Reimagine Your Perimeter

Logo
Presented by

Bob Gilbert, Vice President and Chief Evangelist, Netskope

About this talk

Recent research shows that more than 85% of web traffic is comprised of cloud services. The rapid adoption of cloud and mobile is fundamentally changing network traffic patterns and the movement of data, rendering existing network and security models obsolete. This shift is resulting in enterprise security teams supplementing next-gen firewalls (NGFWs), secure web gateways (SWGs), and VPNs with cloud access security brokers (CASBs).  While CASBs address a key set of cloud-specific use cases tied to visibility, data security, compliance, and threat protection, your dissolving corporate perimeter is also forcing security teams to rethink their entire legacy security stack. After all, if most of your web traffic is comprised of cloud services, why does a majority of your security spend on security tools that are not effective in this new world? Join this session to learn about: - New blind spots that exist with legacy security tools - Why simply moving legacy security tools to the cloud is not enough - Top cloud security use cases driving the need for a new perimeter - The essential requirements for a new, more effective perimeter
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (901)
Subscribers (65484)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa