Hi [[ session.user.profile.firstName ]]

CTO Insights: Tackle VPN Challenges, Secure Global Remote Workers

Today’s CIOs and CISOs play a critical role in business continuity. Their most pressing issue is enabling remote workers to be secure, while being productive. Many companies leverage VPNs, but are discovering that they’re running out of capacity and bandwidth.

With such a large remote workforce, the attack surface is expanding because workers and data are outside of the traditional perimeter, causing CIOs and CISOs to consider VPN alternatives. So how do you support this anywhere workforce, with everywhere protection?

Join this webinar and hear your peer—Menlo Security’s CTO, Kowsik Guruswamy—on what he is seeing from customers dealing with these challenges and learn:

- What are the technical and security challenges of a company operating with a large remote workforce
- What types of attacks or security issues are exacerbated (phishing and SaaS attacks) when workers are remote
- What is the best strategy to relieve VPN issues and what are the alternatives to migrate to
- What are the long-term implications for what we’ve learned during the current crisis
Recorded Aug 18 2020 20 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kowsik Guruswamy, CTO - Menlo Security
Presentation preview: CTO Insights: Tackle VPN Challenges, Secure Global Remote Workers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [SANS Panel Webinar] Navigating the Challenges of Network Security Nov 19 2020 3:00 pm UTC 56 mins
    Dave Shackleford, SANS Institute, Stuart Pickard, Menlo Security, Chris Bilodeau, Cisco Umbrella, Christopher Hass, Automox
    Navigating the Challenges of Network Security Beyond the data Center

    Your users and data have left the building, and network security is no longer confined to the data center. As data and workloads shift to the cloud, cybersecurity professionals are contending with an entirely new set of security challenges.

    We’ll talk about how changing work styles have led to new security problems, where the cloud security landscape is heading, and the steps you can take to keep your organization safe and secure.
  • [Zero Trust Internet] How to Stop Phishing & Web-Based Attacks Nov 18 2020 2:00 am UTC 48 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    The use of the public cloud to deliver new services has led to digital innovation, and cybercriminals are no exception. They’re innovating, too. What can be done?

    An alternative approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    In this webinar, we’ll discuss the key issues to be addressed from the 2020 CyberEdge report relating to web and email security. Then we’ll dive into the practicalities of adopting Zero Trust Internet to improve web security.

    You Will Learn:

    - Examples of sophisticated attacks
    - Real-life use cases of when Zero Trust Internet powered by an Isolation Core™ has eliminated the risk of malware attacks
    - Three key questions to ask when adopting Zero Trust Internet

    **Please note polling will not be live during this session.
  • [Demo] Discover Direct-to-Internet Connections to O365 and GSuite Nov 12 2020 2:00 am UTC 12 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Secure Office 365 and Secure G Suite from Menlo Security provide unprecedented levels of protection against malware and phishing to help your business safely access email and the Internet with cloud-based isolation. Built on top of our Global Cloud Proxy, these solutions provide faster, more secure SaaS usage with direct-to-Internet connectivity for branches and end users.

    Secure Office 365 and Secure G Suite offer equivalent feature sets to match the desired software package.
  • How to Prevent Phishing Attacks Nov 10 2020 3:00 pm UTC 57 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & BP Lau, Director Systems Engineer - Menlo Security
    Despite all the advancements in cybersecurity, phishing continues to be the number one source of breaches. As companies move toward a more digital workforce, the risk of employees falling for a phishing attack increases.

