Hi [[ session.user.profile.firstName ]]

[SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?

Hear insights from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

In this webinar, we will dive Into:

- The shortcomings of today’s reactive security philosophy
- Why the web continues to present a risk to businesses
- The benefits of embracing Isolation
- How organizations should rethink their security strategy moving forward

Register now to discover the world of Isolation from different viewpoints.
Recorded Jun 3 2020 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
Presentation preview: [SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Global Cloud Proxy: Cloud-based Proxy for SD-WAN and Network Transformation Aug 4 2020 2:00 am UTC 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    The Menlo Security Global Cloud Proxy provides fast, secure web access to applications like Office 365 and enables IT departments to scale security services for large organizations while reducing operational costs.
  • [Expert Insights] How to Leverage CyberEdge’s 2020 Cyberthreat Defense Report Jul 30 2020 2:00 pm UTC 56 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & Steve Piper, Founder and CEO - CyberEdge
    Due to unprecedented times, IT teams need answers and guidance to protect against evolving threats, while supporting overstressed employees and systems.

    In this webinar, experts—CyberEdge’s Founder and CEO, Steve Piper, and Menlo Security's Sr. PMM, James Locus—will share how to use the 2020 CyberEdge’s Cyberthreat Defense Report (CDR) findings to benchmark your company's security posture and best practices against peers in your industry or region.

    With the global pandemic's impact on businesses, security professionals need an up-to-date understanding of modern challenges to continue supporting business continuity. CyberEdge’s CDR has become a hallmark document for assessing organizations’ security posture, gauging the perceptions of IT security professionals, and ascertaining current and planned investments in IT security infrastructure.

    Now in its seventh year, the 2020 CDR report surveyed 1,200 IT security professionals representing 17 countries and 19 industries about industry-specific trends, beliefs, and attitudes.

    Join this webinar to hear key insights from this year's report which will help you to:

    - Understand how your organization stacks up against others in your industry and globally.
    - Discover the types of cyberthreats and security obstacles that concern IT teams the most.
    - Explore the security technologies, like cloud-delivered security, that others have in place and the investments that are planned.
    - And much more!
  • Secure Internet: First and Only Security Cloud Built on an Isolation Core™ Jul 30 2020 2:00 am UTC 17 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • CTO Insights: Overcome VPN Challenges to Secure Your Remote Workers Jul 28 2020 2:00 am UTC 20 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Today’s CIOs and CISOs play a critical role in business continuity. Their most pressing issue is enabling remote workers to be secure, while being productive. Many companies leverage VPNs, but are discovering that they’re running out of capacity and bandwidth when nearly all of their workforce is becoming remote overnight.

    With such a large remote workforce, the attack surface is expanding because workers and data are outside of the traditional perimeter, causing CIOs and CISOs to consider VPN alternatives.

    Join this webinar and hear your peer—Menlo Security’s CTO, Kowsik Guruswamy—on what he is seeing from customers dealing with these challenges and learn:

    - What are the technical and security challenges of a company operating with a large remote workforce
    - What types of attacks or security issues are exacerbated (phishing and SaaS attacks) when workers are remote
    - What is the best strategy to relieve VPN issues and what are the alternatives to migrate to
    - What are the long-term implications for what we’ve learned during the current crisis

    You’ll also hear about some special, limited-time programs that Menlo Security has initiated to help customers stay secure and agile as they make the transition to supporting a global remote workforce.*
  • Adopting Zero Trust Internet to Stop Phishing & Web-Based Attacks Jul 23 2020 2:00 am UTC 48 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    The use of the public cloud to deliver new services has led to digital innovation, and cybercriminals are no exception. They’re innovating, too, and moving quickly to exploit crises such as the Australian Bushfires and the global COVID-19 outbreak for financial gain. The increasing success of COVID-19–related attacks is shown in Menlo Security’s data. From February 25 to March 25, 2020, our data shows a 32X increase in the number of successful daily attacks, and these phishing strategies continue to work. According to the 2020 CyberEdge report, 69 percent of security professionals believe they will experience a successful cyberattack in 2020, and their concerns are not unfounded.

    An alternative approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    In this webinar, we’ll discuss the key issues to be addressed from the 2020 CyberEdge report relating to web and email security. Then we’ll dive into the practicalities of adopting Zero Trust Internet to improve web security.

