Hi [[ session.user.profile.firstName ]]

[Menlo Live Panel] Business Continuity: Keep Remote Workers Secure & Productive

Organizations are remote working to ensure social distancing during the COVID-19 pandemic. It should be a resilient option for a new remote workforce to engage with the ecosystem and deliver economic value. Yet, this transformed work landscape inevitably presents challenges that impact productivity, safety and security.

Join us for an interactive session with practical views on how to stay secure and agile during this transition. Menlo Security’s CTO, Kowsik Guruswamy, will deliver the keynote while Victor Ng, Chief Strategy & Communication Officer, will be the moderator.

The panel will also feature:

• Paul Loke, CIO, who will share best practices that he has adopted during the current situation, and
• Dr John Soo, Medical Director, a medical doctor who will advise on smart preparations for next three months.

The Live panel will discuss mission-critical challenges as well as business continuity strategies that optimize corporate and human resources. Get their expert views on:

• Proven work-from-home best practices and tips from the US.
• Technical and security challenges for a company operating with a large remote workforce.
• Types of attacks (i.e. phishing and SaaS attacks) or security issues that are exacerbated amid COVID-19.
• The best strategy to relieve VPN issues and alternatives to consider.
• Ways for companies to cope with challenges critical to business continuity and the long-term implications.
Recorded Apr 29 2020 69 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kowsik Guruswamy, CTO, Paul Loke, CIO, Victor Ng, CSO, Dr John Soo, Medical Founder, Stephanie Boo, VP
Presentation preview: [Menlo Live Panel] Business Continuity: Keep Remote Workers Secure & Productive

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Leverage the Cloud for Split Tunneling & Improve Access Speeds Sep 1 2020 2:00 pm UTC 46 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Remote workers need access to internal data and applications through a VPN, and they also need access to the Internet. Today’s security architecture requires that all traffic be sent back to HQ over a VPN, which does not have the capacity to handle the surge of an anywhere workforce.

    The obvious solution is to send web traffic directly to the Internet, but this approach exposes employees to common cyberthreats, such as drive-by exploits, malware, phishing, etc. A VPN split tunnel using a global cloud proxy is the better approach. It provides remote users with the same security as if they were working in the office and reduces VPN bandwidth by more than 70 percent.

    In this webinar, you will learn:

    - The importance of VPN split tunneling for remote workers
    - How a global cloud proxy relieves this problem
    - How an Isolation Core™ achieves 100 percent security without impacting the user experience
  • Menlo Security Global Cloud Proxy in Action Aug 26 2020 2:00 pm UTC 2 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Discover how Menlo Security’s Global Cloud Proxy provides fast, secure web access to applications such as Office 365, and how it enables IT departments to scale security services for large organizations while reducing operational costs.

    To learn more about the Global Cloud Proxy and view our other product demonstrations, click here: bit.ly/2LJ9Wwk
  • Secure Internet: First and Only Security Cloud Built on an Isolation Core™ Aug 20 2020 2:30 pm UTC 17 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • Sneak Peek into Menlo Security’s Secure Internet Aug 19 2020 2:00 pm UTC 2 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Dive into how Menlo Security’s Secure Internet product suite with an Isolation Core™ provides protection against web-based threats and delivers secure web access without impacting performance or changing the native web browsing experience.

    To learn more about the Secure Internet suite and view our other product demonstrations, here: bit.ly/2LJ9Wwk
  • CTO Insights: Tackle VPN Challenges, Secure Global Remote Workers Aug 18 2020 2:00 pm UTC 20 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Today’s CIOs and CISOs play a critical role in business continuity. Their most pressing issue is enabling remote workers to be secure, while being productive. Many companies leverage VPNs, but are discovering that they’re running out of capacity and bandwidth.

    With such a large remote workforce, the attack surface is expanding because workers and data are outside of the traditional perimeter, causing CIOs and CISOs to consider VPN alternatives. So how do you support this anywhere workforce, with everywhere protection?

