Hi [[ session.user.profile.firstName ]]

[SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?

Hear insights from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

In this webinar, we will dive Into:

- The shortcomings of today’s reactive security philosophy
- Why the web continues to present a risk to businesses
- The benefits of embracing Isolation
- How organizations should rethink their security strategy moving forward

Register now to discover the world of Isolation from different viewpoints.
Recorded Jun 3 2020 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
Presentation preview: [SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Five Cloud Security Considerations for CISOs Mar 31 2021 5:00 pm UTC 32 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. Hackers are exploiting these outdated security stacks, so it’s time for a change!

    As modern enterprises implement their cloud transformation, CISOs need to understand how to overcome the security risks.

    Join Menlo Security’s CTO, Kowsik Guruswamy, as he discusses the five key cloud security considerations a CISO should recognize in securing their organization’s transition to the cloud.

    Understand and learn:

    1. Why granular access to enterprise apps enables digital transformation
    2. How to enable Zero Trust Internet access to protect against all Internet threats
    3. How to safeguard against data leakage and SaaS governance
    4. How to ensure complete visibility to SSL traffic and protect against SSL threats
    5. How browser interactions enable continuous threat monitoring
  • How to Stay One Step Ahead of Phishing Attacks Mar 23 2021 6:00 pm UTC 55 mins
    Greg Maudsley | Menlo Security
    How are you staying ahead?

    Phishing is a serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    In this webinar you will learn:

    - New phishing prevention techniques
    - How to stop ransomware, malware, and drive-by-exploits enabled by email phishing
    - Updated security research findings
    - Real-life case studies for using isolation techniques to prevent phishing attacks
  • How to Eliminate the Arising Threats in the Post-Pandemic Cloud Environment Mar 16 2021 8:00 pm UTC 60 mins
    Nick Edwards, VP of Product Management | Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital
    transformation, remote working, and cloud migration. Workforces and business
    operations completely decentralized as work from home policies become the permanent
    work reality even post-pandemic for many organizations. 
    Hackers are continuing to exploit these outdated security stacks. As modern enterprises
    implement their cloud transformation, CISOs need to understand how to overcome
    these threats and security risks.
    Join Menlo Security’s Nick Edwards as he discusses how organizations can build a
    more unified approach across systems and multiple endpoints to combat this threat
    landscape.
    Understand and learn:
    ● How to enable Zero Trust Internet access to protect against all Internet threats
    ● How to safeguard against data leakage and SaaS governance
    ● How to ensure complete visibility to SSL traffic and protect against SSL threats
    ● Gain an understanding of the threat landscape both from an attacker and
    defender perspective
  • Security Challenges and Opportunities of Remote Work Mar 10 2021 4:00 pm UTC 60 mins
    Kowsik Guruswamy CTO - Menlo Security, Justin Crawford, VP of Engineering and Technology - Eckoh
    The COVID-19 pandemic forced many organizations to shift to a remote workforce almost overnight, most of which were not prepared for the sudden change. In their efforts to ensure their employees could remain productive, a number of organizations relaxed their security policies and unwittingly exposed their networks to compromise. As the pandemic continues, security challenges remain, but organizations also now have opportunities to find and fix vulnerabilities and improve their overall security posture, even as their employees eventually migrate back to the office.

    This panel will discuss some of the issues and opportunities that organizations face in the new normal of remote/hybrid work, including:
    - How the pandemic impacted security as a whole, including some of the biggest threats organizations face
    - Lessons learned in shifting to a remote workforce quickly
    - What challenges continue and how organizations can address them effectively
  • Secure Internet: First and Only Security Cloud Built on an Isolation Core™ Recorded: Mar 2 2021 17 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • Adopting Zero Trust Internet to Stop Phishing & Web-Based Attacks Recorded: Feb 25 2021 48 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    The use of the public cloud to deliver new services has led to digital innovation, and cybercriminals are no exception. They’re innovating, too, and moving quickly to exploit crises such as the Australian Bushfires and the global COVID-19 outbreak for financial gain. The increasing success of COVID-19–related attacks is shown in Menlo Security’s data. From February 25 to March 25, 2020, our data shows a 32X increase in the number of successful daily attacks, and these phishing strategies continue to work. According to the 2020 CyberEdge report, 69 percent of security professionals believe they will experience a successful cyberattack in 2020, and their concerns are not unfounded.

    An alternative approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    In this webinar, we’ll discuss the key issues to be addressed from the 2020 CyberEdge report relating to web and email security. Then we’ll dive into the practicalities of adopting Zero Trust Internet to improve web security.
    In this Session You Will Learn:

    Examples of sophisticated attacks
    Real-life use cases of when Zero Trust Internet powered by an Isolation Core™ has eliminated the risk of malware attacks
    Three key questions to ask when adopting Zero Trust Internet

    **Please note polling will not be live during this session.
  • How Internet Isolation Eliminates Threats that Evade Sandboxes Recorded: Feb 11 2021 57 mins
    Vinay Pidathala, Director of Security Research - Menlo Security
    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?

