Hi [[ session.user.profile.firstName ]]

Résoudre le dilemme de la sécurisation des données privées dans le cloud

Le cloud permet un partage ouvert des données, rendant les informations accessibles chez soi, au bureau ou même en déplacement. Mais cet avantage a un prix : il met en danger la sécurité et la confidentialité des données. La sécurité IT dresse des listes d’applications autorisées, mais qu’en est-il des systèmes non autorisés ou du Shadow IT ? C’est un problème majeur. Des études montrent que, en moyenne, les entreprises sont au courant de moins de 10 % des applications cloud utilisées par leur personnel, ce qui constitue un énorme angle mort. Si vous ne savez pas où se trouvent vos données sensibles, comment les sécuriser ? Dans ce webcast de 45 minutes, nous exposerons le cadre de travail en trois volets proposé par Symantec pour la gestion du cycle de vie de la protection des informations et nous montrerons comment il s’applique à la sécurisation du cloud. Nous aborderons les points suivants :
· Opportunités et risques du transfert des données vers le cloud
· Implications en termes de sécurité et de confidentialité
· Cadre de travail en trois volets proposé par Symantec
o Comment s’assurer que seuls des utilisateurs et des appareils de confiance peuvent accéder aux données
o Comment classer et déceler les données sensibles et obtenir une visibilité complète dans le cloud
o Comment protéger les données grâce à l’application d’une technologie de chiffrement
· Futures orientations et recommandations

Il sera possible d’interroger les intervenants pendant le webcast.

Donc, si vous devez composer avec un accès ouvert à l'information et la protection de données sensibles, inscrivez-vous dès aujourd’hui à ce webcast.
Recorded Oct 13 2016 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hervé Doreau, Directeur Technique – Symantec France
Presentation preview: Résoudre le dilemme de la sécurisation des données privées dans le cloud
  • Channel
  • Channel profile
  • Countdown to GDPR with Symantec Jun 22 2017 10:00 am UTC 60 mins
    Keeping a handle on your organisation’s sensitive and personal information is a tough challenge. More data, more technology, more ways to communicate and more remote users. Start your journey to GDPR with the powerful integration of Symantec products and the join our webinar with our panel of experts to really understand how to navigate the technology to ensure your GDPR journey is a smooth one, and one that enhances your cyber and security processes at the same time.

    Now that the General Data Protection Regulation (GDPR) is almost here, you need better visibility over:

    1.Information risk – where it is, who uses it, and how much risk it’s at from breach, loss or misuse
    2.IT risk – so you can see how well protected information is within servers, networks, and the devices that house and transact it
    3.User risk – to know how much risk user behaviour poses to your information, systems, operations and brand reputation

    Join us for the first of our GDPR series, addressing technologies that help organisations determine data risk and protect data, devices, and networks against that risk.

    Register now for the second of our series in August looking at proactive technologies that can detect signs of a data breach and help respond more quickly and comprehensively.
  • EDR : une nouvelle approche face aux APT Jun 15 2017 9:00 am UTC 60 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Face aux APT de plus en plus intelligentes, quelles sont les méthodes à mettre en place pour minimiser les risques et adopter une stratégie plus efficace d'EDR (Endpoint Protection and Response) ?
    Assistez à ce webcast pour en savoir plus sur :
    - la protection supplémentaire apportée par l'EDR,
    - comment implémenter une solution EDR sans ajouter de complexité,
    - les critères d'évaluation de l'EDR.
  • A Step-By-Step Approach for Endpoint Detection & Response Jun 14 2017 10:00 am UTC 75 mins
    Scott Hardie & Gavin Fulton
    No question: Advanced Persistent Threats (APTs) are getting smarter. New question: what steps can you take to minimize the risks and create a more effective Endpoint Detection and Response (EDR) strategy?