    Join this webinar and hear your peer—Menlo Security’s CTO, Kowsik Guruswamy—on what he is seeing from customers dealing with these challenges and learn:

    - What are the technical and security challenges of a company operating with a large remote workforce
    - What types of attacks or security issues are exacerbated (phishing and SaaS attacks) when workers are remote
    - What is the best strategy to relieve VPN issues and what are the alternatives to migrate to
    - What are the long-term implications for what we’ve learned during the current crisis
  • Secure Office365/GSuite: Direct-to-Internet Connections to O365 and GSuite Aug 13 2020 2:30 pm UTC 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet with cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    Secure Office 365 and Secure G Suite offer equivalent feature sets to match the desired software package.
  • Preventing Phishing Attacks in the Digital Workforce Aug 13 2020 2:00 am UTC 57 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & BP Lau, Director Systems Engineer - Menlo Security
    Poor cybersecurity habits and simple mistakes made by employees place organisations at greater risk of credential theft and infiltration. Despite all the advancements in cybersecurity, phishing continues to be the number one source of breaches. As companies move toward a more digital and remote workforce—especially during the Covid-19 pandemic—the risk of employees falling for a phishing attack increases.

    Cybercriminals are becoming more adept at fooling employees with timely topics, sometimes when people are at their most vulnerable. A particularly important goal of attackers is to gather employee credentials, which are then used to capture and control company data for malicious financial gain.

    In this webinar, we will discuss the current phishing trends of 2020 and demonstrate how to prevent attacks in the digital workforce. Some of the questions we will discuss include:

    - How have phishing attack trends changed as a result of Covid-19?
    - What common phishing techniques are working for attackers?
    - How can you eliminate the risk of phishing for your digital and remote workforce?
  • Preview of Menlo Security’s Secure Office 365 & Secure G Suite Aug 12 2020 2:00 pm UTC 3 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    See how Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet by using cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    To learn more about Secure Office 365 and Secure G Suite, and to view our other product demonstrations, click here: bit.ly/2LJ9Wwk
  • Why Zero Trust Internet Stops Phishing & Web-Based Attacks Aug 11 2020 2:00 pm UTC 48 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    The use of the public cloud to deliver new services has led to digital innovation, and cybercriminals are no exception.

    From February 25 to March 25, 2020, Menlo Security data shows a 32X increase in the number of successful daily attacks, specifically COVID-19–related attacks, and these phishing strategies continue to work. According to the 2020 CyberEdge report, 69 percent of security professionals believe they will experience a successful cyberattack in 2020, and their concerns are not unfounded.

    An alternative approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks.

    So how do you adopt Zero Trust Internet access?

    In this webinar, we’ll discuss the key issues to be addressed from the 2020 CyberEdge report relating to web and email security. Then we’ll dive into the practicalities of adopting Zero Trust Internet to improve web security.

    In this Webinar You Will Learn:

    - Examples of sophisticated attacks
    - Real-life use cases of when Zero Trust Internet powered by an Isolation Core™ has eliminated the risk of malware attacks
    - Three key questions to ask when adopting Zero Trust Internet

    **Please note polling will not be live during this session.
  • [Podcast] Enterprise Management 360—Secure Remote Working Practices Aug 4 2020 2:00 pm UTC 21 mins
    Kowsik Guruswamy, CTO - Menlo Security & Bob Tarzey, Freelance IT Analyst
    The Need for Corporate IT Systems to Support Remote Working Is Not New.

    The response of businesses to the trend toward remote working over the last two decades has ranged from highly supportive—offering as much flexibility as possible—to highly conservative—the risks are too great. The risks that have held many businesses back include the loss of control over what employees are doing and who they’re interacting with, as well as the danger of corporate and private personal data getting into the wrong hands. Since the COVID-19 pandemic, though, even the most conservative businesses have recognized the benefits of remote working for both employees and employers.