    In this Session You Will Learn:

    - Examples of sophisticated attacks
    - Real-life use cases of when Zero Trust Internet powered by an Isolation Core™ has eliminated the risk of malware attacks
    - Three key questions to ask when adopting Zero Trust Internet
  • [IDG Webinar] Avoiding the Top 3 Security Challenges of Digital Transformation Jul 21 2020 2:00 pm UTC 29 mins
    Mehul Patel - Menlo Security, Inc. & Barbara R. Call - IDG
    According to Gartner, “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems such as ERP, CRM, collaboration and communication platforms, customer-facing apps, and other business tools that were once on-prem are moving to the cloud as a widely trusted alternative. Users can log in from anywhere and access all the information they need to conduct business on a daily basis.

    Office 365, for example, is now used by 1 in 5 corporate employees worldwide, making it the most widely used cloud service by user count. Clearly, businesses are moving to the cloud!

    Join us for a provocative discussion of the following questions to help you cut through the noise and understand how you can succeed in your cloud transformation:

    • Why are existing security infrastructures inadequate for large-scale SaaS adoption?
    • How can you reduce MPLS backhaul costs and increase Internet bandwidth for users?
    • How can you maintain visibility and control over users’ traffic and protect against data exfiltration?

    Save your seat today to learn how you can leverage the benefits of cloud technologies — including efficiency, agility, and scalability — while avoiding the pitfalls.

    Speakers:

    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    Barbara R. Call, Sr. Director, Content Operations & Strategy, Strategic Marketing Services - IDG
  • [SANS Webinar] How Are Remote Workers Working? A SANS Poll Jul 16 2020 2:00 pm UTC 53 mins
    Heather Mahalik SANS Senior Instructor, Author and Senior Director of Digital Intelligence at Cellebrite
    Remote work has quickly become the "new normal" with the COVID-19 global pandemic. Organizations have been forced to rethink how they will get work done with their employees mandated to stay home.

    How are organizations handling working from home?
    How well were companies prepared for remote work?
    How have technological needs changed with this shift?
    How are teams communicating? How are devices and communications being secured?

    When a time like this does not allow for the mission to halt, employees and employers have scrambled to keep the work going. Ensuring that teams are equipped, communicating, and are safe at home is key during this time.

    This webinar, led by Heather Mahalik SANS Senior Instructor, Author and Senior Director of Digital Intelligence at Cellebrite, covers how companies have adjusted to this new landscape as a workforce. How have things changed and how are we coping and keeping the ball rolling forward from home.
  • Combat Phishing in 2020: How to Turn Links Into Read Only Jul 14 2020 2:00 pm UTC 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Secure Office365/GSuite: Direct-to-Internet Connections to O365 and GSuite Recorded: Jun 30 2020 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet with cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    Secure Office 365 and Secure G Suite offer equivalent feature sets to match the desired software package.
  • [SANS Webcast] Making Remote Work Safe & Productive Recorded: Jun 23 2020 56 mins
    SANS
    The COVID-19 pandemic has caused many organizations to quickly jump into increased or even first-time dependence on remote work.

    Awareness is the first step and assuring that remote connections and use of popular video conferencing tools is done securely needs to be focused on early, too. Monitoring and other critical security operations will be impacted both by the use of new technologies and the fact that the security team is all working from home as well. CISOs will face new challenges managing and motivating security teams that are scattered and remote. Supporting safe and productive remote work is key to keeping employees and the overall business healthy and secure.

    This webinar includes how-to talks by John Pescatore, Lance Spitzner of SANS, and Randy Marchany, SANS Instructor and CISO of Virginia Tech. Attendees will be able to ratchet up the security of existing remote work approaches, secure emerging efforts and focus on an approach that allows for the enhancement and reuse of remote work capabilities as the world emerges from the impact of the pandemic.
  • From Security Appliances to Cloud Security: Why You Should Switch Recorded: Jun 18 2020 60 mins
    Kowsik Guruswamy, CTO - Menlo Security & Michael Suby, VP, Security Products Group - IDC
    In this fireside chat, IDC’s VP, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy, discuss the challenges, opportunities, and how to allocate security budgets when migrating to cloud-delivered security.

    With the new norm of working from home, security teams are struggling to use on-premises security to protect remote workers. Today’s security architecture does not have the capacity to handle the surge of remote workers businesses are facing today. Enterprises are turning to cloud-based secure web gateways (SWGs) to secure these challenges.

