Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Forcepoint ONE - CASB Use Case Shane Moore, Vice President of Sales, SSE, Forcepoint Forcepoint's Shane Moore demonstrates how CASB, delivered by the Forcepoint ONE Security platform, can prevent misuse of sensitive data in the cloud f... May 25, 2022 8:30am Customer Spotlight: Cameron County, TX Embraces Zero Trust Approach with iboss Richard Quinones Join Juan Saldana, CTO of Cameron County, Texas, Richard Quinones, iboss Senior Vice President, Public Sector, and Mike Robbins, iboss Customer Succes... May 25, 2022 4:00pm IoT Governance: Applying Policies to Teams That Don't Report to You John Deskurakis, Carrier Corp; Maria Sumnicht, former Chief Architect New York City Cyber Command Many organizations with robust information security policies struggle to extend those policies to IoT devices. Whether it is because these devices ar... May 31, 2022 5:00pm Forcepoint ONE - SWG Use Case Shane Moore, Vice President of Sales, SSE, Forcepoint Forcepoint's Shane Moore demonstrates how SWG, delivered by the Forcepoint ONE Security platform, can safeguard business access from company-managed d... June 1, 2022 8:30am Managed Security Services: Extracting More Value From Your SOC Platform Sanjay Raja, VP of Product Marketing and Solutions & Joe Conti, Director of Channel Sales Managed Service providers whether MDR, MSSP or MSP are in a very competitive market with several security and operational challenges. Picking the righ... 3 weeks ago | 37 mins How to Automate SD-WAN Deployments & Management Dan Sullivan, Principal Solutions Engineer, Itential Enterprises are adopting SD-WAN to reduce costs, increase network performance, and security, as well as help network teams manage large remote sites m... 2 weeks ago | 36 mins Getting Started with Zero Trust in Healthcare Tamer Baker, Forescout VP, Global Healthcare Exploring a Zero Trust Architecture in the Healthcare Industry – How to get started and pitfalls to avoid Digital transformation in the Healthcare i... 2 weeks ago | 24 mins MDM is Not Mobile Security: Why Mobile Threat Defense Achieves What MDM Cannot Monique Becenti, Zimperium With today’s increasingly distributed workforce, protecting data on mobile devices (both managed and BYOD) is not only essential but critical for the ... 4 weeks ago | 51 mins A Guide To Securing Application Access with Virtual Apps and Desktops Service Akhilesh Dhawan | Abimbola Adegbite | Debbie Reynolds | Leo Cuellar As employees are no longer limited to the perimeter of the corporate office, and anywhere, anytime messaging is rife, automated application security i... 2 weeks ago | 61 mins Advanced Protection for your Workforce, Data and Devices Tim Evans & Sean Towns Keeping up with ever-evolving security threats is a heavy burden on any IT team. A multi-layered cyber security strategy that includes threat monitori... 2 months ago | 40 mins Load more