Hi [[ session.user.profile.firstName ]]

Forcepoint Cloud, Web & Email Security

  • Date
  • Rating
  • Views
  • Maximize your Office 365 Investment with Forcepoint
    Maximize your Office 365 Investment with Forcepoint Mike Smart, Product & Solutions Director, Forcepoint Recorded: May 23 2018 47 mins
    Driving Office 365 adoption is an important goal - 87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance and poor user experience caused by network architecture limitations and constraints.

    Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite.

    * Enhance Microsoft's integrated cloud security and regain visibility & protection against advanced attacks and data loss
    * Extend compliance consistently into the Microsoft ecosystem and beyond
    * Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
    * Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud

    Join us as we explore these use cases and demonstrate how Forcepoint protects Office 365 and your expanding cloud environment.
  • The Top 5 Security Lessons Learned from Transitioning to the Cloud
    The Top 5 Security Lessons Learned from Transitioning to the Cloud Carla Arend, Arun Singh, Nico Fischbach Recorded: May 23 2018 50 mins
    Join IDC Senior Program Director for Cloud, Carla Arend, Salesforce Director for Security Customer Engagement, Arun Singh and Forcepoint Global CTO, Nico Fischbach for a discussion on security and a cloud-first strategy.

    This 50-minute webinar addresses the top five information security lessons IT professionals have learned while transitioning to the cloud.

    The topics covered include:
    * Multi-cloud adoption: exposing challenges for security architectures
    * Cloud application visibility and control
    * Cloud-first and GDPR implications
    * Data management and DLP in the cloud
    * Leveraging User and Entity Behavior Analytics (UEBA) for protection"
  • How a Security Company Secures its Own Cloud
    How a Security Company Secures its Own Cloud Meerah Rajavel & Dr. Richard Ford Recorded: May 23 2018 33 mins
    Driving Office 365 adoption is an important goal—87% of IT professionals say it’s a top priority -- yet, few have fully migrated their users and apps, with security, regulatory and resource challenges often the cause. Security companies too, face these same fundamental challenges. As a recent Office 365 adopter, Forcepoint has first-hand experience securely migrating users to the cloud.

    Join Forcepoint’s CIO and Chief Scientist as they share learnings, surprises and insights from our own migration.

    Presented by;
    * Meerah Rajavel, CIO, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
  • Is Threat-Centric Security Running so Fast just to Stand Still?
    Is Threat-Centric Security Running so Fast just to Stand Still? Antti Reijonen, Dr. Richard Ford & David Coffey Recorded: May 23 2018 39 mins
    A traditional threat-centric approach focuses on prevention and detection of attacks that exploit vulnerabilities in the software. The cloud environment abolishes the “walls” that helped us feel more protected. Cloud application security requires a new user-centric approach that respects the dynamic nature of users and how they interact with data, enabling organizations to recognize and respond to real risks.

    You will learn:

    * How user-centric security is different than traditional threat-centric security
    * How organizations can make the transition to user-centric security
    * Forcepoint’s vision for securing the organization in the future

    Presented by:
    * Antti Reijonen, VP of Cloud Solutions, Forcepoint
    * Dr. Richard Ford, Chief Scientist, Forcepoint
    * David Coffey, VP of Cloud Security R&D, Forcepoint
  • Chief Information Office and Chief Marketing Officer: A Technology Partnership
    Chief Information Office and Chief Marketing Officer: A Technology Partnership Praveen Asthana & Meerah Rajavel Recorded: May 23 2018 19 mins
    The typical Enterprise CMO is driving a comprehensive marketing technology stack often including more than 90 marketing cloud applications. Lead data, analytics and processes must flow quickly, integrate, and results must be available immediately – around the globe. At the same time, customer and prospect data must be secured from increasingly sophisticated attacks while complying with privacy laws. A strong partnership between the CMO and CIO is critical to keep everything in sync, securely, to keep revenues growing.

    You will learn:

    * What are the cornerstones of a productive partnership between the CIO and CMO?
    * What is the right balance between innovation and security?
    * How can the CIO ensure compliance before new cloud apps are deployed?