    In this webinar, we will discuss the current phishing trends of 2020 and demonstrate how to prevent attacks in the digital workforce. Some of the questions we will discuss include:

    - How have phishing attack trends changed as a result of Covid-19?
    - What common phishing techniques are working for attackers?
    - How can you eliminate the risk of phishing for your digital and remote workforce?
  • [Demo] Cloud DLP: Global Visibility and Control for Every User and Device Nov 5 2020 3:00 pm UTC 9 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Menlo Security’s Cloud Data Loss Prevention (DLP) is powered by an Isolation Core™ to reliably identify and stop data exfiltration. The Cloud DLP suite offers a solution that organizations of any size can use to prevent data leaks and save money. Protect your PII (personally identifiable information), customer, patient, and other sensitive data that should not be publicly available.
  • [APAC] Solving FinTech’s Top 4 Security Anxieties Nov 5 2020 2:00 am UTC 60 mins
    Upendra Mardikar, CSO - Snap Finance and David Eckstein, CFO - Menlo Security
    In the past year, 70 percent of financial services institutions (FSIs) have been victimized by ransomware, while direct attacks on bank employees have increased by 38 percent during the pandemic lockdown. With 30 percent of employees projected to remain permanently remote after 2021, the need to secure your global workforce has never been greater.

    Join Upendra Mardikar, Chief Security Officer of Snap Finance and David Eckstein, Chief Financial Officer of Menlo Security, as we discuss the top four pain points that decision-makers should think about now and in 2021 to protect their company and employees from potentially devastating financial losses.

    Learnings and topics covered:
    ● Discussion of C-Suite anxieties in confronting the realities of cybercrime
    ● The most frequently stated cybersecurity pain points stated by FSIs
    ● The influence of budgets on purchasing decisions
    ● The importance of connectivity for smaller FSIs
    ● How Menlo’s cloud proxy is uniquely positioned to address these pain points

    Sources:
    - Cyberthreat Defense Report: https://cyber-edge.com/cdr/
    - FSI Briefs "Financial crime in times of Covid-19 – AML and cyber resilience measures": https://www.bis.org/fsi/fsibriefs7.pdf
    - Deloitte "Reshaping the cybersecurity landscape": https://www2.deloitte.com/us/en/insights/industry/financial-services/cybersecurity-maturity-financial-institutions-cyber-risk.html
  • [FinTech Talk] Solving FinTech’s Top 4 Security Anxieties Nov 4 2020 9:00 pm UTC 60 mins
    Upendra Mardikar, CSO - Snap Finance and David Eckstein, CFO - Menlo Security
    In the past year, 70 percent of financial services institutions (FSIs) have been victimized by ransomware, while direct attacks on bank employees have increased by 38 percent during the pandemic lockdown. With 30 percent of employees projected to remain permanently remote after 2021, the need to secure your global workforce has never been greater.

    Join Upendra Mardikar, Chief Security Officer of Snap Finance and David Eckstein, Chief Financial Officer of Menlo Security, as we discuss the top four pain points that decision-makers should think about now and in 2021 to protect their company and employees from potentially devastating financial losses.

    Learnings and topics covered:

    ● Discussion of C-Suite anxieties in confronting the realities of cybercrime
    ● The most frequently stated cybersecurity pain points stated by FSIs
    ● How Menlo’s cloud proxy is uniquely positioned to address these pain points
  • [Frost & Sullivan Insights] Why Shift Security to the Cloud Nov 3 2020 3:00 pm UTC 62 mins
    Kenny Yeo, Head of Cybersecurity Practice - APAC Frost & Sullivan, Mehul Patel, Sr. Dir PMM - Menlo Security
    How Can You Gain Advantage with a Cloud First Approach?

    In this webinar, industry experts will discuss the evolution of web-based threats and their impact on security architectures that are causing organizations to start ‘Shifting Security to the Cloud’.

    Hear from Head of Cybersecurity Practice at Frost & Sullivan, Kenny Yeo, present the rising trends around ‘Shifting Security to the Cloud’ with analysis of considerations for adopting a cloud-first approach. Panelists from Menlo Security and Frost & Sullivan will also discuss and answer questions around cloud security deployment

    Discover:

    - What are the factors impacting cloud adoption?
    - Why is web security moving to the cloud?
    - How can cloud security deployments benefit your organization?
  • [Demo] See How Our Global Cloud Proxy Provides Secure Web Access Recorded: Oct 29 2020 2 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Discover how Menlo Security’s Global Cloud Proxy provides fast, secure web access to applications such as Office 365, and how it enables IT departments to scale security services for large organizations while reducing operational costs.

