguro de que está protegida y de que no va a salir de su entorno?

En la actualidad, las organizaciones se enfrentan a los siguientes desafíos:

- Identificar los tipos de datos que se deben proteger.
- Controlar el acceso a los datos y proteger las identidades, especialmente ante las importantes multas derivadas del incumplimiento de las normativas.
- Evitar que los datos confidenciales salgan de la organización, ya que las megafugas y las pérdidas de datos aumentan cada año. 

En 2015, más de 500 millones de registros personales fueron robados o perdidos y las campañas de spearphishing dirigidas a los empleados de las empresas aumentaron un 55 %.

El primer paso para proteger estos datos es permitir que las personas adecuadas accedan a ellos desde cualquier lugar al controlar sus accesos, monitorizar su flujo y evitar que caigan en malas manos. El siguiente paso consiste en aplicar políticas para controlar su uso y accesos desde los dispositivos móviles, en la nube o en la red.  

Únase a Symantec en nuestro webinar sobre las lecciones extraídas en materia de protección de datos en las diferentes aplicaciones de su entorno.
Recorded Sep 8 2016 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ramsés Gallego - Symantec Strategist
Presentation preview: Cómo gestionar y proteger sus datos críticos, sin importar dónde estén
  • Channel
  • Channel profile
  • Eliminate Cloud Compliance Bottlenecks: How to Automate IaaS Security Monitoring Oct 25 2018 11:00 am UTC 60 mins
    Anand Visvanathan, Director of Product Management, and LindaPark, Senior Manager, IaaS, Security & Compliance, Symantec
    Cloud computing enables companies to be more agile and squeeze the inefficiencies out of the development cycle, such as procuring compute resources on demand rather than waiting for IT. But as companies move fast to deliver new products, security must move faster to keep up with new regulations and threats – or risk slowing down the business.

    Cloud configuration errors can lead to gaping holes in cloud infrastructure deployments and present low hanging fruit for hackers. Security and DevOps teams need a proactive, automated approach to monitoring and securing their cloud management plane.

    Join us for this informative webinar on how to achieve security compliance for public cloud Infrastructure-as-a-Service (IaaS) platforms such as AWS and Microsoft Azure.

    During this webinar, you'll learn:

    •Why traditional security monitoring tools cannot provide visibility into cloud compliance risks

    •Why Security and DevOps teams need automated cloud security
    posture management (CSPM) tools to remove compliance bottlenecks

    •How to migrate your legacy infrastructure to the cloud without compromising security and compliance

    Please Join Us, Register Today
  • Safeguarding the Nation’s Critical Infrastructure Oct 23 2018 5:00 pm UTC 60 mins
    Curtis Barker, Product Portfolio Manager Cloud Security, Symantec
    Part 4 of 4: National Cybersecurity Awareness Month (NCSAM)

    Our day-to-day life depends on the country’s 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems.

    Will emphasize the importance of securing our critical infrastructure and highlight the roles the public can play in keeping it safe.

    Please Join Us, Register Today
  • Sécurité des mobiles: quelles sont les stratégies mises en place par vos pairs ? Recorded: Oct 19 2018 27 mins
    Hervé Doreau, Directeur Technique, et Benjamin Ménard, Consultant Avant-Vente
    Les entreprises de toutes tailles doivent faire face aux nouveaux risques liés à l'utilisation grandissante des mobiles et il leur est difficile de définir la meilleure stratégie pour protéger leurs informations sensibles.
    Au travers de cas d'usages concrets, nos experts vous proposent lors de ce webcast d'en savoir plus sur :
    - Pourquoi est-ce si important de sécuriser les appareils mobiles ?
    - Quelles bonnes pratiques de vos pairs pouvez-vous appliquer dans l'adoption d'une stratégie de protection des terminaux ?
    - Quelles sont les fonctionnalités primordiales d'une solution de sécurité des mobiles ?
  • It’s Everyone’s Job to Ensure Online Safety at Work Recorded: Oct 18 2018 44 mins
    AJ Nash, Global Head, Cyber Intelligence Global Security Office, Symantec
    Part 3 of 4: National Cybersecurity Awareness Month (NCSAM)

    As the lines between our work and daily lives become increasingly blurred, it’s more important than ever to be certain that smart cybersecurity is integrated into our lives.

