Event Date: July 11, 2017 - July 26, 2017
Hosted By: Symantec & Carahsoft
Location: Fort Meade, MD
Attendees of these Cyber Defense Technical Exchange Meetings heard Symantec + Blue Coat discuss the following topics:
Cloud Access Security Broker/CloudSOC
Why is Cloud Access Security Broker (CASB) different from non-CASB cloud security architectures?
Identify Shadow IT and monitor cloud usage at a granular level
Govern data with granular usage controls and encryption/tokenization, combat threats with user behavior analytics, malware analysis, and incident response
Leverage and integrate with existing technologies, including DLP, web proxies, two-factor authentication, endpoint protection, encryption, and more
Full solution discussion on audit, mitigation, and CDP Server
Data Center Security/Secure End Point Protection
Endpoint Protection technologies deep dive: file reputation, behavioral protection, and advanced machine learning
How data center security helps boost forensic capabilities by providing host intrusion detection capabilities that are not currently offered by the existing HBSS solutions
Data center security goes beyond secure host baseline (SHB) and traditional application whitelisting solutions by leveraging trusted computing principals to confine any computer process and applications with behavioral application sandboxes
This new era of cyber threats is raising questions about whether current security measures are adequate. The CDG survey, underwritten by Symantec, uncovered four key concerns among government leaders about the state of cybersecurity in their organizations.Read this solution brief to learn more about...
Healthcare organizations are awash with data. However, electronic health records (EHRs) and digital clinical systems in many healthcare
organizations have been deployed without strategic data and IT infrastructure security planning. As a result, chief information security
officers (CISOs) frequent...
Faced with a profoundly hostile threat climate, state and local organizations are increasingly cognizant of the need to bolster defensive measures. The good news is that they are making tangible progress: the vast majority of state government cybersecurity programs have formulated strategic plans, d...
The Modernizing Government Technology (MGT) Act, which was signed into law as part of the 2018 National Defense Authorization Act, offers agencies an unprecedented opportunity to improve the security of their systems, applications and data. The surge in funding provided by the MGT Act, along with th...
Information security programs in the public sector are required to overcome substantial, unique difficulties, in addition to addressing those same challenges faced by their counterparts in the private sector. Statewide public-sector information security programs must be broad enough to address contr...