Hi [[ session.user.profile.firstName ]]

Avanan

  • Date
  • Rating
  • Views
  • Cloud Account Takeover | Securing the Enterprise Cloud
    Cloud Account Takeover | Securing the Enterprise Cloud Yoav Nathaniel, Cloud Deployment Engineer Recorded: Mar 8 2018 21 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on the Cloud Account Takeover Threat.

    We'll cover how Avanan Identifies and protects against an Account Takeover Breach, an imminent threat to all SaaS and IaaS:
    • Compromised Credentials
    • Malicious and Insecure Configuation
    • Anomaly Behavior Analysis
    • API Token Harvesting
  • Securing Google IaaS Infrastructure | Securing the Enterprise Cloud
    Securing Google IaaS Infrastructure | Securing the Enterprise Cloud Gil Friedrich, Avanan CEO Recorded: Mar 1 2018 27 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on IaaS: AWS, Azure and Google Compute.

    We'll cover the threats specific to IaaS like Amazon AWS, Azure and Google Compute

    • Insider Threat, Compromised Accounts, Account Takeover
    • Insecure or Malicious Configuration
    • Malware, phishing, file analysis beyond your app
  • Securing Google G Suite | Securing the Enterprise Cloud
    Securing Google G Suite | Securing the Enterprise Cloud Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 22 2018 30 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on G Suite.

    During this session, we’ll cover threats to data within G-Suite:
    • Email-based phishing, spoofing, and malware
    • Account takeover, insider threats, compromised Google credentials
    •Controlling sensitive data within G-Drive and Gmail and GSuite Apps
  • Securing Office 365 | Securing the Enterprise Cloud
    Securing Office 365 | Securing the Enterprise Cloud Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 15 2018 37 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on Office 365.

    This hands-on demo will provide examples of the key Office 365 use cases:
    • Zero-day Malware
    • Phishing
    • Data Leakage
    • Account Takeover
    • Auditing and Compliance

    We’ll show you how to:
    • Stop phishing and malware in Office 365 mail
    • Quarantine infected files within One Drive,
    • Control sensitive information and prevent data leakage,
    • Protect against the insider threat, and
    • Monitor and enforce regulatory compliance for all users.
  • Securing Citrix ShareFile | Securing the Enterprise Cloud
    Securing Citrix ShareFile | Securing the Enterprise Cloud Chris Isbrecht Director of Cloud Security Architecture Recorded: Feb 8 2018 25 mins
    Part of Avanan's "Securing the Enterprise Cloud" Series, this webinar focuses on Citrix ShareFile.

    This hands-on demo will provide examples of the key ShareFile use cases:
    • Zero-day Malware
    • Data Leakage
    • Account Takeover
    • Auditing and Compliance

    We’ll show you how to:
    • Quarantine infected files within Citrix ShareFile,
    • Control sensitive information and prevent data leakage from ShareFile,
    • Protect against the insider threat, and
    • Monitor and enforce regulatory compliance for ShareFile users.
  • Future Proof Your Cloud Security for 2018
    Future Proof Your Cloud Security for 2018 Michael Landewe, Cofounder Avanan Recorded: Dec 7 2017 54 mins
    You can't predict when, but we can show you how the next attack might happen.

    We will discuss the security trends of 2017 that predict the most likely threats of 2018. We will cover the expanding list of attack targets and identify the necessary tools to protect against the newest attack vectors.

    Whether you are using Office 365 or G Suite, Slack or Salesforce, Box or Amazon S3, you need to protect your data from malware, data leakage or malicious users.

    All of these cloud applications can be used to infiltrate your business. All of these cloud applications are potential targets of an attack.

    While no one can predict tomorrow's attack, we can analyze the trends and build a multi-layer, defense-in-depth solution that can respond to the changing threat landscape.
  • Securing the Office 365 Universe: Security Orchestration
    Securing the Office 365 Universe: Security Orchestration John Linkous, Founder and CEO of Interpoint Group and Michael Landewe, Cofounder of Avanan Recorded: Nov 15 2017 55 mins
    Office 365 is more than just apps. It’s email, file sharing and collaboration. Threats are more than just malware. Phishing, ransomware, data leakage, accidental shares, insider threats, compromised accounts, compliance failures and regulatory violations are just few. How do you secure your cloud? Once, your options were limited. In this webinar we will discuss the transformative change that has made it possible to secure Office 365 with the same level of protection you would deploy in your own datacenter.

    Brought to you by Redmond Magazine.

    Topics:
    Microsoft's new Secure Score is a great way to identify gaps.
    Phishing is a threat that extends beyond email.
    Advanced Threat Protection has some important limitations.
    Security orchestration across Office 365 is as great a challenge as policy management across multiple SaaS.

    Attendees will have an opportunity to check their own Office 365 environment for potential threats.
  • Cloud Security in the Age of SaaS: Phishing
    Cloud Security in the Age of SaaS: Phishing Michael Landewe, Cofounder Avanan Recorded: Oct 25 2017 33 mins
    The Avanan Cloud Security Platform is the next-generation cloud security platform that offers the industry's top-rated solutions for malware, phishing, data leakage, encryption, anomaly detection, shadow SaaS and more.

    In this webinar, we will discuss why phishing has become the most pervasive threat to cloud security, spreading from cloud-based email like Office 365 and Gmail to other communication products like Slack and Skype.

    We will will see why most phishing attacks are now specifically targeting SaaS customers and how SaaS-targeted attacks are both more dangerous and harder to detect.
  • Cloud Security in 30 Minutes
    Cloud Security in 30 Minutes Michael Landewe, Cofounder Avanan Recorded: Sep 21 2017 25 mins
    If you are considering a CASB or email MTA gateway, you should see this video first. Securing Office 365, GSuite, Amazon and every other SaaS and IaaS has never been easier. Protect your data from malware, data leakage and malicious users.

    In this webinar, we will describe the next generation Security-as-a-Service platform that makes it easy to protect your data with the industry's highest rated technology for anti-phishing, sandboxing, antivirus, file sanitization, data leak prevention, compliance and more.


    About Avanan: Any SaaS | Any Security | One Click
    Avanan, The Cloud Security Platform, protects data in any SaaS. Partnering with the industry's most trusted security vendors, Avanan offers cloud-native versions of the most advanced technology to protect against malware, phishing, ransomware, data leakage, insider threats and more. The cloud-based platform is completely out-of-band and can be deployed in one click.
  • How Avanan is Disrupting the Cloud Security Market
    How Avanan is Disrupting the Cloud Security Market Michael Landewe, Cofounder Avanan Recorded: Aug 10 2017 34 mins
    It's the Avanan Era of Security–most every security vendor has joined together on a single platform to solve the problem of security in the cloud. It is challenging every security assumption:

    • Single-silo solutions that solve one problem or only protect one SaaS;
    • Incompatible technology that makes it impossible to deploy true defense-in-depth;
    • Disruptive deployment that reroutes traffic;
    • Technology lock-in and vendor regret;

    The Avanan disruption in the marketplace is actually an elimination of the chaos of incompatible products that do not work together or don't integrate with the current enterprise security architecture.

    In this webinar, we will discuss how the Avanan platform changes the security equation for:

    • SaaS/IaaS: that can now offer cloud-native security,
    • Security Buyer: who can deploy and compare multiple solutions at once,
    • The Security Architect: who can integrate the cloud into the enterprise security workflow,
    • The CISO: who requires both security and compliance,
    • The CEO: who will not tolerate business disruption,
    • The User: who needs to just get work done.

    Soon, the Avanan Platform is the way that all cloud security technology will be compared, purchased, deployed and managed.

Embed in website or blog