    The focus will be on cybersecurity workforce education, training and awareness with specific focus on understanding adversary objectives and the best practices for thwarting some of the most common adversary actions.

    Please Join Us, Register Today
  • Ask the Experts—Securing Data and Email in Office 365 Recorded: Oct 17 2018 63 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • Millions of Rewarding Jobs: Educating For a Career in Cybersecurity Recorded: Oct 10 2018 58 mins
    Charlotte Wylie, Symantec/Christina Noyes,Cyber Security Instructor,AAUW/Scott Gullick,Director Partner Relations,YearUP
    Part 2 of 4: National Cybersecurity Awareness Month (NCSAM)

    Join Symantec nonprofit partners YearUp and AAUW address ways to build the cyber security workforce and how to inspire students to seek highly fulfilling cybersecurity careers.

    Please Join Us, Register Today
  • Make Your Home a Haven for Online Safety Recorded: Oct 3 2018 60 mins
    Paige Hanson, Chief of Identity Education, Symantec; Collin Robinson, National PTA & Larry Magid, CEO, ConnectSafely.org
    Part 1 of 4: National Cybersecurity Awareness Month (NCSAM)

    Kick off National Cybersecurity Awareness Month (NCSAM) with Symantec’s program partners, the National PTA and ConnectSafely to discuss the basic essentials the entire family can deploy to protect their homes against cyber threats.

    Please Join Us, Register Today
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Sep 27 2018 62 mins
    Mike Chen, Tim Murphy, Robert Arandjelovic | Live Q&A with Karthik Ramakrishnan
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing.

    With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
  • Die Bedrohungslage 2018 - Schutz vor einer Reihe neuer Angriffsvektoren Recorded: Sep 26 2018 57 mins
    Andre Engel and Lars Kroll Symantec
    Cyberkriminelle und professionelle Angreifer investieren viel Zeit und Mühe, um neue Angriffspunkte zu identifizieren und bestehende Attacken zu perfektionieren. Seit WannaCry feiern zum Beispiel Würmer ein Revival – und breiten sich immer öfter aggressiv in Unternehmensnetzen aus. Da die Zahl der Schwachstellen auf Desktop-PCs stetig abnimmt, suchen die Angreifer verstärkt nach neuen Kanälen und Plattformen, um Systeme zu infizieren – und entscheiden sich zunehmend für IoT-basierte Systeme..

    In diesem Webinar erfahren Sie:
    • Mit welchen neuen Angriffsformen sich Cyberkriminelle heute bereichern
    • Vor welchen neuen Angriffsvektoren sich Unternehmen schützen müssen
    • Welche Gefahren in IoT-Umgebungen drohen
    • Welchen gezielten Angriffen Unternehmen jüngst ausgesetzt waren
  • Tieniti informato sui recenti attacchi mirati e le minacce IoT di nuova generazi Recorded: Sep 25 2018 45 mins
    Sunil Venanzini, Symantec
    Le nuove metodologie per la propagazione delle minacce mettono le aziende sotto pressione

    Per garantirsi il successo, hacker e gruppi criminali che lanciano attacchi mirati continuano ad affinare le armi e identificare nuovi canali di infezione. Sulla scia di WannaCry, i worm riprendono virulenza e si diffondono aggressivamente nelle reti aziendali. Con le vulnerabilità sui computer desktop che si fanno sempre più rare, i criminali vanno in cerca di nuovi canali e nuove piattaforme da cui lanciare le infezioni: l’IoT diventa un bersaglio sempre più allettante.