    Register for our webinar series and learn a step–by–step method for eradicating endpoint threats. You’ll discover:
    •How EDR protects endpoints.
    •How to implement EDR without an extra agent.
    •Evaluation criteria for EDR solutions.
    Watch the webcast, then see our demo.
  • Block The Risk Of Ransomware Recorded: May 18 2017 34 mins
    Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection
  • Securing Financial Services: Authentication, Encryption & Data Protection Recorded: May 17 2017 62 mins
    Financial institutions are the number one target for cyber criminals. So you need industry-leading information security to make sure you’re protected.

    This webinar explores how authentication and encryption are leading the way in advanced data protection. You’ll hear the industry’s leading thinkers discuss topics like preventing ransomware and guarding against cyber attacks.

    And with the risk of GDPR penalties getting closer, you’ll hear about how best practice data governance and compliance can help you avoid heavy fines.
  • Don't Cry Over WannaCry Ransomware Recorded: May 15 2017 39 mins
    Bob Shaker, Global Product Manager for Incident Response Services, part of Symantec's Cyber Security Services
    Wannacry is big but how big is it really? It’s important to understand how this piece of ransomware is operating, what you can do to stop it and what to do if you’ve been compromised.

    Join us to learn what Symantec customers and non-customers can do against this threat and future threats like it.
  • The Power of the Proxy Recorded: May 10 2017 17 mins
    Timothy Chiu is a Senior Director of Product Marketing for Symantec
    Have you wondered why security companies use proxy technology?

    Listen to our recorded webinar on the “Power of the Proxy” and find out:

    - Why proxy architecture is the most secure technology available on the network

    - How it enables the most advanced security products available today, including Symantec’s Secure Web Gateway products.
  • A New Dawn of Data Privacy Recorded: May 10 2017 3 mins
    Everything changes in 2018

    Is your organisation ready for the GDPR implementation in 2018? Our GDPR video perspective sets out the task ahead.
  • The 2017 ISTR: A Review Of The Threat Landscape Recorded: May 4 2017 59 mins
    Orla Cox, Director Development
    Cyber criminals are exploiting a new trend in 2017: it's easier to trick your users than to exploit software. Get the latest Internet Security and Threat Report (ISTR), volume 22 and learn why subversion is now a bold new tactic.

    Get the facts in this highly respected research report and learn why:
    •Targeted attacks aimed at politically motivated sabotage and subversion has increased at alarming rates
    •One in 131 emails contained a malicious link or attachment – highest rate in five years
    •Size of ransoms spiked 266 percent; U.S. top targeted country as 64 percent of Americans pay their ransom
    •CIOs have lost track of how many cloud apps are used inside their companies – When asked most will say up to 40 when in reality the number nears 1,000
  • Cyber Attack Trends 2017 Recorded: Apr 27 2017 57 mins
    Thomas Hemker, Candid Wueest
    Cyber Attack Trends 2017
  • Easy Ways To Improve Your Security Posture Recorded: Apr 27 2017 36 mins
    Kirk Gibbons System Engineer, Symantec and Q&A with Gavin Fulton & Sunil Choudrie
    Imagine if you could respond to vulnerabilities, in real-time, and prevent the spread of infection through your network. It’s possible—if your network and endpoints are fully integrated.

    •Do you know what makes it possible for Symantec to instantly deploy protection and detection improvements at the endpoints?
    •Ever learn how new REST APIs effectively orchestrate automated, rapid response at the endpoint?
    •Are you aware of what new advancements are on the horizon to prevent new, unknown threats?

    Learn how Symantec Endpoint Protection 14 and Secure Web Gateway work together to detect, protect and provide rapid response to known and, most importantly, unknown threats.
  • Interview: CTO of Symantec on advanced cybersecurity Recorded: Apr 24 2017 22 mins
    Darren Thomson, CTO & VP of Technology, Symantec, EMEA & Andrew Bird, EA Visionary, Interview Moderator
    Interview in partnership with BrightTALK, The Stack and Cloud Industry Forum
    BrightTALK caught up with Darren Thomson, CTO & VP of Technology, Symantec, for an in-depth conversation on the future of cybersecurity in the context of IoT, AI and Machine Learning.

