Endpoint Security , Events , Open XDR

Tech Spotlight: Endpoint Security

Symantec's Adam Licata on How to Respond to 'Living Off the Land' Attacks
Adam Licata, director, endpoint security product management, Symantec, a division of Broadcom

How can endpoint security tools help in combating attackers who enter organizations by such stealthy means as "living off the land" attacks? In this Tech Spotlight, Adam Licata of Symantec, a division of Broadcom, discusses the new endpoint security challenges for cybersecurity leaders.

In a video interview with Information Security Media Group as part of its RSA Conference 2021 coverage, Licata discusses:

  • Latest tactics and techniques of attackers;
  • Why traditional endpoint controls are challenged to keep pace;
  • How Symantec is helping customers defend against this new degree of stealth.

Licata is director of product management for endpoint security at Symantec, a division of Broadcom. He is leading the effort to transform Symantec’s market-leading endpoint security product to a full cloud SaaS-based platform. In the past year, he has engaged with hundreds of enterprise customers across all verticals to understand their challenges in both securing endpoints and managing multiple platforms. He works closely with Symantec threat researchers and product development teams to craft solutions using a blend of proven and innovative technologies.

To learn more about endpoint security solutions explore How Symantec Adaptive Protection Marks a New Chapter in Security Defense.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.