    In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.

    Discover:

    - How attackers bypass sandboxes and what is the best way to thwart these attacks
    - Real life examples of sandbox failures and how Internet Isolation protected against attacks
    - Why Internet Isolation is critical to a modern security architecture
  • From Security Appliances to Cloud Security Recorded: Feb 4 2021 60 mins
    Kowsik Guruswamy, CTO - Menlo Security & Michael Suby, VP, Security Products Group - IDC
    In this fireside chat, IDC’s VP, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy, discuss the challenges, opportunities, and how to allocate security budgets when migrating to cloud-delivered security.

    With the new norm of working from home, security teams are struggling to use on-premises security to protect remote workers. Today’s security architecture does not have the capacity to handle the surge of remote workers businesses are facing today. Enterprises are turning to cloud-based secure web gateways (SWGs) to secure these challenges.

    So what are the challenges your organization might face when migrating to a cloud-based SWG, and how can you avoid them?

    Join this on-demand fireside chat and enjoy an informative discussion from industry experts—IDC’s Research VP, Security Products Group, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy—on what they are seeing from customers dealing with migrating to a cloud-delivered security architecture

    Learn:

    - Key customer challenges when dealing with remote workers and global office environments
    - How customers are assigning security budgets in the new landscape
    - Why you can’t just move your existing security architecture to the cloud
  • Cloud DLP: Global Visibility and Control for Every User and Device Recorded: Feb 2 2021 9 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Menlo Security’s Cloud Data Loss Prevention (DLP) is powered by an Isolation Core™ to reliably identify and stop data exfiltration. The Cloud DLP suite offers a solution that organizations of any size can use to prevent data leaks and save money. Protect your PII (personally identifiable information), customer, patient, and other sensitive data that should not be publicly available.
  • Five Cloud Security Considerations for CISOs Recorded: Jan 28 2021 32 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. Hackers are exploiting these outdated security stacks, so it’s time for a change!

    As modern enterprises implement their cloud transformation, CISOs need to understand how to overcome the security risks.

    Join Menlo Security’s CTO, Kowsik Guruswamy, as he discusses the five key cloud security considerations a CISO should recognize in securing their organization’s transition to the cloud.

    Understand and learn:

    1. Why granular access to enterprise apps enables digital transformation.
    2. How to enable Zero Trust Internet access to protect against all Internet threats.
    3. How to safeguard against data leakage and SaaS governance.
    4. How to ensure complete visibility to SSL traffic and protect against SSL threats.
    5. How browser interactions enable continuous threat monitoring
  • Zero Trust and the Role of Internet Isolation Recorded: Jan 26 2021 10 mins
    Jack Miller, Head Glbl Prof Services, frmr CISO
    It isn’t that we struggle to define the zero trust security model. It’s that we ignore the real challenge, says Jack Miller of Menlo Security. We need to shift our view of authentication and access from “innocent until proven guilty” to “guilty until proven innocent.”

    In this video interview with Information Security Media Group, Miller discusses:

    The application of this new view to access.
    The role of Internet isolation in this model.
    The need for new education to ensure maximum adoption.
  • Guide to Eliminating the Top 3 Security Pain Points Recorded: Jan 21 2021 49 mins
    Kowsik Guruswamy, CTO - Menlo Security & Fernando Montenegro, Principal Analyst - 451 Research
    When it comes to dealing with cyberattacks, 61% of IT professionals are not satisfied with the de facto cybersecurity protection method of after-the-fact investigations. Does this frustration sound familiar?

    The top three IT pain points have not been alleviated with this method. Users continue to click phishing links, IT teams don’t trust their end users, and there is still a distinct lack of cybersecurity experts. In addition, the typical answer to a data breach or ransomware attack is still reimaging the infected machine, causing worlds of pain for everyone involved.

    Data collected by 451 Research reflects a growing and commonly accepted trend: Phishing and staff shortages are the norm, and your budget isn’t factoring in the cost of an attack.

    Thankfully, approaches such as isolation can be an efficient way of tackling key areas of concern for security teams.