    In questo webinar apprenderai:
    • Le strategie di diversificazione adottate dai criminali informatici per mantenere la redditività
    • Le nuove metodologie per la propagazione delle minacce, che mettono le aziende sotto pressione
    • La nuova generazione di minacce IoT
    • Le recenti campagne di attacchi mirati
  • Las nuevas formas de propagación de amenazas causan estragos a las empresas Recorded: Sep 24 2018 62 mins
    Ramses Gallego, Strategist, Symantec
    Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones

    Los cibercriminales y los grupos de ataques dirigidos continúan aprovechando los métodos actuales e identificando nuevos canales de infección para llevar a cabo su cometido. Siguiendo los pasos de WannaCry, los Worms están experimentando un resurgimiento y se están extendiendo con agresividad en las redes corporativas. Por otra parte, a medida que los equipos de oficina son cada vez más escasos, los atacantes necesitan buscar nuevos canales y plataformas de infección, como por ejemplo el IoT, que cada vez resulta ser una opción más tentadora.

    En este seminario web descubrirá:
    • Cómo se están diversificando los cibercriminales para seguir generando beneficios.
    • Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones.
    • La nueva generación de las amenazas contra el IoT.
    • Las campañas de ataques dirigidos más recientes.
  • Solving Mobile Security: Peer-tested Strategies That Work Recorded: Sep 21 2018 61 mins
    Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels Recorded: Sep 21 2018 37 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Les cyber criminels continuent d'utiliser des méthodes éprouvées, en 'identifiant de nouveaux vecteurs d'infection pour augmenter le taux de réussite de leurs attaques ciblées. Dans la continuité de WannaCry, l'utilsation de vers connait un regain au sein des réseaux d'entreprise. Les vulnérabilités au niveau du poste de travail devenant néanmoins moins courantes, les attaquants doivent trouver de nouveaux vecteurs et plateformes d'infection : l'IoT est une option de plus en plus intéressante pour eux.

    Lors de ce webcast, vous en saurez plus sur :

    • la diversification des méthodes d'attaque vs leur profitabilité
    • les nouveaux modes de propagation, véritables casse-têtes pour les entreprises
    • les menaces IoT next-gen
    • les récentes campagnes d'attaques ciblées
  • Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort Recorded: Sep 19 2018 62 mins
    Ramin Ghassemi, Hakan Arslanboga
    E-Mail ist die Lebensader Ihres Unternehmens, aber auch eines der häufigsten Einfallstore für zielgerichtete Angriffe. Der Komfort, den Office 365, Gmail und andere cloudbasierte Produktivitätstools bieten, erhöht die Anfälligkeit Ihres Unternehmens. Schützen Sie es mit unserer Messaging Security-Plattform für cloudbasierte und On-Premises-E-Mail selbst vor den komplexesten Bedrohungen.  
  • How to protect against IoT security attacks and next generation cyber crimes Recorded: Sep 19 2018 43 mins
    Orla Cox, Director Security Response, Symantec
    Cyber criminals and targeted attack groups alike continue to hone existing methods and identify new channels of infection in order to ensure success. On the heels of WannaCry, Worms continue to experience a renaissance, spreading aggressively across corporate networks.

    As vulnerabilities on desktop computers become increasingly rare, attackers need to look to new channels and new platforms for infection, with IoT becoming an increasingly attractive proposition.

    In this webinar you will learn:

    • How cybercriminals are diversifying in order to remain profitable
    • The new methods of threat propagation causing headaches for organizations
    • The next generation of IoT threats
    • Recent targeted attack campaigns
  • SEP Mobile Overview Recorded: Sep 18 2018 3 mins
    Symantec
    Symantec Endpoint Protection Mobile's risk-based mobile security approach is designed from the ground up to defend against all detected threats that put business data at risk of exposure, theft and manipulation, while respecting users' need for privacy, productivity and a great mobile experience.Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
  • Learn How the World Continues to Respond to GDPR Recorded: Sep 12 2018 56 mins
    Ken Durbin,CISSP Sr.Strategist,Global Gov't Affairs, Symantec & Robert Glaser, Sr. Mgr. Privacy, Deloitte & Touche LLP
    Join us for a webinar on September 12th, as experts from Symantec and Deloitte discuss the impact of the first few months of GDPR. For two years, companies have had the May 25, 2018 GDPR date in the forefront of their planning. However, the scope of this game-changing policy has left over 80% of organizations feeling inadequately prepared.

