Hi [[ session.user.profile.firstName ]]

Combat Phishing: How to Turn Links Into Read Only

99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

In this webcast, attendees will learn:
-How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
-Need an additional layer other than a sandbox waiting for patient zero
-The ease of deploying isolation without interfering with user experience in 10 minutes

Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
Recorded Aug 14 2019 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jonathan Lee, Sr. Product Manager - Menlo Security
Presentation preview: Combat Phishing: How to Turn Links Into Read Only

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [APAC] Is the Cloud Transforming Security? Oct 3 2019 2:30 am UTC 36 mins
    Tim Olson, VP Engineering & Andy Anchev, Director, Product Management - Menlo Security
    Everyone is moving to the cloud. It’s faster, scalable, seamless, agile, and less costly. Securing your infrastructure in the cloud, however, doesn’t cut down on time spent protecting applications, workloads, and data. You still need people to process alerts and manage a security solution.

    Given this paradigm, we’ve put together a webinar so you can hear from security experts as they share insights on why every business should focus on transforming their security to support their cloud transformation journey, and learn how remote browser isolation can help.

    We will share:

    - How IT teams are adopting a “Cloud First” attitude and how security should be part of this movement.

    - Why isolation is a fundamentally different approach that is transforming enterprise security architecture.

    - How core differences enable us to deliver isolation from the cloud.
  • [APAC] Combat Phishing: How to Turn Links Into Read Only Sep 26 2019 2:30 am UTC 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Is the Cloud Transforming Security? Sep 18 2019 5:00 pm UTC 36 mins
    Tim Olson, VP Engineering & Andy Anchev, Director, Product Management - Menlo Security
    Everyone is moving to the cloud. It’s faster, scalable, seamless, agile, and less costly. Securing your infrastructure in the cloud, however, doesn’t cut down on time spent protecting applications, workloads, and data. You still need people to process alerts and manage a security solution.

    Given this paradigm, we’ve put together a webinar so you can hear from security experts as they share insights on why every business should focus on transforming their security to support their cloud transformation journey, and learn how remote browser isolation can help.

    We will share:

    - How IT teams are adopting a “Cloud First” attitude and how security should be part of this movement.

    - Why isolation is a fundamentally different approach that is transforming enterprise security architecture.

    - How core differences enable us to deliver isolation from the cloud.
  • [APAC] Why You Should Have Zero Trust in the Web Recorded: Sep 11 2019 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • How to Stay One Step Ahead of Phishing Attacks Recorded: Sep 5 2019 55 mins
    Menlo Security
    How Are You Staying Ahead?

    Phishing is a serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    In This Webinar You Will Learn:

    - New phishing prevention techniques
    - How to stop ransomware, malware, and drive-by-exploits enabled by email phishing
    - Updated security research findings
    - Real-life case studies for using isolation techniques to prevent phishing attacks
  • [EMEA] How to Turn Your Phishing Links Into Read Only Recorded: Sep 3 2019 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:

    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • A Closer Look at Isolation: Hype or Next Gen Security? Recorded: Aug 28 2019 55 mins
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
    This webinar looks at Isolation from different viewpoints. Learn from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In This Webinar Will Dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward
  • [EMEA] How Isolation Helps SOC Analysts Threat Hunt Recorded: Aug 28 2019 29 mins
    Patrick Darrow, Product Management Team - Menlo Security
    Security Operations Centers are a crucial aspect of ensuring data security. However, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. Does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, register now.
  • Why Browser Isolation is the New 'Sandbox' Recorded: Aug 22 2019 51 mins
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • [EMEA] Why You Should Have Zero Trust in the Web Recorded: Aug 15 2019 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Combat Phishing: How to Turn Links Into Read Only Recorded: Aug 14 2019 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • How Isolation Helps SOC Analysts Threat Hunt Recorded: Aug 6 2019 29 mins
    Patrick Darrow, Product Management Team - Menlo Security
    Security Operations Centers are a crucial aspect of ensuring data security. On the other hand, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. However, does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, save your seat now.
  • Why You Should Have Zero Trust in the Web Recorded: Jul 23 2019 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Phishing and spear-phishing campaigns drive the majority of today’s most significant data breaches, fooling users into clicking on apparently legitimate links. They force victims to expose themselves or their businesses to credential theft, malware infections, and possibly ransomware.

