Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Best Practices for Implementing ZTNA Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint | Ramiro Estrada, Sr. Manager, Professional Services, Forcepoint ZTNA renders the VPN obsolete, it dramatically lowers data risk, it vastly improves user experience and it offers a first step towards SASE. Given th... 2 months ago | 37 mins See Forcepoint ONE Zero Trust Network Access (ZTNA) in Action Nate Springer, Director of Platform Engineering, Forcepoint | Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Easy access to private applications without the risks and costs of a VPN Forcepoint ONE Zero Trust Network Access (ZTNA) makes remote access to priv... 6 months ago | 36 mins Software Due Diligence: Mitigating Multiple Dimensions of Risk Phil Odence, Synopsys Most software due diligence playbooks involve peer-to-peer discussions about products, processes, and people. That’s all extremely important as invest... 2 months ago | 64 mins DLP SaaS Security with Forcepoint ONE DLP Justin Crowley, Principal Enablement Manager | Kevin Oliveira, Snr. Product Marketing Manager, Data Security Solutions Secure all your cloud data with ONE DLP Forcepoint ONE DLP delivers best-in-class, SaaS security across cloud, web and private applications. Now you ... 5 months ago | 52 mins Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... 6 months ago | 41 mins Australian Institutions targeted by Hacktivist Groups: How to Stay protected Pascal Geenens, Director, Cyber Threat Intelligence | Ron Meyran, Senior Director, Corporate Enablement Over 100 Australian sites have become a prominent target for hacktivist attacks — including the public websites of governments, airports, healthcare, ... 6 months ago | 41 mins Secure, Scalable and Consistent Application Delivery in a Multi-Cloud World Frank Yue, Vijayendra Singh As Enterprises increasingly span their workloads across on-premises data centers and cloud environments, it is becoming significantly complex for IT t... 5 days ago | 58 mins How Applications are attacked - A year in application security Trey Guinn Field CTO Cloudflare Dan Gould Product Marketing Director Cloudflare Cloudflare sees up to 61 million requests per second, meaning we have an unprecedented view into Internet trends like application attacks and API traf... September 27, 2023 2:00pm VMware NSX Legacy Load Balancing is Going Away – Migrate to Avi Sayli More, Solution Architect; Pablo Boscariol, Sr. Product Marketing Mgr VMware will be sunsetting the NSX native load balancers. Customers should be migrating to the currently supported NSX Advanced Load Balancer (Avi) whi... September 28, 2023 3:00pm Setting Permissions for Kintone Apps Larissa Suguitan This is a great training for anyone who will be a Kintone App Builder because we’ll go through how to set up permissions for apps. After this training... September 25, 2023 6:00pm Load more