Hi [[ session.user.profile.firstName ]]
Sort by:
    • Securing Your Cloud Applications
      Securing Your Cloud Applications Joakim (JK) Lialias, Sr. Director, Product Marketing, Cloud Security, Forcepoint Recorded: May 21 2018 7:35 pm UTC 38 mins
    • Managing Risk - Making the Invisible, Visible​

      Today, the average enterprise customer uses over 1,000 cloud applications, including SaaS (Software as a Service), PaaS (Platform as a Service), IaaS (Infrastructure as a Service), or even homegrown cloud applications. To mitigate security risks, IT leaders need to ensure assets housed in these cloud environments are secure.

      According to a recent Forcepoint security survey, 56% of business decision-makers stated that it’s difficult or very difficult to promote innovation through a move to cloud while maintaining corporate security and governance.

      The art of managing cloud application risk today is critically centered on making the invisible visible, while also applying the necessary control and governance. Watch this webcast to learn how Forcepoint CASB, along with DLP for Cloud Applications and Web Security solutions, can help with:

      - Discovery – insight into what cloud apps are being used by employees
      - Enforcement – automated threat prevention and context-aware policy enforcement
      - Risk Assessment – contextual risk of applications, users, and security configurations

      Read more >
    • Addressing The Security Challenges of the Cloud Generation
      Addressing The Security Challenges of the Cloud Generation Gerry Grealish, Head of Product Marketing, Network and Cloud Security Products Recorded: Oct 24 2017 4:00 pm UTC 46 mins
    • Welcome to the Cloud Generation, where employees demand flexibility and access wherever they are, but can expose your most sensitive data to risk.

      Distributed environments—like mobile and distributed workforces—introduce new attack surfaces that must be protected and increased use of SaaS Cloud Apps are driving the need for new compliance and security controls. The result? Security and IT teams are being forced to rethink network designs to better answer questions like:

      - How do we effectively govern access to data, apps and systems?

      - How can we combat advanced threats targeting our business through the web, cloud and e-mail?

      - How should we secure information that is moving between our network, endpoints and the cloud?

      Join Gerry as he discusses the key Cloud Generation security challenges facing Symantec’s enterprise customers and learn how Symantec’s Cloud-delivered security solutions can be used to protect users, devices and corporate data, wherever it resides.

      Read more >
    • Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements
      Cutting through the Cloud Security Noise: 5 Must-have Architectural Requirements Steve House of Zscaler Recorded: Jan 11 2018 5:00 pm UTC 47 mins
    • The cloud and mobility have fundamentally changed the IT landscape. Both apps and users have left the network, however traditional security has struggled to keep pace. Developing a strong cloud security strategy is important to help restore visibility and reduce risk, but what is the best approach? While there are many opinions and perspectives, the best security strategy starts in the beginning with the proper architecture. Join this webcast to hear:

      - 5 key architectural requirements your cloud security strategy can’t live without.
      - What core building blocks you need to enable and secure your users and apps
      - Learn how leading enterprises are transforming their security to cloud

      Speaker Bio:
      Steve House is a seasoned Product Management leader with over 20 years of experience in the networking and security industries. During that time, he has worked for multiple market-leading organizations including Zscaler, Blue Coat Systems, Packeteer and CacheFlow where he has a consistent track record of helping them innovate and grow their market share.

      At Zscaler, Steve leads the Product Management team responsible for driving product strategy and execution. Steve’s goal is to help the company through its next phase of growth becoming the standard Internet security platform delivered as a service to any user on any device in any location. Steve holds a Bachelor of Science in Electrical Engineering from Duke University.

      For more questions about Zscaler, go to www.zscaler.com

      Read more >
    • Can bigger security budgets save businesses from costly cloud breaches?
      Can bigger security budgets save businesses from costly cloud breaches? Maxim Frolov, Vice President of Global Sales, Kaspersky Lab and Jim Reavis, Co-founder and CEO, Cloud Security Alliance Upcoming: Jun 27 2018 3:00 pm UTC 75 mins
    • Nearly 1.5 million dollars. That’s how much an average data breach in the cloud costs enterprises, according to the Global IT Security Risks Survey 2018.

      Second only to targeted attacks, breaches affecting IaaS are among the most costly faced by businesses today. But what can be done about this? Apparently, investing more in protection is only part of the solution, as businesses are already allocating a greater share of their IT budgets to security…

      During the webinar, Maxim Frolov, VP Global Sales, Kaspersky Lab, will present key findings from the company’s latest report On the Money: Growing IT Security Budgets to Protect Digital Transformation Initiatives. Maxim, along with special guest Jim Reavis, Co-founder and CEO, Cloud Security Alliance, will discuss the potential damage and the main risks associated with cloud breaches, as well as what businesses can do to protect themselves.

