Hi [[ session.user.profile.firstName ]]

Ne laissez pas la réglementation des données ralentir votre transformation

L’adoption du modèle SaaS se répand plus vite que prévu. Cependant, alors que ce phénomène s’accélère, les entreprises découvrent toute une série d’obligations à la fois juridiques et réglementaires en termes de conformité des données qui peuvent s’avérer difficiles à satisfaire de façon homogène ou qui sont susceptibles de ralentir l’adoption des applications SaaS et de ce fait l’innovation.

Découvrez :

• Comment les entreprises peuvent tirer pleinement parti des applications SaaS tout en répondant à la complexité de leurs obligations en termes de conformité des données sans que cela n’affecte la qualité d’utilisation des applications SaaS. Découvrez comment protéger les données sensibles tout en bénéficiant de tous les avantages offerts par les applications SaasS sans que cela ne se fasse au détriment des fonctionnalités SaaS telles que la recherche, le tri et la création de rapports sur les données sensibles.

• Les différentes méthodes de brouillage des données telles que la tokenization ou le chiffrement pour comprendre toutes les modalités de la conformité des données dans un environnement SaaS.

• Si le chiffrement de votre fournisseur d’application SaaS vous permet de répondre à vos obligations de conformité de données lorsque des données sensibles chiffrées sont inactives. Quelles sont les implications en matière de conformité de données de la gestion des clés et qui contrôle les clés de chiffrement ?
Recorded Nov 8 2016 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hervé Doreau, Directeur Technique – Symantec France
Presentation preview: Ne laissez pas la réglementation des données ralentir votre transformation
  • Channel
  • Channel profile
  • A Day in the Life of a Cloud Migration - Darren Thompson, VP & CTO Feb 6 2019 10:00 am UTC 60 mins
    Darren Thompson, Vice President and CTO EMEA
    Today’s businesses are moving to the cloud and all are learning that a migration to cloud does not happen over night. It takes time and many businesses need to manage both on-premise and cloud solutions for quite some time. Darren Thompson, Vice President and CTO in EMEA, walks customers through “a day in the life of a cloud migration”. He shares what’s driving businesses to transition to the cloud, the reality of today’s cloud, and best practices from the frontline.
  • Solving Mobile Security: Peer-tested Strategies That Work Feb 5 2019 4:00 pm UTC 61 mins
    Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.
  • SANS Research: A Holistic Approach to Securing Mobile Data and Devices Feb 5 2019 2:00 pm UTC 62 mins
    Lee Neely, Mentor Instructor, SANS Institute and Mic McCully, Senior Solutions Consultant, Symantec
    The ubiquitous use of mobile devices has radically changed the landscape of data protection, and the abundance of applications only complicates the situation.

    How, then, can mobile device data be protected? This webcast reviews the current and emerging services and practices designed to help secure and protect the data on these devices, and identifies areas where solutions are needed to fill the remaining gaps and provides recommendations for a holistic approach including mobile threat protection.

    View this on-demand webinar to learn:

    - What role security tools such as analytics can play in managing mobile devices

    - How mobile devices and data are currently protected and how effective those protections are

    - Common attack vectors and possible mitigation strategies

    - Features and capabilities that a solution should have to provide organizations with ideal mobile security and visibility
  • Protect Your Business Against Today’s Advanced Mobile Cyber Threats Feb 5 2019 12:00 pm UTC 60 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec
    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.

    Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?

    In this webcast, you will:

    - Learn about the various and advanced methods hackers use to attack and compromise mobile devices.
    - Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.
    - Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.
  • Integrated Cyber Response Feb 5 2019 10:00 am UTC 60 mins
    Darren Thompson, Vice President and CTO EMEA, Symantec
    Cloud computing has rendered the traditional security stack irrelevant, as traffic partners change, new devices are added, and cloud applications pop up virtually overnight. It’s time for the Cloud Generation to rethink requirements for enterprise security.

    Darren Thompson, Vice President and CTO, EMEA, walks customers through how changing usage models mandates a cloud generation architecture in enterprise security. He’ll walk you through the power of Symantec’s Integrated Cyber Defense platform—unifying cloud and on-premises security to provide advanced threat protection and information protection across all endpoints, networks, email, and cloud applications.
  • Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe Feb 4 2019 1:00 pm UTC 51 mins
    Armin Schneider ; Olaf Mischkovsky
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit

    Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen
  • Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear Jan 30 2019 6:00 pm UTC 42 mins
    Adam Glick, Effectiveness Team Lead, Symantec
    Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear.