    In this podcast, analyst Bob Tarzey speaks to Menlo Security’s Chief Technology Officer Kowsik Guruswamy about the challenges related to remote working and the technology options available to support it.

    Topics You Will Learn About:

    - The main challenges and risks of increased remote working.
    - The technology options available to support remote working.
    - How remote workers can work as securely as in-office workers.
    - Ways to improve performance and security for remote workers.
  • Global Cloud Proxy: Cloud-based Proxy for SD-WAN and Network Transformation Aug 4 2020 2:00 am UTC 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    The Menlo Security Global Cloud Proxy provides fast, secure web access to applications like Office 365 and enables IT departments to scale security services for large organizations while reducing operational costs.
  • [Expert Insights] How to Leverage CyberEdge’s 2020 Cyberthreat Defense Report Recorded: Jul 30 2020 56 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & Steve Piper, Founder and CEO - CyberEdge
    Due to unprecedented times, IT teams need answers and guidance to protect against evolving threats, while supporting overstressed employees and systems.

    In this webinar, experts—CyberEdge’s Founder and CEO, Steve Piper, and Menlo Security's Sr. PMM, James Locus—will share how to use the 2020 CyberEdge’s Cyberthreat Defense Report (CDR) findings to benchmark your company's security posture and best practices against peers in your industry or region.

    With the global pandemic's impact on businesses, security professionals need an up-to-date understanding of modern challenges to continue supporting business continuity. CyberEdge’s CDR has become a hallmark document for assessing organizations’ security posture, gauging the perceptions of IT security professionals, and ascertaining current and planned investments in IT security infrastructure.

    Now in its seventh year, the 2020 CDR report surveyed 1,200 IT security professionals representing 17 countries and 19 industries about industry-specific trends, beliefs, and attitudes.

    Join this webinar to hear key insights from this year's report which will help you to:

    - Understand how your organization stacks up against others in your industry and globally.
    - Discover the types of cyberthreats and security obstacles that concern IT teams the most.
    - Explore the security technologies, like cloud-delivered security, that others have in place and the investments that are planned.
    - And much more!
  • CTO Insights: Overcome VPN Challenges to Secure Your Remote Workers Recorded: Jul 28 2020 20 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Today’s CIOs and CISOs play a critical role in business continuity. Their most pressing issue is enabling remote workers to be secure, while being productive. Many companies leverage VPNs, but are discovering that they’re running out of capacity and bandwidth when nearly all of their workforce is becoming remote overnight.

    With such a large remote workforce, the attack surface is expanding because workers and data are outside of the traditional perimeter, causing CIOs and CISOs to consider VPN alternatives.

    Join this webinar and hear your peer—Menlo Security’s CTO, Kowsik Guruswamy—on what he is seeing from customers dealing with these challenges and learn:

    - What are the technical and security challenges of a company operating with a large remote workforce
    - What types of attacks or security issues are exacerbated (phishing and SaaS attacks) when workers are remote
    - What is the best strategy to relieve VPN issues and what are the alternatives to migrate to
    - What are the long-term implications for what we’ve learned during the current crisis

    You’ll also hear about some special, limited-time programs that Menlo Security has initiated to help customers stay secure and agile as they make the transition to supporting a global remote workforce.*
  • Adopting Zero Trust Internet to Stop Phishing & Web-Based Attacks Recorded: Jul 23 2020 48 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    The use of the public cloud to deliver new services has led to digital innovation, and cybercriminals are no exception. They’re innovating, too, and moving quickly to exploit crises such as the Australian Bushfires and the global COVID-19 outbreak for financial gain. The increasing success of COVID-19–related attacks is shown in Menlo Security’s data. From February 25 to March 25, 2020, our data shows a 32X increase in the number of successful daily attacks, and these phishing strategies continue to work. According to the 2020 CyberEdge report, 69 percent of security professionals believe they will experience a successful cyberattack in 2020, and their concerns are not unfounded.