      Webinar attendees will get the latest insights on the dynamics of corporate security incidents and IT security budgets. They will learn what financial, organizational and technological decisions should be made to protect businesses from the threat of cloud infrastructure breaches.

      Read more >
    • Evolving Your Cloud Security Stack With a CASB
      Evolving Your Cloud Security Stack With a CASB Gartner's Cloud Security Research Director Steve Riley and Netskope CEO Sanjay Beri Recorded: Jul 28 2017 3:50 pm UTC 30 mins
    • Hear from Gartner’s cloud security research director Steve Riley.

      New API-driven cloud and web services, along with mobile devices, have unlocked new and unsurpassed levels of productivity.

      The reality, however, is that while the way people work has evolved, legacy security tools were designed for a different time — and new tools such as cloud access security brokers (CASBs) are quickly gaining the attention of security architects and CISOs worldwide.

      Netskope is proud to sponsor this webcast where attendees will hear from Gartner’s cloud security research director Steve Riley.

      Attendees will learn:

      - how organizations are rethinking visibility, governance, data security, and threat protection

      - how to build a new security stack as resilient and nimble as the new workforce they protect.

      Featured presenters

      Steve Riley
      Cloud Security Research Director

      Sanjay Beri
      Chief Executive Officer

      Read more >
    • Have You Outgrown Your Web Security?
      Have You Outgrown Your Web Security? JK Lialias, Sr. Director, Cloud Security, Forcepoint Recorded: Jun 12 2018 6:15 pm UTC 26 mins
    • In the past, web security mainly focused on blocking users’ access to potentially malicious web content. But the threat landscape is evolving and users are everywhere online, including cloud applications. Is your Web security solution keeping up?

      In this webcast, learn how Forcepoint Web Security provides the most advanced real-time threat defense to support the anywhere, anytime workforce. Understand how Forcepoint Web Security:

      • Helps increase productivity without adding needless complexity
      • Uses CASB to discover and secure data in cloud applications, along with DLP to prevent data loss
      • Empowers users to manage everything from one console, including shared policies and centralized reporting

      See why legacy vendors don’t even come close.

      Read more >
    • Top 10 Public Cloud Security Recommendations
      Top 10 Public Cloud Security Recommendations Matt Keil of Palo Alto Networks Recorded: Dec 14 2017 5:30 pm UTC 43 mins
    • Offering organizations of all sizes the benefits of agility and scalability, the adoption of public cloud continues at a pace rivalled only by that of the early days of the Internet era. As was the case then, the speed of adoption often means that “good enough” security is viewed as acceptable. With the underlying premise that the public cloud is someone else’s computer, and an extension of your network this session will cover public cloud security concerns, what the shared security responsibility model really means and recommendations for protecting your public cloud workloads and data.

      Read more >
    • Cloud Security for Dummies, Enterprise Mobility Edition
      Cloud Security for Dummies, Enterprise Mobility Edition Christopher Campbell, Dir. Enterprise Mobility, VMware & authors of Cloud Security for Dummies, Lebin Cheng & Steve Malmskog Recorded: Apr 26 2016 5:00 pm UTC 56 mins
    • VMware AirWatch and Netskope present:

      Cloud Security for Dummies, Enterprise Mobility Edition

      As more mission-critical business workflows move to the cloud, yesterday’s security protocols and measures have become inadequate. And as cybersecurity threats increase, protecting business resources from compromised mobile endpoints is no longer a “nice to have” but a “must have” for the digital enterprise. More than half of all enterprise cloud app activities now occur over mobile devices with enterprise mobility at the epicenter and crossroad of business productivity and cybersecurity challenges.

      Join VMware AirWatch Director of Enterprise Mobility, Christopher Campbell and Netskope authors of Cloud Security for Dummies, Steve Malmskog and Lebin Cheng, for a lively discussion and reveal of the 10 “must haves" for cloud-consuming mobile workforces. Attendees will learn how to:

      Use intelligence about identity, device, and cloud usage to inform policy decisions on the device, in the app, and in the cloud;

      Identify cloud app usage trends to anticipate users’ needs and create a better mobile and cloud user experience;

      Proactively protect sensitive user and corporate information through policy; and

      Halt threats in the cloud before they propagate to users’ devices.

      Read more >
    • How to Protect Workloads in the Cloud
      How to Protect Workloads in the Cloud Deepak Munjal, Director of Cloud Security Solutions Recorded: May 30 2018 8:45 pm UTC 39 mins
    • Modern IT infrastructures are highly elastic, dynamic and automated. But, maintaining continuous visibility and protection over your workloads can be a real challenge. According to a recent report, cloud investment continues to grow over 20% annually as organizations are looking for faster time to deployment, scalability, reduced maintenance, and lower cost. Traditional security tools don’t work well in these environments, and that consistently worries IT and security professionals.

