Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Protect Your Business From Data Privacy Leaks Using Automated Security Testing James Croall, Product Management Director, Synopsys Join us for a webinar on the automated source code data protection measure with James Croall, Product Management Director, Synopsys. James will discus... 3 weeks ago | 39 mins Simplifying Cloud Security - A SANS Review of Forcepoint ONE Matt Bromiley, SANS Analyst | Mike Schuricht, VP, Products, Forcepoint Join SANS instructor Matt Bromiley and Mike Schuricht, VP of Product Management from Forcepoint, for an in-depth review of the Forcepoint ONE Security... 2 weeks ago | 60 mins See Forcepoint ONE Zero Trust Network Access (ZTNA) in Action Nate Springer, Director of Platform Engineering, Forcepoint | Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Easy access to private applications without the risks and costs of a VPN Forcepoint ONE Zero Trust Network Access (ZTNA) makes remote access to priv... April 5, 2023 8:00am 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... March 30, 2023 7:00am 5 Considerations for a Smooth Replacement of NetScaler Yaron Azerual Citrix recently announced that they’ll soon turn their focus away from you and most customers anddevote all of their resources to their top 1600 custo... March 30, 2023 3:00pm The Future of Hybrid-First Organizations Dr. Lily Phan (Research Director, IDC) & Michael Turner (Monitors Product Manager, Dell Technologies) Are you ready for the future of work? With around 60% of employees preferring hybrid models, organizations must provide flexibility to bring a competi... 1 month ago | 21 mins 5 Steps to Simplifying Zero Trust with SASE Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Join Corey Kiesewetter as he discusses the benefits of a single-vendor SASE solution and how the CASB, ZTNA, SWG, DLP and Secure SD-WAN components can... 2 months ago | 23 mins Supply chain attacks and the growing complexity of applications’ attack surface Uri Dorot For many organizations, the greatest concern they have about migrating their application environment to the cloud is what it may mean to their attack ... 5 days ago | 37 mins Secure Business Critical Content in Microsoft 365 Applications Leigh Rowland, Chief Engineer, archTIS and Welland Chu, Alliances Director, Thales APAC Thales CipherTrust Manager Integrates with archTIS NC Encrypt to Address Digital Sovereignty. Thales is a founding member of the Microsoft Intelligen... 1 hour ago | 46 mins Is your data your weakest link? Is it time to get it under control? Julian Weinberger, Field CTO and Joe Sorial VP Product Management, ShardSecure In 2023, data will be king. It’s the most important and financially valuable element of IT infrastructure. It’s a key focus for security teams, who... 9 hours ago | 37 mins Load more