    In this webinar, experts from Menlo Security and 451 Research will discuss:

    - How customer surveys indicate current IT pain points
    - The industry’s biggest projects
    - Why isolation-based solutions are seeing an increase in customer spending
  • Global Cloud Proxy: Cloud-based Proxy for SD-WAN and Network Transformation Recorded: Jan 19 2021 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    The Menlo Security Global Cloud Proxy provides fast, secure web access to applications like Office 365 and enables IT departments to scale security services for large organizations while reducing operational costs.
  • Why You Should Have Zero Trust in the Web Recorded: Jan 14 2021 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Secure Office365/GSuite: Direct-to-Internet Connections to O365 and GSuite Recorded: Jan 12 2021 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet with cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    Secure Office 365 and Secure G Suite offer equivalent feature sets to match the desired software package.
  • [APAC] Menlo Threat Labs - How security will change 2021 Webinar Recorded: Jan 12 2021 55 mins
    Kowsik Guruswamy, Jack Miller, Vinay Pidathala, Boon Peng Lau, Sue Nguyen
    Menlo Security Experts Panel will discuss some of the top Cyber-attacks across 2020 and their real-world examples, to then provide predictions on what your organisation should look out for this year across 2021.
  • [APAC] Parenting Cyber Safety: Help Kids Stay Safe Online Recorded: Jan 6 2021 59 mins
    Nina Bual, Stephanie Boo, Sue Nguyen, Sangdo Lee
    Experts will inform about the internet-based dangers that children now face every day and provide ways you can help your kids navigate these hazards. You will receive an armoury of practical tips and tools, and cost-free cybersecurity software to keep your whole family safe online.

    The Menlo Security team is delighted to bring you this webinar and to be a part of the solution that ensures the online safety of your family, both at work and at home.
  • CTO Insights: Tackle VPN Challenges, Secure Global Remote Workers Recorded: Dec 30 2020 20 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Today’s CIOs and CISOs play a critical role in business continuity. Their most pressing issue is enabling remote workers to be secure, while being productive. Many companies leverage VPNs, but are discovering that they’re running out of capacity and bandwidth when nearly all of their workforce is becoming remote overnight.

    With such a large remote workforce, the attack surface is expanding because workers and data are outside of the traditional perimeter, causing CIOs and CISOs to consider VPN alternatives.

    Join this webinar and hear your peer—Menlo Security’s CTO, Kowsik Guruswamy—on what he is seeing from customers dealing with these challenges and learn:

    - What are the technical and security challenges of a company operating with a large remote workforce
    - What types of attacks or security issues are exacerbated (phishing and SaaS attacks) when workers are remote
    - What is the best strategy to relieve VPN issues and what are the alternatives to migrate to
    - What are the long-term implications for what we’ve learned during the current crisis

    You’ll also hear about some special, limited-time programs that Menlo Security has initiated to help customers stay secure and agile as they make the transition to supporting a global remote workforce.*
  • [Security Expert Panel] How Security Will Change in 2021 Recorded: Dec 29 2020 49 mins
    Kowsik Guruswamy, CTO, Jack Miller, Head Glbl Prof Services, frmr CISO, Vinay Pidathala, Dir Security Research-Menlo Security
    The Good, the Bad, and the Ugly: How Security Will Change in 2021

    In 2020, Menlo Threat Labs noticed that attackers shifted from using their own infrastructure to using legitimate infrastructure. They’re leveraging techniques that abuse legitimate design functionality in websites and the technologies that build them, so current security products and SOC analysts find it harder to identify these threats.

    Join Menlo’s CTO Kowsik Guruswamy, Head of Global Professional Services and former CISO Jack Miller, and Director of Security Research Vinay Pidathala as they discuss and debate through real-world examples of these attacks. Find out what to watch for in 2021 so you can set the right priorities for your company.

    We Will Cover:

    - Phishing—What key campaigns and change in tactics we anticipate
    - Malicious File Behavior—How legitimate files, like Word, will continue to bypass traditional detect-and-respond solutions
    - Business Email Compromise (BEC)—What changes in BEC attacks to expect from this growing attack vector
    - CnC—How these communication channels are changing
  • Prevent Phishing: How to Block Attacks With Read-Only Mode Recorded: Dec 9 2020 31 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    A recent study by CyberEdge found that, 62 percent of organizations have been affected by ransomware, and 90 percent of breaches were caused by phishing and ransomware.

    While today's current email solutions still largely operate on detect-and-respond technology, every data loss incident highlights their inability to provide adequate protection.

    So why continue to accept the same old failed security approaches?

    Isolation transforms email security by enabling a read-only mode that protects users from link-based email threats. This method provides 100 percent protection against phishing attacks when correctly configured, with no impact to the end-user.

    In This Webinar, Attendees Will Learn:

    - How to secure your enterprise even when users click on unsafe links or download ransomware.
    - Why email gateway solutions need isolation to protect against zero-day threats.
    - Which isolation techniques can prevent phishing attacks.
    - How to deploy isolation in 10 minutes, without impacting users.
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Secure Cloud Transformation. The Menlo Security Cloud Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?
  • Live at: Jun 3 2020 2:00 pm
  • Presented by: Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
  • From:
Your email has been sent.
or close