Video Screencast Help

IL B10: Accenture and Symantec: Using Orchestrated Security Intelligence to protect your critical information and enable business value

Created: 03 May 2013 • Updated: 03 May 2013
Language Translations
LeslieMiller's picture
0 0 Votes
Login to vote

Security has to be more than a protective shield – it must contribute to making your business run in more efficient, more competitive and more innovative, ways. And while security technology has evolved to meet growing threats, one of the major challenges has been how to make sense of the fire-hose of information coming from a wide range of devices, systems, and networks, every second of every day.
Join Symantec and Accenture to see how orchestrated security intelligence can help tame the information overload, and give you visibility and insight across your organization while enhancing the value of your initial information security investments! Orchestrated security intelligence will be able to turn insight into action to prioritize and respond to critical aspects of security for your business. Specific features discussed will include:
• Customized strategic security metrics tailored to your specific needs
• Dynamic and interactive mobile visualization for on-the-go updates
• Secure information sharing with business units to drive more secure business processes
• Automated remediation workflows to impact security and risk metrics
• Exploratory analytics to identify new threats and vulnerabilities
Unlike most security technologies or security monitoring services that aggregate and correlate security data through reactive alerts or service providers, Accenture and Symantec enable you to proactively assess your security status at any time, and act on that information to comply with internal policies as well as meet the global requirements of governments and regulators. See how our combined industry knowledge, skills and unmatched access to global threat and vulnerability data and security solutions, provide best-in-class capabilities to solve today’s complex information security challenges.

Speakers: Jason Hunsberger, Scott McCrady