Hi [[ session.user.profile.firstName ]]

Forcepoint Cloud, Web & Email Security

  • Date
  • Rating
  • Views
  • 2019 Forcepoint Cybersecurity Predictions
    2019 Forcepoint Cybersecurity Predictions
    Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst Recorded: Nov 29 2018 49 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely through technology. This intersection is also the point of greatest vulnerability for your enterprise and the primary source of security breaches driving cyber risk to all-time highs.

    In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we could have ever imagined.

    Join our webcast now, where we’ll examine topics such as:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale

    Join Forcepoint's Raffael Marty, VP Research & Intelligence, and Carl Leonard, Principal Security Analyst, for a webcast discussing the most pressing cybersecurity issues – and what you can do to protect against them.
  • Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Forcepoint Cyber Experts Discuss Our 2019 Cybersecurity Predictions
    Raffael Marty, VP of Research & Intelligence and colleagues Recorded: Nov 20 2018 7 mins
    Innovation thrives when people can collaborate in a trusted manner, leveraging data creatively and freely. This intersection of people interacting with data and technology will also drive cyber risk to all-time highs, according to new insights from Forcepoint researchers and data scientists.

    Watch this video as our Cyber Experts discuss their contributions to the 2019 Forcepoint Cybersecurity Predictions Report, including:

    - How attacks on industrial IoT could lead to widespread power outages
    - When credential theft moves to cloning your face to bypass biometric authentication
    - What happens in a world incentivized to commit intellectual property theft at scale
  • See SD-WAN with Enterprise Scale and Security in Action
    See SD-WAN with Enterprise Scale and Security in Action
    David LePage, Systems Architect & Jim Fulton, Solution Director, Forcepoint Recorded: Oct 5 2018 45 mins
    Our networks are bigger and more complex than ever, but the charge remains the same: connecting many locations and protecting many devices. Forcepoint offers the most scalable SD-WAN solution, combined with the industry’s top-rated next-gen firewall—all managed at enterprise scale from a single policy-based console.

    In this webcast, we will demo Forcepoint SD-WAN and you will learn how to:

    - Manage enterprise-grade connectivity and protection
    - Streamline compliance across all devices
    - Reduce complexity and cost
  • Take the Safer Road: Best Practices in SaaS Application Security
    Take the Safer Road: Best Practices in SaaS Application Security
    Doug Cahill (ESG) Recorded: Aug 15 2018 40 mins
    For most SaaS developers, security features aren’t top of mind. Because there are no real standard practices yet, the risks presented by the myriad SaaS applications varies widely.

    In this session, ESG Senior Analyst Doug Cahill, will discuss some best practices and the risks presented by a lack of standards, including:

    - Challenges securing cloud applications
    - The Shadow IT Reality
    - Cloud App Security
    - Implementing Cloud App Security Best Practices with a CASB
  • Cloud Security Foundations
    Cloud Security Foundations
    Doug Cahill (ESG) Recorded: Aug 15 2018 33 mins
    Cloud access security brokers (CASB) provide visibility and control for cloud applications (SaaS, PaaS, and IaaS), and an increasingly important part of a CASB solution is to extend data loss protection for data stored in the cloud.

    In this session, ESG Senior Analyst Doug Cahill, will discuss cloud trends and how deploying enterprise-class DLP and CASB solutions together can provide key value for your business, including:

    - Cloud Adoption Trends
    - Who is the “user”?
    - Understanding The Shared Responsibility Security Model
    - The Role of DevOps in Cloud Security
    - The Rise of the Cloud Security Architect
  • Understanding the Limitations of Microsoft O365 Security
    Understanding the Limitations of Microsoft O365 Security
    Mike Osterman (Osterman Research) Recorded: Aug 15 2018 26 mins
    Microsoft Office 365 includes native security at various levels, depending on your license. But is that enough? Osterman Research discovered that over 73% of organizations will choose to either supplement or replace native Office 365 security with third-party solutions by 2019.

    In this 30-minute session, CEO and founder Mike Osterman will discuss their findings and what’s driving these organizations’ decisions, including:

    - Organizations’ key priorities for securing O365
    - Barriers to adoption and full migration of users
    - Identifying key third-party solutions like Email Security, CASB, and DLP that can help mitigate security gaps and lower TCO

    Presenter: Mike Osterman, CEO and Founder, Osterman Research
  • Mastering Policy Setting and Control in the Cloud
    Mastering Policy Setting and Control in the Cloud
    Andras Cser (Forrester) Recorded: Aug 15 2018 28 mins
    Extending the necessary control and policies in the cloud can be a daunting task for many enterprise customers. But with the right tools in place, it doesn’t have to be that way.

    Join guest presenter Forrester Vice President, Principal Analyst serving Security and Risk professionals, Andras Cser as he shares their recommendations for securing data and mastering policy setting. In this 30-minute session, Andras will discuss:

    - The need to protect SaaS data… AND across the IaaS and PaaS platforms
    - The importance of automation
    - The pros and cons of the architectural approaches

    Presenter: Andras Cser, Vice President, Principal Analyst serving Security and Risk professionals, Forrester
  • Have You Outgrown Your Web Security?
    Have You Outgrown Your Web Security?
    JK Lialias, Sr. Director, Cloud Security, Forcepoint Recorded: Jun 12 2018 26 mins
    In the past, web security mainly focused on blocking users’ access to potentially malicious web content. But the threat landscape is evolving and users are everywhere online, including cloud applications. Is your Web security solution keeping up?

    In this webcast, learn how Forcepoint Web Security provides the most advanced real-time threat defense to support the anywhere, anytime workforce. Understand how Forcepoint Web Security:

    • Helps increase productivity without adding needless complexity
    • Uses CASB to discover and secure data in cloud applications, along with DLP to prevent data loss
    • Empowers users to manage everything from one console, including shared policies and centralized reporting

    See why legacy vendors don’t even come close.
  • Maximize your Office 365 Investment with Forcepoint
    Maximize your Office 365 Investment with Forcepoint
    Mike Smart, Product & Solutions Director, Forcepoint Recorded: May 23 2018 47 mins
    Driving Office 365 adoption is an important goal - 87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance and poor user experience caused by network architecture limitations and constraints.

    Forcepoint's Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite.

    * Enhance Microsoft's integrated cloud security and regain visibility & protection against advanced attacks and data loss
    * Extend compliance consistently into the Microsoft ecosystem and beyond
    * Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
    * Have the right network architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud

    Join us as we explore these use cases and demonstrate how Forcepoint protects Office 365 and your expanding cloud environment.
  • The Top 5 Security Lessons Learned from Transitioning to the Cloud
    The Top 5 Security Lessons Learned from Transitioning to the Cloud
    Carla Arend, Arun Singh, Nico Fischbach Recorded: May 23 2018 50 mins
    Join IDC Senior Program Director for Cloud, Carla Arend, Salesforce Director for Security Customer Engagement, Arun Singh and Forcepoint Global CTO, Nico Fischbach for a discussion on security and a cloud-first strategy.

    This 50-minute webinar addresses the top five information security lessons IT professionals have learned while transitioning to the cloud.

    The topics covered include:
    * Multi-cloud adoption: exposing challenges for security architectures
    * Cloud application visibility and control
    * Cloud-first and GDPR implications
    * Data management and DLP in the cloud
    * Leveraging User and Entity Behavior Analytics (UEBA) for protection"

Embed in website or blog