Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date See Forcepoint ONE Zero Trust Network Access (ZTNA) in Action Nate Springer, Director of Platform Engineering, Forcepoint | Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint Easy access to private applications without the risks and costs of a VPN Forcepoint ONE Zero Trust Network Access (ZTNA) makes remote access to priv... April 5, 2023 8:00am A Buyer’s Guide: What To Consider When Assessing a Cloud Access Security Broker Hank Schless, Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast Are you a security leader looking to: - Protect data while enabling users to access any app, from any device—managed or unmanaged? - Enforce complianc... 2 months ago | 36 mins Securing Data in Cloud Apps with Agentless DLP Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint | Justin Crowley, Principal Sales Enablement Manager, Forcepoint We have seen the impact that the rise of cloud-first organizations and the increased adoption of hybrid and remote work has on data security. The work... 4 months ago | 42 mins Demo: Forcepoint Cloud Access Security Broker (CASB) Corey Kiesewetter, Sr. Product Marketing Manager, Forcepoint | Justin Crowley, Principal Sales Enablement Manager, Forcepoint Accessing cloud apps and data from mobile devices is commonplace for today’s hybrid workforce. The average enterprise deploys more than 280 SaaS apps,... 7 months ago | 17 mins Protect Against Data Loss from Departing Employees on Unmanaged Devices Stephanie Torto, Sr Product Marketing Manager, Proofpoint & Michael Gordover, Principal Security Architect, Proofpoint Employees have been leaving their jobs, whether voluntarily or involuntarily, at an unprecedented rate during the past several years. As a result, 50%... 5 months ago | 31 mins A Guide To Securing Application Access with Virtual Apps and Desktops Service Akhilesh Dhawan | Abimbola Adegbite | Debbie Reynolds | Leo Cuellar As employees are no longer limited to the perimeter of the corporate office, and anywhere, anytime messaging is rife, automated application security i... 6 months ago | 61 mins Cloud Applications: A Zero Trust Approach to Security in Healthcare Nick Sears, Vice President of SASE, Lookout Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable bot... 6 months ago | 57 mins Your Cloud Workloads Are Fully Secure, Right? Bassam Khan, VP of Product and Technical Marketing Engineering - Gigamon You have all the cloud monitoring and security tools in place. Would you agree that it’s still difficult to: - Have complete visibility and eliminat... 1 year ago | 26 mins Your Cloud Workloads Are Fully Secure, Right? Bassam Khan, VP of Product and Technical Marketing Engineering - Gigamon You have all the cloud monitoring and security tools in place. Would you agree that it’s still difficult to: - Have complete visibility and eliminat... 1 year ago | 26 mins Core cloud data risk scenarios – and how to stop them Shane Moore, VP of Sales, SSE, Forcepoint | Nick d’Amato, Consulting Solutions Engineer, Forcepoint Forcepoint ONE is the answer to the problem you don’t know you have – a converged cloud security platform that brings together CASB, SWG and ZTNA serv... 1 year ago | 61 mins Load more