    Among topics discussed:

    - Trending business vulnerabilities in 2017
    - Particularities of pentesting
    - How to prepare for GDPR in 2018
    - Implications of IoT, AI & machine learning on cyber security
    - Yahoo breach
    - Brexit and cybersecurity
    - Recommendations to CISO's developing security strategies

    About the speaker:
    Darren is an industry recognised IT innovator and strategist, with +20 years of industry experience. He is a published author. His latest work has recently been published by Wiley Co. and is entitled, “Delivering Utility Computing: Business Driven IT Optimisation”. Details can be found at www.amazon.com.
  • Zero-Day Attacks and What To Do About It Recorded: Apr 20 2017 35 mins
    Chris Candaffio System Engineer, Symantec and Q&A with Robert Arandjelovic & Gavin Fulton
    Vulnerabilities exist in all applications—and today’s sophisticated attackers will find them. Every day an exploit remains unpatched, your risk of a data breach increases dramatically. Only a multi-layered approach that fully integrates with your IT defense stands a chance of stopping them, but where to begin?

    By registering, you’ll gain valuable insights into:

    Which techniques effectively block zero-day attacks.
    Why robust endpoint protection plays such a critical component.
    How Symantec Endpoint Protection 14’s Memory Exploit Mitigation shuts down vulnerability attacks, even against unknown threats.
  • Block The Risk Of Ransomware Recorded: Mar 30 2017 34 mins
    Jonathan Korba, System Engineer, Symantec, and Q&A with Gavin Fulton and Robert Arandjelovic
    Ransomware is becoming a more prevalent problem and attackers are becoming more straightforward; not even bothering to masquerade as legitimate agencies anymore. You may be wondering what you can do. First we would encourage you not to pay and then put protection in place so you won’t be victimized again.

    Learn how Symantec Endpoint Protection 14 can help protect you from future ransomware attacks:

    • What are your options if you’re a victim of ransomware
    • Why Symantec Endpoint Protection 14 can address ransomware better than other solutions
    • How Symantec technologies work together for maximum protection

    And if that isn’t enough, watch Symantec's Endpoint Protection in action. We will share a demo with you that showcases the power of it's advanced technologies.
    Register Now!
  • Effective Patch Strategies for Windows 10 and Office 365 Recorded: Mar 9 2017 44 mins
    Damon Covey, Director of Solutions Product Management, Symantec
    Microsoft has made significant changes in how they provide updates to Windows 10 and Office 365. These changes have caused confusion and additional complexity for many enterprises.

    Please join us for this special webcast to gain a better understanding of:

    - What these change are and how new features in IT Management Suite can help simplify using Windows 10 and Office 365.

    Register Now
  • Comment protéger et surveiller vos données sensibles en tous lieux Recorded: Feb 24 2017 44 mins
    Hervé Doreau, Directeur Technique - Symantec France
    À l’heure où 5 grandes entreprises sur 6 sont la cible d’attaques avancées, la protection des données est votre meilleure stratégie pour éviter de faire la une des journaux. En quoi consiste la protection des données ?
    Lors de ce webcast, nos experts vous montreront les atouts des technologies Symantec pour mettre en œuvre une approche intégrée en : 
    - Limitant et contrôlant l’accès aux données aux seuls utilisateurs légitimes grâce à une authentification multifacteurs renforcée, quel que soit le périphérique utilisé, même un appareil personnel.
    - Surveillant le flux des données où qu'elles se trouvent : dans le cloud, sur site, sur des appareils mobiles, ou sur un stockage à long terme.- Évitant les pertes de données par l'adoption de politiques de chiffrement ou de blocage des informations critiques avant qu’elles ne quittent le périmètre de protection.
  • Cyberangriffe verhindern - sensible Daten schützen Recorded: Feb 23 2017 59 mins
    Thomas Hemker, Matthias Senft
    Es ist eine traurige Tatsache, dass Hacker tagtäglich versuchen, Ihre Abwehrmaßnahmen zu durchbrechen. Inzwischen werden fünf von sechs großen Organisationen zur Zielscheibe von versierten Angreifern. Daher sollten Sie Ihre Daten aktiv schützen, um nicht zur nächsten Schlagzeile zu werden.