    So what are the challenges your organization might face when migrating to a cloud-based SWG, and how can you avoid them?

    Join this on-demand fireside chat and enjoy an informative discussion from industry experts—IDC’s Research VP, Security Products Group, Michael Suby, and Menlo Security’s CTO, Kowsik Guruswamy—on what they are seeing from customers dealing with migrating to a cloud-delivered security architecture

    Learn:

    - Key customer challenges when dealing with remote workers and global office environments
    - How customers are assigning security budgets in the new landscape
    - Why you can’t just move your existing security architecture to the cloud
  • Guide to Eliminating the Top 3 Security Pain Points Recorded: Jun 16 2020 49 mins
    Kowsik Guruswamy, CTO - Menlo Security & Fernando Montenegro, Principal Analyst - 451 Research
    When it comes to dealing with cyberattacks, 61% of IT professionals are not satisfied with the de facto cybersecurity protection method of after-the-fact investigations. Does this frustration sound familiar?

    The top three IT pain points have not been alleviated with this method. Users continue to click phishing links, IT teams don’t trust their end users, and there is still a distinct lack of cybersecurity experts. In addition, the typical answer to a data breach or ransomware attack is still reimaging the infected machine, causing worlds of pain for everyone involved.

    Data collected by 451 Research reflects a growing and commonly accepted trend: Phishing and staff shortages are the norm, and your budget isn’t factoring in the cost of an attack.

    Thankfully, approaches such as isolation can be an efficient way of tackling key areas of concern for security teams.

    In this webinar, experts from Menlo Security and 451 Research will discuss:

    - How customer surveys indicate current IT pain points
    - The industry’s biggest projects
    - Why isolation-based solutions are seeing an increase in customer spending
  • How Internet Isolation Eliminates Threats that Evade Sandboxes Recorded: Jun 9 2020 57 mins
    Vinay Pidathala, Director of Security Research - Menlo Security
    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?

    In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.

    Discover:

    - How attackers bypass sandboxes and what is the best way to thwart these attacks
    - Real life examples of sandbox failures and how Internet Isolation protected against attacks
    - Why Internet Isolation is critical to a modern security architecture
  • [SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security? Recorded: Jun 3 2020 55 mins
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
    Hear insights from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In this webinar, we will dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward

    Register now to discover the world of Isolation from different viewpoints.
  • Why You Should Have Zero Trust in the Web Recorded: Jun 2 2020 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • HKCS Webinar: Business Continuity Plan–Keep Remote Workers Secure & Productive Recorded: Jun 1 2020 67 mins
    Rick Woo-CSSF, HK Computer Society, David Chan-Hang Seng Bank Ltd, Kowsik Guruswamy-Menlo Security, Ted Suen-HK Computer Soc.
    Organizations are having employees work remotely to ensure social distancing during the Work From Home mandate. We need a resilient solution to allow a new remote workforce to engage with the business ecosystem and deliver economic value. Yet, this transformed work landscape inevitably presents challenges that impact productivity, safety and security.

    The live panel will discuss mission-critical challenges as well as business continuity strategies that optimize corporate and human resources. Get their expert views on:

    - Technical and security challenges for a company operating with a large remote workforce.

    - Types of attacks such as phishing and SaaS attacks and security issues that are exacerbated amid current situations.

    - The best strategy to relieve VPN issues and alternatives to consider.

    - Ways for companies to cope with challenges critical to business continuity and long-term implications.

    Organiser : Hong Kong Computer Society

    Sponsor: Menlo Security

    Facilitator

    Mr. Ricky Woo
    Director of External Engagement and Convenor of CSSG, Hong Kong Computer Society

    Panelists

    Mr. David Chan
    Chief Information Security Officer, Hang Seng Bank Limited

    Mr. Kowsik Guruswamy
    Chief Technology Officer, Menlo Security

    Mr. Ted Suen
    President, Hong Kong Computer Society
    Chief Information Officer, MTR Corporation Limited

    Speaker

    Ms. Yvonne Tsui
    Regional Director, Greater China Region, Menlo Security
  • Security without Compromise. A new approach to eliminate malware. Recorded: May 28 2020 26 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    With 50% of all attacks being malware based — and 99% of those being driven by email and web attack vectors — legacy technologies reliant on signatures and known threats aren’t cutting it against today’s relentless and pervasive threats. The security architecture requirements need to change. So how can you achieve 100% malware protection?

