Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Symantec Vision

Results for Symantec Vision

Detecting malicious behavior might seem fairly obvious and straightforward, but this is one are where things are definitely more complicated than they appear. For example, how do you determine where your network begins and ends? And how do you know ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
Security and privacy concerns coupled with increased regulatory compliance requirements have propelled email encryption adoption to record levels. However, there are many different encryption standards and solutions in use, which has created the demand ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
According to Microsoft, Office 365 is ready to make your users more productive, free them up to use any device, and provide the built-in security and data protection you need as you move to the cloud. But how effective is the security that's baked ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection today and in the future. You’ll learn about our roadmap ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
The unexpected nature of zero-day attacks presents unique challenges. Attend this session for a closer look at the security engines and technologies that power Symantec products and provide proactive protection technologies for blocking these zero-day ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
Did you know that Symantec has the most comprehensive set of threat intelligence data in the world? Attend this session for an overview of the breadth, depth and sources of threat intelligence data Symantec gathers--and how that intelligence is applied ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
It's entirely possible that you've been subjected to a targeted attack and not even known about it. Attend this session to hear members of the Symantec Technology and Response (STAR) team provide a detailed, data-driven threat telemetry ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
Data loss is often the result of an inside job. Don't miss this session where you'll learn how Becton Dickinson, a $7B global medical device provider, prevented an associate from attempting to steal millions of dollars of product related ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
As threats to your data continue to evolve, Symantec answers with innovative technology to keep your organization safe. Don't miss this session for the inside track on the next generation of data loss prevention technologies being developed by ...
Article by Swathi Turlapaty | 13 May 2014 | 0 comments
As the security threat landscape continues to evolve and increase in sophistication, unknown and zero-day malware poses serious risks to all kinds of organizations. While next-generation firewall (NGFW) solutions can detect threats, they are not able to ...
Article by Swathi Turlapaty | 13 May 2014 | 1 comment