    In this webinar you will:

    • Discover why protecting data is the best response to GDPR

    •. Learn how the world is embracing GDPR since it's May 25th launch

    •. Hear from industry experts on what to expect in the coming month

    •. Ask questions and learn from your peers on best preparation and adaption practices

    Register Today
  • Symantec Web and Cloud Security - Secure Web Gateway (SWG) Recorded: Aug 29 2018 36 mins
    Dr. Michael Teschner, Michael Straschydlo
    Symantec definiert die Web- und Cloud-Security neu. Wir haben Advanced Threat Protection, CASB SaaS-Kontrollen, Webrisiko und Datensicherheit in unsere Web-Gateway-Lösungen (ehemals BLUE COAT) integriert, um Ihnen eine einfache Möglichkeit für die sichere Nutzung von Cloud-Anwendungen und -Architekturen zu bieten.
    Damit erhalten Sie eine echte hybride Architektur aus universellen Richtlinien, mit denen Sie die Cloud-Nutzung aller Benutzer über einen cloudbasierten Web Security Service steuern können, hochgradig skalierbaren virtuellen Appliances für Private und Public Clouds sowie einer umfassenden Auswahl an On-Premises-Appliances
  • Why Data-Centric Authentication is at the Heart of Zero Trust Recorded: Aug 28 2018 60 mins
    Andras Cser Vice President, Principal Analyst, Forrester and Salah Nassar, Director of Information Protection from Symantec
    It’s called a 'data breach' for a reason. Bad actors are after your sensitive data. Users, endpoints, email, and cloud applications are communication channels that serve as attack vectors. In a "Zero Trust" model where you cannot trust anything in or out of your network: focusing the perimeter around the data and protecting it with intelligent authentication is the best security approach. Most authentication solutions on the market authenticate access to almost everything BUT your data. Organizations invest heavily in DLP policies to have visibility and protection around their sensitive data. In fact, organizations spend the majority of security resources around threat and data protection solutions to protect data. Blindly allowing users to access the data without checking their identity negates the entire security stack.

    To implement Zero Trust successfully in your organization, the best products are the ones that give you the most visibility into who is accessing your data both on-premises and in the cloud. Before a user is granted access, all risk factors surrounding the user and their authenticating device need to be evaluated. Other risk factors that compromise the level of assurance could be malware, bad IP addresses, malicious files, and networks, or stolen credentials on the darknet. Simply put: protect your data and trust no one.

    In this webinar, you will hear from guest speaker Andras Cser, VP and Principal Analyst on IAM and Fraud Management at Forrester and Salah Nassar, Director of Information Protection from Symantec break down the following:

    •What are the components of Zero Trust?
    •How to implement Zero Trust successfully in your organization.
    •What are the important security solutions core to Zero Trust and why data protection and identity are central to this model.
    •What to look for in Zero Trust data-centric authentication vendor.
  • Optimize Cloud-based Analytics to improve SOC team Productivity Recorded: Aug 14 2018 50 mins
    Torry Campbell; Sr. Director, Enterprise Solutions and Javier Santoyo; Sr. Director, Global Security Intelligence
    Security Operations Center (SOC) managers struggle to build teams with the right balance of skills and experience. A cyber security skills shortage and budget constraints are pushing managers to enhance the skills of tier 1 analysts and increase the productivity of tier 2 analysts.

    In addition, tier 3 analysts are expensive and hard to retain, so organizations are looking for better ways incorporate the expertise of skilled threat hunters.

    This webcast covers innovations in threat analytics and automation that enhances the efforts of analysts at each level.

    Join us to learn how security teams

    -Employ local and global telemetry to continuously improve attack and anomaly detection

    -Find attack patterns with cloud-based analytics before attackers exfiltrate data

    -Quickly convict unknown files with advanced content inspection and sandboxing

    -Replicate the skills and best practices of expert analysts via automated artifact collection and threat hunting playbooks

    In addition, we’ll demonstrate how Symantec Endpoint Detection and Response (EDR) allows
    resource-constrained SOC teams to detect and respond advanced attacks more effectively.

    Register Today
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cómo gestionar y proteger sus datos críticos, sin importar dónde estén
  • Live at: Sep 8 2016 9:00 am
  • Presented by: Ramsés Gallego - Symantec Strategist
  • From:
Your email has been sent.
or close