Microsoft + Symantec- A Next Generation Approach to Securing Users and Their Devices

Today’s cyber risks are forcing organizations to not only leverage technology, but also purchasing power through enrollments and new licensing programs.

Keeping the bad stuff out and the good stuff in has never been more critical, but how does one make sense out of the developing technologies, mergers and costs associated with buying and owning them? Companies are facing difficult decisions in where to leverage complementary solutions from Microsoft to support their investment in Symantec.

Matt Reid, VP of Risk Management and Troy Whittaker, VP of Systems Management at ITS Partners will discuss trends seen in the marketplace with organizations who face this challenge. ITS has helped many organizations through this decision process and we will share our insights and experiences with you!

This video will focus on the following areas:

Delve into users, devices, threats, assets and practical strategies surrounding them
Maximize your investments in Windows, Azure and Office 365
Infrastructure consolidation and the opportunity to migrate it to the cloud

Symantec ATP 2.0.2 Update

In this quick update our risk management expert, John Higday, highlights the updates in ATP 2.0.2 which provides IT security teams with the best visibility in their endpoint environment.

Advanced Threat Protection – Expose, prioritize, and remediate sophisticated advanced attacks across endpoints, networks, and email, from one single console.

Download our ATP white paper at here.

So you bought the full suite of Symantec DLP, now what?

Navin Deen, Privacy Architect with ITS Partners, reviews the various Symantec DLP modules and address key considerations for design and sizing the DLP system in your environment.

Learn more about core detection technologies and implementation best practices derived from years of experience.
Designing and Architecting your DLP infrastructure requires 3 things:

1) Deep knowledge of the tool itself
2) Familiarity with client-side infrastructure
3) Understanding of organizational goals

Symantec DLP modules covered:
1) Network Discover
2) Endpoint Prevent
3) Network Monitor
4) Network Prevent for Email
5) Network Prevent for Web

Is 2016 the year for ransomware?

Customers ranging from SMBs to Large Enterprises showed renewed focus to keep malware at bay in 2015.

Threat protection roadmaps are also proving that organizations need to be able to detect malware quickly across multiple control points, combined with a layered approach to sniff out malware that’s either hard to detect or coming into the organization in ways that are different than before.
Although ransomware already had our attention, it recently it got “very real” for a California hospital who’s network was held hostage and kept offline for over a week! Stakes are going up and it seems like all company sizes and verticals are at-risk.

While we attempt to educate user’s awareness about today’s threats and their role in helping keep themselves and the company safer, the need for better technical controls to address the gap is very real and ever increasing.

Learn how ransomware has evolved, but more importantly, better understand what it takes to minimize it’s likelihood in your environment leveraging your existing Symantec investments from the experts at ITS Partners.

Advanced Threat Protection

Identify, prioritize and remediate today’s threats, leveraging your existing Symantec solutions

Today’s threat environment is evolving at a remarkable rate as cyber criminals improve their ability to change and adapt. With today’s growing number of targeted attacks, it has become virtually impossible to block every threat before it reaches your network. It’s no longer a matter of if you’ll suffer a malware outbreak or data breach, but when. Unfortunately, most businesses are not very good at detecting and responding to these malware attacks when they happen:

Stats about Advanced Threats

  • Advanced attackers targeted 5 out 6 large companies in 2014 (Source: Symantec 2015 ISTR)
  • 66% of all breaches went undetected for more than 30 days (Source: Verizon Breach Report)
  • On average, data breaches were detected 243 days after they happened (Source: Ponemon)
  • And the average data breach takes 4 months to remediate (Source: Mandiant ATP 1 Report)

Watch this presentation and demo where existing Symantec Endpoint Protection customers will realize how to shift from a “protection only” mindset to a more comprehensive approach to detect quickly, prioritizes what matters most and remediate fast!