    By 2022, Gartner estimates isolation can reduce attacks that compromise end-user systems by 70%*. Because of its efficacy, isolation is becoming a critical capability for secure web gateways as enterprises adopt SaaS services and move to the cloud. In this webinar, we’ll show you why isolation has become so important to modern security. Mehul Patel, Menlo Security’s isolation expert, will explore an effective way to eliminate the threat of malware — both known and unknown — from all Internet and web traffic, including email, web, apps and documents.

    Discover:

    - The three trends impacting your security architecture and how you can offset the risk
    - How your organisation can eliminate the risk of malware, viruses and ransomware
    - Why Menlo Security stands behind its security with a $1M malware protection warranty

    * Source: Gartner Innovation Insight for Remote Browser Isolation, 8 March 2018
  • Impact of #Covid19 on the Infosec Industry Recorded: May 20 2020 59 mins
    Kowsik Guruswamy, CTO-Menlo Security, Lisa Forte, Partner-Red Goat Cyber Security, Raef Meeuwisse, CISM
    With COVID-19 spreading across the globe at an alarming rate, an array of sectors and verticals have been impacted. The information security sector is no exception.

    As a part of “social distancing,” organizations are attempting to successfully shift to an unprecedented scale of remote working. This shift opens enterprises to security, operational, and incident management risks.

    With that, we have seen a spike of cybercriminals launching unprecedented levels of coronavirus-related phishing and malware attacks.

    Infosecurity Magazine will be joined by a panel of security experts, including Menlo Security’s CTO, Kowsik Guruswamy. This webinar will:

    - Discuss the various impacts that COVID-19 is having on the information security industry.
    - Assess the greatest risks currently threatening the security of data.
    - Reflect on what the sector must do to address the challenges being faced.
  • Leverage the Cloud: Split Tunneling to Improve Access Speeds for Remote Workers Recorded: May 6 2020 46 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Remote workers need access to internal data and applications through a VPN, and they also need access to the Internet. Today’s security architecture requires that all traffic be sent back to HQ over a VPN, which does not have the capacity to handle the surge of remote workers businesses are facing today.

    The obvious solution is to send web traffic directly to the Internet, but this approach exposes employees to common cyberthreats, such as drive-by exploits, malware, phishing, etc. A VPN split tunnel using a global cloud proxy is the better approach. It provides remote users with the same security as if they were working in the office and reduces VPN bandwidth by more than 70 percent.

    In this webinar, you will learn:

    - The importance of VPN split tunneling for remote workers
    - How a global cloud proxy relieves this problem
    - How an Isolation Core™ achieves 100 percent security without impacting the user experience
  • [Menlo Live Panel] Business Continuity: Keep Remote Workers Secure & Productive Recorded: Apr 29 2020 69 mins
    Kowsik Guruswamy, CTO, Paul Loke, CIO, Victor Ng, CSO, Dr John Soo, Medical Founder, Stephanie Boo, VP
    Organizations are remote working to ensure social distancing during the COVID-19 pandemic. It should be a resilient option for a new remote workforce to engage with the ecosystem and deliver economic value. Yet, this transformed work landscape inevitably presents challenges that impact productivity, safety and security.

    Join us for an interactive session with practical views on how to stay secure and agile during this transition. Menlo Security’s CTO, Kowsik Guruswamy, will deliver the keynote while Victor Ng, Chief Strategy & Communication Officer, will be the moderator.

    The panel will also feature:

    • Paul Loke, CIO, who will share best practices that he has adopted during the current situation, and
    • Dr John Soo, Medical Director, a medical doctor who will advise on smart preparations for next three months.

    The Live panel will discuss mission-critical challenges as well as business continuity strategies that optimize corporate and human resources. Get their expert views on:

    • Proven work-from-home best practices and tips from the US.
    • Technical and security challenges for a company operating with a large remote workforce.
    • Types of attacks (i.e. phishing and SaaS attacks) or security issues that are exacerbated amid COVID-19.
    • The best strategy to relieve VPN issues and alternatives to consider.
    • Ways for companies to cope with challenges critical to business continuity and the long-term implications.
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Secure Cloud Transformation. The Menlo Security Cloud Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [SANS Webinar] A Closer Look at Isolation: Hype or Next Gen Security?
  • Live at: Jun 3 2020 2:00 pm
  • Presented by: Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
  • From:
Your email has been sent.
or close