Endpoint Security , Governance & Risk Management , Next-Generation Technologies & Secure Development

Endpoint Security: Creating Order from Chaos

Symantec's Naveen Palavalli on How to Defend Endpoints Against Advanced Threats
Endpoint Security: Creating Order from Chaos

The rapid evolution of malware and proliferation of solutions have created a state of chaos for security leaders, says Naveen Palavalli of Symantec. What strategy and solutions will help restore order to anti-malware defense?

Feeding this sense of chaos is the sheer amount of malware being created, says Palavalli, Symantec's director of marketing and strategy.

"Ransomware and data breaches are the top threats customers face. Our research shows that, on average, there are more than one million new malware variants created by attackers every day," he says. "All of this malware is using a number of new and known techniques to infiltrate the endpoint [through all vectors]."

In an interview about creating order from chaos, Palavalli discusses:

  • The current state of malware and defenses;
  • The elements needed to restore order;
  • Symantec's approach to complete endpoint security.

Palavalli is a Director of Marketing & Strategy at Symantec. He is responsible for Product Marketing of the Threat Protection portfolio including Endpoint and Email security and Advanced threat Protection. Naveen has 13 years of product management and marketing experience in the cyber security industry covering Endpoint, Network and Cloud security.

Sponsored By Symantec: 350 Ellis Street, Mountain View, CA 94043 United States Phone: +1 650-527-8000 www.symantec.com

This promotion is brought to you by ISMG. ISMG is obtaining your consent to send electronic messages to you on behalf of itself and Symantec. By submitting your information you agree to be contacted by Symantec on topics of interest. Your information will not be shared outside Symantec or ISMG, and you can unsubscribe from emails sent by ISMG, or Symantec by clicking on "Unsubscribe" on any email received.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.