    Was also bedeutet Schutz von Daten? Ein umfassendes Schutzsystem ermöglicht den richtigen Personen von überall aus Zugang zu den entsprechenden Daten, indem es den Zugriff steuert, den Fluss der Daten überwacht und dafür sorgt, dass diese nicht in falsche Hände geraten.

    Wir erläutern, wie dieser Ansatz mit Symantec-Technologien umgesetzt werden kann, um Ihnen Folgendes zu ermöglichen:

    •Sicherstellen, dass nur autorisierten Benutzern Zugriff gewährt wird, indem Sie auf allen Geräten – einschließlich bei der Nutzung privater Mobilgeräte im Unternehmen (BYOD) – eine starke Multifaktor-Authentifizierung einsetzen.

    •Daten überwachen, ganz gleich, wo sie sich befinden – in der Cloud, vor Ort, auf Mobilgeräten und im Speicher.

    •Datenverlust mithilfe einheitlicher Richtlinienkontrollen verhindern, damit sensible Daten verschlüsselt oder blockiert werden, bevor sie das Unternehmen verlassen.
  • How to Gate, Watch and Guard your Sensitive Data Everywhere Recorded: Feb 23 2017 55 mins
    Sunil Choudrie
    The sad truth is that Invaders are trying to breach your defenses every day. With five out of every six large organizations being targeted by advanced attackers, protecting your data is a smart way to keep you from becoming tomorrow’s headline.

    So what does data protection mean? A comprehensive approach allows the right people to access the right data, anywhere, by controlling access, monitoring its flow, and keeping it out of the wrong hands.

    We will explain how Symantec technology addresses this approach and how you will benefit from:

    •Grant and ensure access only for authorized users with strong, multi-factor authentication, on any device, including BYOD.

    •Watching over data wherever it lives—in the cloud, on premise, in motion, and at rest.

    •Preventing data loss with unified policy controls to encrypt or block vulnerable information before it leaves the gate.
  • Protection next-gen des terminaux et machine learning Recorded: Feb 22 2017 42 mins
    Herve Doreau, Directeur Technique - Symantec France
    Sur le marché de la sécurité des terminaux et des antivirus, pas moins de 37 nouveaux produits ont fait leur apparition au cours des 5 dernières années et chacun affirmait répondre à l’évolution des menaces. Mais peut-on vraiment s’y fier ?
    Découvrez la nouvelle technologie de machine learning, comment cela fonctionne et ce à quoi vous devez l’associer pour vous protéger sur chaque point d’attaque.

    Principaux thèmes abordés :

    • Quel est l’état de l'art des technologies de protection des terminaux

    • Pourquoi le machine learning ne suffit pas

    • Comment réduire le nombre d’agents sur les terminaux
  • State of Endpoint Protection & How Machine Learning Helps Stop The Attacks Recorded: Feb 22 2017 61 mins
    Robert Arandjelovic & Jose Carlos Cerezo
    In the world of endpoint security and antivirus there no less than 37 new endpoint security products that have emerged in the past five years, each claimed to address the changing landscape, but is it all just hype?

    Learn more about Machine Learning, what it is, how it works, and what else you need to protect yourself across all points of attack.

    Key Learning Objectives:

    •What is the state of the industry for Endpoint Protection technology
    •Why machine learning is not enough
    •Discover how to reduce the number of agents on your endpoint with the high-performance lightweight agent that includes advanced machine learning, exploit mitigation, antimalware, and more
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Résoudre le dilemme de la sécurisation des données privées dans le cloud
  • Live at: Oct 13 2016 9:00 am
  • Presented by: Hervé Doreau, Directeur Technique – Symantec France
  • From:
Your email has been sent.
or close