Insights from the Symantec Website Security Threat Report 2012

Andrew Horbury, Product Marketing Manager, Symantec Website Security Solutions
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

Join Symantec's team of as they draw on this report to discuss:
• Trends and patterns across the globe and the impact these have
• Best practices to mitigate risk for online businesses
• What actions you can take to protect your site and your customers
Jun 12 2013
45 mins
Insights from the Symantec Website Security Threat Report 2012
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4487)
  • Upcoming (154)
  • Date
  • Rating
  • Views
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • Learn from ING how one of the largest financial services corporations implemented ReputationDV (RepDV) from HP TippingPoint to proactively secure their network without compromising performance. RepDV, a security intelligence tool, monitors inbound and outbound communications to identify and block undesirable hosts. Updated every two hours, this robust security intelligence feed searches through hundreds of thousands of known malicious IPv4, IPv6, and DNS names and assigns a threat score of 1 to 100. Rated based on the analysis of the source, category, or threat, this score helps block traffic that poses a potential security risk. ING has had amazing success with HP TippingPoint RepDV:
    - 2 million connections blocked in 15 months
    - 75% decrease in total malware related incidents
    - 0 false positives
    ING will cover how deploying HP TippingPoint security intelligence helped simplify their network security strategy while increasing reliability and effectiveness.
  • Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.

    A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:

    How advanced targeted cyber attacks are different from traditional threats
    How Big Data techniques can spot attacks when traditional defenses fall short
    What you should be doing now to take advantage of Big Data Security Analytics
  • Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.

    A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:

    How advanced targeted cyber attacks are different from traditional threats
    How Big Data techniques can spot attacks when traditional defenses fall short
    What you should be doing now to take advantage of Big Data Security Analytics
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • Take a rule book, throw it away and write a better one.
    In typically disruptive fashion, Dell are Redefining the Economics of Enterprise Storage and you can benefit.

    In this webinar Paul Harrison, UK Storage Sales Director for Dell, will discuss Dell’s storage design philosophy and how our modern storage architectures are helping customers around the world to be more flexible and agile as well as breaking the traditional cycles of rip and replace.
    With our key design tenets around ease of use, full virtualisation, intelligent tiering, high scalability, elimination of forklift upgrades and innovative perpetual licencing models, Dell’s storage solutions are delivering real world benefits to thousands of users around the world and was the platform of choice for the Commonwealth Games, Glasgow2014.

    Join us and learn how Dell’s storage strategy differs from that of others and how it can help you to:
    •Acquire, deploy, and grow Storage on demand
    •Adapt more seamlessly to changing business needs
    •Intelligently manage data assuring business continuity
    •Reliably automate more processes, releasing time to focus on more strategic tasks
    •Strike the perfect balance between performance, capacity and price all while delivering a rich feature set.
  • Join this unique roundtable chat with three InfoSec Professionals who have recently climbed the BYOD mountain and come back down to share their stories. We’ll discuss the industry and regulatory differences, managing user expectations of privacy, legal implications and technical pitfalls in this 60 minute Security Leadership Series webinar, brought to you on April 10, 2014 at 1PM Eastern in partnership with Capella University.
  • Autonomic Software significantly expands the capabilities of McAfee ePO. Autonomic’s three suites are all integrated into ePO with no need for separate console, databases, and reports. They are “As McAfee As McAfee”!

    Autonomic Patch Manager, EndPoint Manager and Power Manager suites provide improved security, and managing of end points, at virtually no charge when incorporating Power Manager.

    Join McAfee and its 2013 MVP Partner of the Year to learn how the integrated solution provides:
    • Increases Scalability – Delivery of patches to both large organizations and small-to-mid-sized organizations
    • Reduces Costs - Using Power & Patch Management Suites
    • Simplifies Complexity - Maintains a secure environment with minimal human intervention using EndPoint Suite
    • Easily Customizable Solutions – For unique requirements
  • The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • Channel
  • Channel profile
Up Down
  • Website Security Threats: Spotlight on the Netherlands May 2 2014 7:30 am UTC 30 mins
    The topic of security has grabbed headlines over the last few years and indeed the last few weeks, but most of this attention has focused on a small percentage of large enterprises. However, security is not an issue for them alone, as mid-market companies increasingly deal with the same threats as their larger compatriots.
    Join Symantec Website Security Solutions to understand how you can take a proactive website security stance.

    During this webinar we will look at areas of compliance, the size of Ecommerce market opportunity in the Netherlands, and the threat landscape in general.

    We look forward to your participation.
  • Website Security Threats: April Update Apr 17 2014 8:30 am UTC 30 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: March Update Recorded: Mar 13 2014 30 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Is Your Website the Soft Underbelly of Your Organisation? Recorded: Mar 11 2014 44 mins
    Whilst not every organisation may be a target of an APT or targeted attack, it’s important that all companies large or small understand these attacks as a way to help build stronger defences against the constantly changing threat landscape.
    · Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010.
    · In 2012 the number of Web based attacks increased by 1/3 with approximately 247,350 Web-based attacks were blocked each day.
    · 5291 New Vulnerabilities were discovered in 2012
    · Spam accounts for 69% of all email and one in 414 emails are from phishers

    All security and IT professional need to understand the new reality classic textbook protections may well not be enough. Join Symantec Website Security solutions to understand how you can protect your websites from vulnerabilities and malware and how SSL can prevent your company and your customers.
  • The Rise of Hacktivism and Insiders: New Tactics, New Motives Recorded: Feb 18 2014 35 mins
    Insiders Outsiders, Hactivists, Cybercriminals – the lines have blurred but the game remains the same – how you can protect your infrastructure and organization from web based and cyber threats.