    Whether accessed for business or pleasure, the modern Internet is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, company-wide cyberattack.

    Discover:

    - Why the Internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • How Internet Isolation Eliminates Threats that Evade Sandboxes Recorded: Jul 16 2019 58 mins
    Vinay Pidathala, Director of Security Research - Menlo Security
    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?

    In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.

    Discover:

    - How attackers bypass sandboxes and what is the best way to thwart these attacks
    - Real life examples of sandbox failures and how Internet Isolation protected against attacks
    - Why Internet Isolation is critical to a modern security architecture
  • [EMEA] Is browser isolation the new ‘sandbox’ for security? Recorded: Jun 25 2019 49 mins
    Brett Raybould, Solutions Architect, Menlo Security
    Protecting organisations from web threats has typically been done with a proxy or DNS solution, but a new approach has emerged.

    Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as “one of the single most significant ways to reduce web-based attacks,” remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Join us and Menlo Security to learn:
    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution
  • [Video Interview] Jason Steer: The State of Cyber Security & Today's Threatscape Recorded: Mar 9 2017 7 mins
    Jason Steer, Solutions Architect - EMEA, Menlo Security & Josh Downs, Community Manager, BrightTALK
    BrightTALK caught up with Menlo Security's Jason Steer for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The Russian hack of the US election

    - AI & Machine learning in Cyber Security

    - The Yahoo breach and steps to take to avoid it happening to other companies

    - The leading prevention technologies currently and how to adopt them

    - Cyber warfare in today's political spectrum
  • Caught in the Net: Effective Defence Against Phishing Attacks Recorded: Dec 7 2016 56 mins
    Greg Maudsley, Senior Director Product Marketing, Menlo Security
    Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.

    Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    Join this webinar to learn:
    · New phishing prevention techniques
    · How to stop ransomware, malware and drive-by-exploits enabled by email phishing
    · Updated security research findings
    · Real-life case studies for using isolation techniques to prevent phishing attacks

    Speaker Bio:
    Greg Maudsley has over 15 years of IT security experience and is responsible for strategy development and threat isolation innovations at Menlo Security. Previously, Maudsley was a product marketing leader for F5 and Juniper Networks' Junos Pulse Business Unit. His responsibilities spanned the security spectrum, including application security, anti-fraud, cloud security, DDoS prevention, DNS sec, secure access, NAC, mobile security, application delivery and WAN Optimization. Maudsley holds an MBA from Santa Clara University Leavey School of Business, and a B.S. in Physics from the University of Redlands.
  • Infosecurity 2016: Reasons to be Cynical with Your Cyber Security Recorded: Jun 14 2016 5 mins
    Jason Steer, Solutions Architect, EMEA, Menlo Security Inc. & Josh Downs, Community Manager, BrightTALK
    - Infosecurity Europe 2016 -

    BrightTALK got the chance to catch up with community favourite Jason Steer from Menlo Security for his views on the industry and the current threat landscape.

    Jason gave his thoughts on the influence that a potential Brexit could have on UK Cyber Security; information security in the financial sector and how the banks can better protect themselves from threat actors; ransomare and the associated dangers; how to protect yourself from malware; defending the IoT and cyber warfare globally. Lots of topics covered, lots of insights to take away.
  • RSA 2016 - Imagine There's No Malware Recorded: Mar 10 2016 5 mins
    Kowsik Guruswamy, CTO, Menlo Security & Josh Downs, Community Manager, BrightTALK
    - RSA 2016 -

    BrightTALK caught up with Menlo Security CTO Kowsik Guruswamy to get his thoughts on eliminating malware, the websites with the highest risk and vulnerability, plus how to protect the connected home.
  • Top 5: Vulnerable Pieces of Software to Remove from Your Computer Recorded: Nov 25 2015 3 mins
    Jason Steer, EMEA Solutions Architect, Menlo Security Inc.
    Jason Steer, Solutions Architect at Menlo Security breaks down the Top 5 vulnerable pieces of software that you should remove from your computer.
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped
hundreds of Global 2000 companies and major government agencies achieve Zero Trust Internet. The company’s cloud-based Internet Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. The company is headquartered in Menlo Park, California. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Combat Phishing: How to Turn Links Into Read Only
  • Live at: Aug 14 2019 5:30 pm
  • Presented by: Jonathan Lee, Sr. Product Manager - Menlo Security
  • From:
Your email has been sent.
or close