      Learn how to overcome these limitations and:

      - Provide deep cloud security visibility
      - Automate security for the agile enterprise
      - Reduce cloud attack surface
      - Reduce costs & improve efficiency of cloud security

      Read more >
    • Market State of Cloud Security
      Market State of Cloud Security Nick Mendez of Optiv Recorded: Oct 24 2017 4:00 pm UTC 55 mins
    • Optiv will be sharing their insights on the market state of cloud security and how enterprises should bolster their security programs for the evolution of cloud. We will cover what we see in the field from the cloud security maturity state of most organizations to the IaaS/PaaS security trends that will impact your cloud deployment plans. At the end of this webinar, you will learn how you can accelerate cloud deployments securely so you gain a competitive edge in today’s market.

      Read more >
    • Understanding the Status of ERP Security in the Cloud
      Understanding the Status of ERP Security in the Cloud JP Perez-Etchegoyen of Onapsis and Shamun Mahmud of CSA Recorded: Mar 21 2018 4:00 pm UTC 63 mins
    • With ERP vendors reporting double-digit growth in cloud revenue year over year, many organizations are faced with the challenging task of planning a cloud migration of their most critical assets. Because these systems are typically more complex, and also house the organization's critical data and processes, special precautions must be taken when building a migration plan.

      During this webcast JP Perez-Etchegoyen, CTO of Onapsis Inc and Shamun Mahmud, Research Analyst at CSA, will present their key findings from the recently released white paper, "The State of Enterprise Resource Planning Security in the Cloud." Attendees will learn:
      - Security requirements of ERP and Business-Critical Applications
      - Cloud adoption trends
      - Challenges of migrating ERP solutions to the cloud
      - Common Security and privacy risks in cloud based ERP applications
      o SaaS ERP Applications
      o IaaS ERP Deployments
      o ERP extensions in PaaS cloud
      - Conclusions and key take-aways

      Read more >
    • The Road to GDPR Compliance: Tips from the Cloud Security Alliance and Dome9
      The Road to GDPR Compliance: Tips from the Cloud Security Alliance and Dome9 Daniele Catteddu of CSA and Marina Segal of Dome9 Security Recorded: May 3 2018 5:00 pm UTC 57 mins
    • General Data Protection Regulation (GDPR) is coming into effect on May 25, 2018. The requirements of GDPR are substantial and the penalties for non-compliance are severe. The new regulation will require companies across the globe to rethink how they store and handle customer data. Has your organization implemented the legal and technological controls required to comply?

      In this webinar, Daniele Catteddu, CTO of the Cloud Security Alliance (CSA) and Marina Segal, Lead Compliance Product Manager at Dome9, will discuss key challenges and best practices to address GDPR requirements. The webinar will cover compliance automation solutions available to help organizations achieve GDPR compliance and meet the May deadline.

      Topics we will cover:
      -Code of Conduct & Certification for GDPR Compliance
      -Where the most likely GDPR violations will occur
      -The impact of running workloads in the public cloud on GDPR
      -Best practices to simplify and speed up compliance

      Read more >
    • Security for Cloud Computing: 10 Steps to Ensure Success v3.0
      Security for Cloud Computing: 10 Steps to Ensure Success v3.0 Cloud Standards Customer Council Recorded: Jan 10 2018 4:00 pm UTC 59 mins
    • Version 3.0 of Security for Cloud Computing: Ten Steps to Ensure Success has just been released for publication. As organizations consider a move to cloud computing, it is important to weigh the potential security benefits and risks involved and set realistic expectations with cloud service providers. The aim of this guide to help enterprise information technology (IT) and business decision makers analyze the security implications of cloud computing on their business.

      In this webinar, authors of the paper will discuss:
      • Security, privacy and data residency challenges relevant to cloud computing
      • Considerations that organizations should weigh when migrating data, applications, and infrastructure to a cloud computing environment
      • Threats, technology risks, and safeguards for cloud computing environments
      • A cloud security assessment to help customers assess the security capabilities of cloud service providers

      Read more >
    • How to Optimally Configure Email Security.cloud
      How to Optimally Configure Email Security.cloud Jimmy Lin, Product Manager, Email Security.cloud, Symantec Upcoming: Jun 26 2018 6:00 pm UTC 60 mins
    • In 2018, organizations worldwide are expected to invest up to $93 billion dollars in security solutions to protect their users and data. Yet, most companies are still vulnerable to the latest cyber-attacks and breaches, in no small part due to service misconfigurations. Attackers are looking for systems that have default settings that are immediately vulnerable.

      Join us for our upcoming webinar, and we will:

      1.Take you through the Symantec Email Security.cloud administration console

      2. Highlight the key protection features that every organization should enable to protect themselves against malware, phish and spam emails.

      Take full advantage of the industry’s most complete email security solution by properly configuring your Email Security.cloud solution.

      Register Today

      Read more >