    With incidences of malware and vulnerabilities on the rise – how does your organisation measure up and how are you prepared for the future? Is your web infrastructure robust enough to cope? Join Symantec to understand the threat landscape and motivations that drive them.
  • Website Security Threats: February Update Recorded: Feb 13 2014 29 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • SSL Explained - Making the Best Choice for Your Business Recorded: Jan 23 2014 29 mins
    Website security is an essential but often overlooked part of an ecommerce or online strategy – join Symantec for this 30 minute webinar and learn how you can make the best choice for your business
  • Website Security Threats: January Update Recorded: Jan 9 2014 29 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: December Update Recorded: Dec 4 2013 28 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Cybercrime – Attack of the Cyber Spies Recorded: Dec 3 2013 42 mins
    The global price tag of consumer cybercrime is estimated to be some 133BN USD (97BN EUR) annually (which is enough to host the 2012 London Olympics nearly 10 times over) and impacts 12 victims per second every single day. But how do hackers crack a corporation and individuals?

    The weak link could be you and your employees…Join Symantec
    Website Security Solutions to understand the threat landscape, the implications and how you can take proactive steps to protect yourself and your organisation.
  • Website Security Threats: November Update Recorded: Nov 7 2013 29 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Maine, turvallisuus, luotettavuus... verkkokaupankäynnin valuutta Recorded: Oct 31 2013 31 mins
    Osallistu 30 minuutin webinaariin, jossa jaamme tuoretta tietoa verkkosivustojen tietoturvasta ja verkkokaupankäynnistä.Tavoitteemme on yksinkertainen: haluamme tehdä verkkoliiketoiminnan harjoittamisesta turvallisempaa sinulle, asiakkaillesi ja kaikille, joihin olet yhteydessä internetin välityksellä
  • Website Security Threats: September Update Recorded: Sep 26 2013 28 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: August Update Recorded: Aug 22 2013 30 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Website Security Threats: July Update Recorded: Jul 4 2013 26 mins
    Join us for this short monthly webinar, in which we will provide you with the latest updates and insights into the constantly evolving online threat landscape. Using information sources such as the Symantec Global Intelligence Network, we will help you understand how you can continue to protect your company and your infrastructure.

    The goal is simple: to make the Internet safer to transact business – for you, your customers and everyone else with whom you interact online.
  • Insights from the Symantec Website Security Threat Report 2012 Recorded: Jun 12 2013 45 mins
    Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network. This is made up of approximately 69 million attack sensors and records thousands of events per second, monitoring threat activity in over 157 countries.

    These resources have offered unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. Symantec’s Website Security Solutions have distilled this information down to focus specifically on the threats that are targeting online business and websites.

    Join Symantec's team of as they draw on this report to discuss:
    • Trends and patterns across the globe and the impact these have
    • Best practices to mitigate risk for online businesses
    • What actions you can take to protect your site and your customers
  • TURNING SECURITY INTO SALES SUCCESS - Seven concepts you need to know Recorded: Apr 4 2013 35 mins
    Starting up an online company can be a fraught business. So in the tradition of a Harvard Business School case study, we created a fictional company that uses real Symantec technology… to tell the story, help you to avoid some common mistakes and offer some real world tips on how you can help your business succeed in a competitive online world.
  • Next-generation Algorithms: Providing Better Security and Increased Performance Recorded: Mar 27 2013 35 mins
    The security environment is constantly changing as hackers become more sophisticated and your customers increasingly reach for mobile or tablet devices to carry out transactions online. Keeping up with the developments in malware and continuing to provide a secure and trustworthy experience for your customers is vital. As a leader in SSL security, Symantec is always working on new solutions that help your business to anticipate and meet increasing security demands, and provide a safe environment for your customers. Join the Symantec team to learn more about how your business can benefit.
  • Next-generation Algorithms: Providing Better Security and Increased Performance Recorded: Mar 27 2013 35 mins
    **The session time listed will update automatically to your local time once you have set up a BrightTALK account**

    The security environment is constantly changing as hackers become more sophisticated and your customers increasingly reach for mobile or tablet devices to carry out transactions online. Keeping up with the developments in malware and continuing to provide a secure and trustworthy experience for your customers is vital. As a leader in SSL security, Symantec is always working on new solutions that help your business to anticipate and meet increasing security demands, and provide a safe environment for your customers. Join the Symantec team to learn more about how your business can benefit.
  • Next-generation Algorithms: Providing Better Security and Increased Performance Recorded: Mar 27 2013 34 mins
    **The session time listed will update automatically to your local time once you have set up a BrightTALK account**

    The security environment is constantly changing as hackers become more sophisticated and your customers increasingly reach for mobile or tablet devices to carry out transactions online. Keeping up with the developments in malware and continuing to provide a secure and trustworthy experience for your customers is vital. As a leader in SSL security, Symantec is always working on new solutions that help your business to anticipate and meet increasing security demands, and provide a safe environment for your customers. Join the Symantec team to learn more about how your business can benefit.
Webcasts targeted to IT Security Professionals
.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Insights from the Symantec Website Security Threat Report 2012
  • Live at: Jun 12 2013 1:00 pm
  • Presented by: Andrew Horbury, Product Marketing Manager, Symantec Website Security Solutions
  • From:
Your email has been sent.
or close
You must be logged in to email this