70 Results
Chris TownsendVice President, Federal, Symantec
Posted: 3 Min Read

Protecting Defense Department Endpoints: A New Approach

EDR solutions now offer continuous recording of system activity to support full endpoint visibility and real-time queries

Protecting Defense Department Endpoints: A New Approach
Beth StackpoleJournalist
Posted: 3 Min Read

Take No Ransomware Prisoners with Office 365

IT organizations need a way to minimize the damage by detecting and interrupting what could potentially turn into a mass encryption event

Take No Ransomware Prisoners with Office 365
Beth StackpoleJournalist
Posted: 3 Min Read

Stopping Office 365 Account Takeover Attacks in Their Tracks

Cloud applications like Office 365 raise the bar on productivity, but they also open the door to greater security risks. Here’s how to meet the challenge

Video
Stopping Office 365 Account Takeover Attacks in Their Tracks
Michal Toiba KokhSenior Manager, Product Content
Posted: 3 Min Read

Symantec Mobile Threat Defense: Smarter Incident Classification

One small step in content manipulation classification can be one giant leap for threat accuracy and enterprise mobile security efficacy

Symantec Mobile Threat Defense: Smarter Incident Classification
View More