    Key Learning Objectives:

    - Get an overview of the MITRE ATT&CK framework

    - See how Symantec EDR’s Advanced Attack Detections and MITRE ATT&CK support work together to expose threats

    - Learn how an integrated single agent approach to prevention, detection and response can stop even the most stealthy attack methods

    Please Join Us, Register Today
  • Symantec Web and Cloud Security - Secure Web Gateway (SWG) Jan 29 2019 1:00 pm UTC 35 mins
    Dr. Michael Teschner, Michael Straschydlo
    Symantec definiert die Web- und Cloud-Security neu. Wir haben Advanced Threat Protection, CASB SaaS-Kontrollen, Webrisiko und Datensicherheit in unsere Web-Gateway-Lösungen (ehemals BLUE COAT) integriert, um Ihnen eine einfache Möglichkeit für die sichere Nutzung von Cloud-Anwendungen und -Architekturen zu bieten.
    Damit erhalten Sie eine echte hybride Architektur aus universellen Richtlinien, mit denen Sie die Cloud-Nutzung aller Benutzer über einen cloudbasierten Web Security Service steuern können, hochgradig skalierbaren virtuellen Appliances für Private und Public Clouds sowie einer umfassenden Auswahl an On-Premises-Appliances
  • Live Interview Panel: Addressing the Cyber Threats on the Horizon Jan 29 2019 8:30 am UTC 60 mins
    Mille Gandelsman, Yoram Salinger, Guy Dagan, Elad Schulman, Kenneth Schneider
    Cyber threats continue to rise as organizations are embarking on their digital transformation journeys. The continued rise in cyber attacks is a key concern for CISOs in their efforts to protect the enterprise from financially motivated cyber criminals, as well as insider threats.

    Join security experts as they discuss:
    - New on the threat landscape
    - Notable cyber attack methods and strategies and how to protect against them
    - Areas for improvement
    - Solutions for network visibility, breach detection and response
    - Recommendations for improving security and steps to take today

    Elad Schulman, CEO, Segasec
    Yoram Salinger, CEO, Perception Point
    Mille Gandelsman, CTO and co-founder, Indegy
    Guy Dagan, Cofounder and Partner, Consienta
    Kenneth Schneider, VP Fellow, Symantec
  • Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort Jan 28 2019 1:00 pm UTC 61 mins
    Ramin Ghassemi, Hakan Arslanboga
    E-Mail ist die Lebensader Ihres Unternehmens, aber auch eines der häufigsten Einfallstore für zielgerichtete Angriffe. Der Komfort, den Office 365, Gmail und andere cloudbasierte Produktivitätstools bieten, erhöht die Anfälligkeit Ihres Unternehmens. Schützen Sie es mit unserer Messaging Security-Plattform für cloudbasierte und On-Premises-E-Mail selbst vor den komplexesten Bedrohungen.
  • Top 5 Things to Consider When Securing AWS Jan 24 2019 7:00 pm UTC 53 mins
    Deena Thomchick, Sr. Director, Cloud Security, Symantec
    Are you storing sensitive data and running business-critical operations in AWS? The news is full of stories about data exposure or loss involving misconfigurations, misuse, or compromised accounts in AWS. Analysts are urgently advising organizations to get automated controls and centralized management in place to secure their IaaS operations.

    As a result, IT organizations are increasingly looking to security providers such as Symantec for solutions to provide visibility, behavior monitoring, access controls, data security, and threat protection for AWS.

    Get security in place fast. Join us to learn how Symantec CloudSOC CASB can help you:

    Monitor activity and security configurations
    Control access and prevent risky changes or privileged misuse
    Detect malicious insiders and compromised accounts
    Keep S3 buckets private and secure confidential data with DLP
    Defend S3 buckets from advanced malware threats
  • Cloud Security Challenges and Risks Recorded: Jan 23 2019 37 mins
    John McNiece,Sr. Product Manager, Symantec and Arnav Ghosh, Product Manager, Symantec
    The Cloud Generation brings a host of new challenges --- vulnerability to increasingly malicious attacks; inability to gain a unified view across multiple cloud and on-premises environments; disparate security policies and tools; and massive traffic to monitor, analyze, and protect.

    Join us for a live webinar where we will take a closer look at some of the greatest security challenges companies are facing as they move to the cloud. We will discuss what companies are experiencing and the solutions they are adopting to bolster their response.

    In this session, you will:

    •. Hear real-world security scenarios as witnessed by a former SOC analyst

    •. Learn why the cloud has been particularly challenging to secure

    •. Find out how Symantec Managed Security Services (MSS) can help to strengthen and improve your cloud strategy through Managed Cloud Defense

    Please Join Us, Register Today
  • Cloud Web Assurance Demo Recorded: Jan 14 2019 2 mins
    Symantec Cloud Web Assurance Demo Video
  • You're concerned with Account Takeover on Office 365. Now What? Recorded: Jan 14 2019 2 mins
    You're Concerned with Account Takeover on O365 Now What? (1 min /52 seconds Video)
  • The IT Security Confidante - Vanishing Perimeter Recorded: Jan 14 2019 2 mins
    Vanishing Perimeters - Now What?
    Complete Cloud Security
  • Preventing Ransomware Infections via Office 365 is New Territory. Now What? Recorded: Jan 14 2019 2 mins
    The move to cloud applications such as Office 365 has brought many benefits, but has also come with a price Organizations have lost security visibility and control.(1 min 39 sec.video)
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Ne laissez pas la réglementation des données ralentir votre transformation
  • Live at: Nov 8 2016 10:00 am
  • Presented by: Hervé Doreau, Directeur Technique – Symantec France
  • From:
Your email has been sent.
or close