    Presented by:
    * Praveen Asthana, CMO, Forcepoint
    * Meerah Rajavel, CIO, Forcepoint
  • Securing Your Cloud Applications
    Securing Your Cloud Applications Joakim (JK) Lialias, Sr. Director, Product Marketing, Cloud Security, Forcepoint Recorded: May 21 2018 38 mins
    Managing Risk - Making the Invisible, Visible​

    Today, the average enterprise customer uses over 1,000 cloud applications, including SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service), or even homegrown cloud applications. To mitigate security risks, IT leaders need to ensure assets housed in these cloud environments are secure.

    According to a recent Forcepoint security survey, 56% of business decision-makers stated that it’s difficult or very difficult to promote innovation through a move to cloud while maintaining corporate security and governance.

    The art of managing cloud application risk today is critically centered on making the invisible visible, while also applying the necessary control and governance. Watch this webcast to learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security solutions, can help with:

    - Discovery – insight into what cloud apps are being used by employees
    - Enforcement – automated threat prevention and context-aware policy enforcement
    - Risk Assessment – contextual risk of applications, users, and security configurations
  • Forcepoint Advanced Malware Detection - A Step Beyond Sandboxing
    Forcepoint Advanced Malware Detection - A Step Beyond Sandboxing Joakim Lialias, Sr. Director of Product Marketing, Forcepoint Recorded: Apr 12 2018 23 mins
    It’s become increasingly difficult to identify the malware components of advanced threats, mostly due to the evolution of evasion tactics and technology by criminal and nation-state threat actors.

    Forcepoint Advanced Malware Detection (AMD) technology is unmatched in security efficacy. Even highly evasive threats are revealed through Deep Content Inspection of activity at multiple levels, dormant code, and other indicators often overlooked by other sandbox technologies.

    Join Sr. Director of Product Marketing for Cloud Security Joakim Lialias, as he explores how Forcepoint AMD’s added functionality goes beyond the traditional sandbox.

    *Forcepoint AMD is an optional integrated module for Forcepoint CASB, NGFW, Web and Email Security products.
  • Maximize your Office 365 investment with Forcepoint
    Maximize your Office 365 investment with Forcepoint Mike Smart, Product & Solutions Director, Forcepoint Recorded: Mar 14 2018 46 mins
    Driving Office 365 adoption is an important goal - 87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance and poor user experience caused by network architecture limitations and constraints.

    Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite.

    - Enhance Microsoft's integrated cloud security and regain visibility & protection against advanced attacks and data loss
    - Extend compliance consistently into the Microsoft ecosystem and beyond
    - Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
    - Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud

    Join us as we explore these use cases and demonstrate how Forcepoint protects Office 365 and your expanding cloud environment.
  • The Top 5 Security Lessons Learned from Transitioning to the Cloud
    The Top 5 Security Lessons Learned from Transitioning to the Cloud Carla Arend, Senior Program Director - Cloud, IDC Recorded: Feb 7 2018 50 mins
    Join IDC Senior Program Director for Cloud, Carla Arend, Salesforce Director for Security Customer Engagement, Arun Singh and Forcepoint Global CTO, Nico Fischbach for a discussion on security and a cloud-first strategy. This 50-minute webinar addresses the top five information security lessons IT professionals have learned while transitioning to the cloud.

    The topics covered include:

    - Multi-cloud adoption: exposing challenges for security architectures

    - Cloud application visibility and control

    - Cloud-first and GDPR implications

    - Data management and DLP in the cloud

    - Leveraging User and Entity Behavior Analytics (UEBA) for protection
  • 2018 Security Predictions
    2018 Security Predictions Bob Hansmann, Director, Security Technologies, Forcepoint Recorded: Nov 30 2017 53 mins
    New security challenges in 2018

    Hackers are already scheming their next wave of targets: will they replicate the colossal Equifax breach and cash in on reams of personal data or freeze up IoT devices simply in order to disrupt critical systems?

    Join Forcepoint's Bob Hansmann, Director, Security Technologies for a Forcepoint 2018 Security Predictions Report webcast on the most pressing security issues for the upcoming year.

    You’ll receive an advance copy of the Forcepoint 2018 Security Predictions Report just for attending.

Embed in website or blog