Hi [[ session.user.profile.firstName ]]

Avanan

  • Date
  • Rating
  • Views
  • What to look for in a CASB
    What to look for in a CASB
    Michael Landewe Recorded: Aug 27 2018 44 mins
    During this session, we'll describe how Avanan's next-generation Cloud Access Security Broker redefines the term CASB.
  • Cloud Account Takeover | Securing the Enterprise Cloud
    Cloud Account Takeover | Securing the Enterprise Cloud
    Yoav Nathaniel, Cloud Deployment Engineer Recorded: Mar 8 2018 21 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on the Cloud Account Takeover Threat.

    We'll cover how Avanan Identifies and protects against an Account Takeover Breach, an imminent threat to all SaaS and IaaS:
    • Compromised Credentials
    • Malicious and Insecure Configuation
    • Anomaly Behavior Analysis
    • API Token Harvesting
  • Securing Google IaaS Infrastructure | Securing the Enterprise Cloud
    Securing Google IaaS Infrastructure | Securing the Enterprise Cloud
    Gil Friedrich, Avanan CEO Recorded: Mar 1 2018 27 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on IaaS: AWS, Azure and Google Compute.

    We'll cover the threats specific to IaaS like Amazon AWS, Azure and Google Compute

    • Insider Threat, Compromised Accounts, Account Takeover
    • Insecure or Malicious Configuration
    • Malware, phishing, file analysis beyond your app
  • Securing Google G Suite | Securing the Enterprise Cloud
    Securing Google G Suite | Securing the Enterprise Cloud
    Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 22 2018 30 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on G Suite.

    During this session, we’ll cover threats to data within G-Suite:
    • Email-based phishing, spoofing, and malware
    • Account takeover, insider threats, compromised Google credentials
    •Controlling sensitive data within G-Drive and Gmail and GSuite Apps
  • Securing Office 365 | Securing the Enterprise Cloud
    Securing Office 365 | Securing the Enterprise Cloud
    Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 15 2018 37 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on Office 365.

    This hands-on demo will provide examples of the key Office 365 use cases:
    • Zero-day Malware
    • Phishing
    • Data Leakage
    • Account Takeover
    • Auditing and Compliance

    We’ll show you how to:
    • Stop phishing and malware in Office 365 mail
    • Quarantine infected files within One Drive,
    • Control sensitive information and prevent data leakage,
    • Protect against the insider threat, and
    • Monitor and enforce regulatory compliance for all users.
  • Securing Citrix ShareFile | Securing the Enterprise Cloud
    Securing Citrix ShareFile | Securing the Enterprise Cloud
    Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 8 2018 25 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on Citrix ShareFile.

    This hands-on demo will provide examples of the key ShareFile use cases:
    • Zero-day Malware
    • Data Leakage
    • Account Takeover
    • Auditing and Compliance

    We’ll show you how to:
    • Quarantine infected files within Citrix ShareFile,
    • Control sensitive information and prevent data leakage from ShareFile,
    • Protect against the insider threat, and
    • Monitor and enforce regulatory compliance for ShareFile users.
  • Future Proof Your Cloud Security for 2018
    Future Proof Your Cloud Security for 2018
    Michael Landewe, Cofounder Avanan Recorded: Dec 7 2017 54 mins
    You can't predict when, but we can show you how the next attack might happen.

    We will discuss the security trends of 2017 that predict the most likely threats of 2018. We will cover the expanding list of attack targets and identify the necessary tools to protect against the newest attack vectors.

    Whether you are using Office 365 or G Suite, Slack or Salesforce, Box or Amazon S3, you need to protect your data from malware, data leakage or malicious users.

    All of these cloud applications can be used to infiltrate your business. All of these cloud applications are potential targets of an attack.

    While no one can predict tomorrow's attack, we can analyze the trends and build a multi-layer, defense-in-depth solution that can respond to the changing threat landscape.
  • Securing the Office 365 Universe: Security Orchestration
    Securing the Office 365 Universe: Security Orchestration
    John Linkous, Founder and CEO of Interpoint Group and Michael Landewe, Cofounder of Avanan Recorded: Nov 15 2017 55 mins
    Office 365 is more than just apps. It’s email, file sharing and collaboration. Threats are more than just malware. Phishing, ransomware, data leakage, accidental shares, insider threats, compromised accounts, compliance failures and regulatory violations are just few. How do you secure your cloud? Once, your options were limited. In this webinar we will discuss the transformative change that has made it possible to secure Office 365 with the same level of protection you would deploy in your own datacenter.

    Brought to you by Redmond Magazine.

    Topics:
    Microsoft's new Secure Score is a great way to identify gaps.
    Phishing is a threat that extends beyond email.
    Advanced Threat Protection has some important limitations.
    Security orchestration across Office 365 is as great a challenge as policy management across multiple SaaS.

    Attendees will have an opportunity to check their own Office 365 environment for potential threats.
  • Cloud Security in the Age of SaaS: Phishing
    Cloud Security in the Age of SaaS: Phishing
    Michael Landewe, Cofounder Avanan Recorded: Oct 25 2017 33 mins
    The Avanan Cloud Security Platform is the next-generation cloud security platform that offers the industry's top-rated solutions for malware, phishing, data leakage, encryption, anomaly detection, shadow SaaS and more.

    In this webinar, we will discuss why phishing has become the most pervasive threat to cloud security, spreading from cloud-based email like Office 365 and Gmail to other communication products like Slack and Skype.

    We will will see why most phishing attacks are now specifically targeting SaaS customers and how SaaS-targeted attacks are both more dangerous and harder to detect.
  • Cloud Security in 30 Minutes
    Cloud Security in 30 Minutes
    Michael Landewe, Cofounder Avanan Recorded: Sep 21 2017 25 mins
    If you are considering a CASB or email MTA gateway, you should see this video first. Securing Office 365, GSuite, Amazon and every other SaaS and IaaS has never been easier. Protect your data from malware, data leakage and malicious users.

    In this webinar, we will describe the next generation Security-as-a-Service platform that makes it easy to protect your data with the industry's highest rated technology for anti-phishing, sandboxing, antivirus, file sanitization, data leak prevention, compliance and more.


    About Avanan: Any SaaS | Any Security | One Click
    Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry's most trusted security vendors, Avanan offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.

Embed in website or blog