    An alternative approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    In this webinar, we’ll discuss the key issues to be addressed from the 2020 CyberEdge report relating to web and email security. Then we’ll dive into the practicalities of adopting Zero Trust Internet to improve web security.

    In this Session You Will Learn:

    - Examples of sophisticated attacks
    - Real-life use cases of when Zero Trust Internet powered by an Isolation Core™ has eliminated the risk of malware attacks
    - Three key questions to ask when adopting Zero Trust Internet

    **Please note polling will not be live during this session.
  • [IDG Webinar] Avoiding the Top 3 Security Challenges of Digital Transformation Recorded: Jul 21 2020 29 mins
    Mehul Patel - Menlo Security, Inc. & Barbara R. Call - IDG
    According to Gartner, “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems such as ERP, CRM, collaboration and communication platforms, customer-facing apps, and other business tools that were once on-prem are moving to the cloud as a widely trusted alternative. Users can log in from anywhere and access all the information they need to conduct business on a daily basis.

    Office 365, for example, is now used by 1 in 5 corporate employees worldwide, making it the most widely used cloud service by user count. Clearly, businesses are moving to the cloud!

    Join us for a provocative discussion of the following questions to help you cut through the noise and understand how you can succeed in your cloud transformation:

    • Why are existing security infrastructures inadequate for large-scale SaaS adoption?
    • How can you reduce MPLS backhaul costs and increase Internet bandwidth for users?
    • How can you maintain visibility and control over users’ traffic and protect against data exfiltration?

    Save your seat today to learn how you can leverage the benefits of cloud technologies — including efficiency, agility, and scalability — while avoiding the pitfalls.

    Speakers:

    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    Barbara R. Call, Sr. Director, Content Operations & Strategy, Strategic Marketing Services - IDG
  • 클라우드와 재택근무를 위한 타협없는 보안전략 Recorded: Jul 16 2020 20 mins
    Kwon Hyuk-in, Technology Director - Menlo Security Korea
    COVID-19 대유행에 따라 전세계적으로 재택근무가 보편화되고 있습니다.

    원격 및 재택 근무자의 증가하면서 인터넷 트래픽이 70% 이상 증가하였고, 이로 인한 대기 지연 시간도 672%나 증가했습니다. 이에 기업의 IT 보안 팀은 직원들이 빠르고 안정적이면서도 내부 업무망에 접속하여 업무를 수행할 수 있도록 노력하고 있습니다.

    그러나 전체 근무자의 5-10%만 수용하도록 설계된 기존 VPN을 활용하면 부족한 VAP 대역폭은 물론, 성능저하와 동시에 대기 시간을 증가시킬 뿐만 아니라, 추가적인 확장 및 관리까지 어렵게 됩니다.

    더욱이 웹과 이메일을 이용한 보안 취약점 공격이 크게 증가하고 있으며, 멘로시큐리티는 코로나19 관련된 멀웨어와 피싱 이메일을 하루 1800만개씩 차단하고 있습니다.

    이처럼 거세지는 보안위협으로 부터 회사, 직원을 보호하고 동시에 업무생산성을 유지해야하는 과제를 여러분은 어떻게 풀어나가고 있습니까?


    본 웨비나에서는 아래와 같은 내용을 확인하실 수 있습니다.

    - 코로나 19로 인한 보안우선순위의 변화
    - 클라우로의 전환을 위한 보안준비
    - 지속 가능한 재택근무자 보호 및 업무생산성 유지
    - 99%가 아닌 100%의 타협없는 보안 전략

    전세계 보안의 패러다임을 바꿔가는 멘로시큐리티가 여러분의 과제를 도와 드리겠습니다.

    권혁인 이사는2020년 1월부터 멘로시큐리티 코리아에서 기술총괄 이사로 근무하고 있다. 그는1999년 IT 업계에 입문하여 지난 20년동안 네트워크 및 보안의 다양한 영역을 경험한 보안 전문가이다.
    이전에는 FireEye, Gigamon 등 글로벌 보안회사를 거치면서 APT(지능형 지속위협), 네트워크, 엔드포인트 보안기술을 국내의 대기업, 금융기관, 공공기관에 소개 및 기술지원을 했다.
  • [SANS Webinar] How Are Remote Workers Working? A SANS Poll Recorded: Jul 16 2020 53 mins
    Heather Mahalik SANS Senior Instructor, Author and Senior Director of Digital Intelligence at Cellebrite
    Remote work has quickly become the "new normal" with the COVID-19 global pandemic. Organizations have been forced to rethink how they will get work done with their employees mandated to stay home.

    How are organizations handling working from home?
    How well were companies prepared for remote work?
    How have technological needs changed with this shift?
    How are teams communicating? How are devices and communications being secured?

    When a time like this does not allow for the mission to halt, employees and employers have scrambled to keep the work going. Ensuring that teams are equipped, communicating, and are safe at home is key during this time.

    This webinar, led by Heather Mahalik SANS Senior Instructor, Author and Senior Director of Digital Intelligence at Cellebrite, covers how companies have adjusted to this new landscape as a workforce. How have things changed and how are we coping and keeping the ball rolling forward from home.
  • Combat Phishing in 2020: How to Turn Links Into Read Only Recorded: Jul 14 2020 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • [SANS Webcast] Making Remote Work Safe & Productive Recorded: Jun 23 2020 56 mins
    SANS
    The COVID-19 pandemic has caused many organizations to quickly jump into increased or even first-time dependence on remote work.

    Awareness is the first step and assuring that remote connections and use of popular video conferencing tools is done securely needs to be focused on early, too. Monitoring and other critical security operations will be impacted both by the use of new technologies and the fact that the security team is all working from home as well. CISOs will face new challenges managing and motivating security teams that are scattered and remote. Supporting safe and productive remote work is key to keeping employees and the overall business healthy and secure.

    This webinar includes how-to talks by John Pescatore, Lance Spitzner of SANS, and Randy Marchany, SANS Instructor and CISO of Virginia Tech. Attendees will be able to ratchet up the security of existing remote work approaches, secure emerging efforts and focus on an approach that allows for the enhancement and reuse of remote work capabilities as the world emerges from the impact of the pandemic.
  • From Security Appliances to Cloud Security: Why You Should Switch Recorded: Jun 18 2020 60 mins
    Kowsik Guruswamy, CTO - Menlo Security & Michael Suby, VP, Security Products Group - IDC
    In this fireside chat, IDC’s VP, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy, discuss the challenges, opportunities, and how to allocate security budgets when migrating to cloud-delivered security.

    With the new norm of working from home, security teams are struggling to use on-premises security to protect remote workers. Today’s security architecture does not have the capacity to handle the surge of remote workers businesses are facing today. Enterprises are turning to cloud-based secure web gateways (SWGs) to secure these challenges.

    So what are the challenges your organization might face when migrating to a cloud-based SWG, and how can you avoid them?

    Join this on-demand fireside chat and enjoy an informative discussion from industry experts—IDC’s Research VP, Security Products Group, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy—on what they are seeing from customers dealing with migrating to a cloud-delivered security architecture

    Learn:

    - Key customer challenges when dealing with remote workers and global office environments
    - How customers are assigning security budgets in the new landscape
    - Why you can’t just move your existing security architecture to the cloud
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Secure Cloud Transformation. The Menlo Security Cloud Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [Menlo Live Panel] Business Continuity: Keep Remote Workers Secure & Productive
  • Live at: Apr 29 2020 2:00 am
  • Presented by: Kowsik Guruswamy, CTO, Paul Loke, CIO, Victor Ng, CSO, Dr John Soo, Medical Founder, Stephanie Boo, VP
  • From:
Your email has been sent.
or close