    To learn more about the Global Cloud Proxy and view our other product demonstrations, click here: bit.ly/2LJ9Wwk
  • Security without Compromise. A new approach to eliminate malware. Recorded: Oct 28 2020 26 mins
    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    With 50% of all attacks being malware based — and 99% of those being driven by email and web attack vectors — legacy technologies reliant on signatures and known threats aren’t cutting it against today’s relentless and pervasive threats. The security architecture requirements need to change. So how can you achieve 100% malware protection?

    By 2022, Gartner estimates isolation can reduce attacks that compromise end-user systems by 70%*. Because of its efficacy, isolation is becoming a critical capability for secure web gateways as enterprises adopt SaaS services and move to the cloud. In this webinar, we’ll show you why isolation has become so important to modern security. Mehul Patel, Menlo Security’s isolation expert, will explore an effective way to eliminate the threat of malware — both known and unknown — from all Internet and web traffic, including email, web, apps and documents.

    Discover:

    - The three trends impacting your security architecture and how you can offset the risk
    - How your organisation can eliminate the risk of malware, viruses and ransomware
    - Why Menlo Security stands behind its security with a $1M malware protection warranty

    * Source: Gartner Innovation Insight for Remote Browser Isolation, 8 March 2018
  • [Expert Insights] How to Leverage CyberEdge’s 2020 Cyberthreat Defense Report Recorded: Oct 27 2020 56 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & Steve Piper, Founder and CEO - CyberEdge
    Due to unprecedented times, IT teams need answers and guidance to protect against evolving threats, while supporting overstressed employees and systems.

    In this webinar, experts—CyberEdge’s Founder and CEO, Steve Piper, and Menlo Security's Sr. PMM, James Locus—will share how to use the 2020 CyberEdge’s Cyberthreat Defense Report (CDR) findings to benchmark your company's security posture and best practices against peers in your industry or region.

    With the global pandemic's impact on businesses, security professionals need an up-to-date understanding of modern challenges to continue supporting business continuity. CyberEdge’s CDR has become a hallmark document for assessing organizations’ security posture, gauging the perceptions of IT security professionals, and ascertaining current and planned investments in IT security infrastructure.

    Now in its seventh year, the 2020 CDR report surveyed 1,200 IT security professionals representing 17 countries and 19 industries about industry-specific trends, beliefs, and attitudes.

    Join this webinar to hear key insights from this year's report which will help you to:

    - Understand how your organization stacks up against others in your industry and globally.
    - Discover the types of cyberthreats and security obstacles that concern IT teams the most.
    - Explore the security technologies, like cloud-delivered security, that others have in place and the investments that are planned.
    - And much more!
  • Prevent Phishing: How to Block Attacks With Read-Only Mode Recorded: Oct 22 2020 32 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    While today's current email solutions still largely operate on detect-and-respond technology, every data loss incident highlights their inability to provide adequate protection. With that, why continue to accept the same old failed security approaches?

    Isolation transforms email security by enabling a read-only mode that protects users from link-based email threats. This method provides 100 percent protection against phishing attacks when correctly configured, with no impact to the end-user.

    In This Webinar, You Will Learn:

    - How to secure your enterprise even when users click on unsafe links or download ransomware.
    - Why email gateway solutions need isolation to protect against zero-day threats.
    - Which isolation techniques can prevent phishing attacks.
    - How to deploy isolation in 10 minutes, without impacting users.

    Save your seat today!
  • [Demo] See How Secure Internet with an Isolation Core™ Protects From Web Threats Recorded: Oct 22 2020 17 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security
    Cloud transformation is happening, and users need secure and reliable access to SaaS platforms, web apps, and rich-media websites—wherever business takes them. The Secure Internet product suite with an Isolation Core™ provides protection for web-based threats to deliver secure web access without impacting performance or changing the native web browsing experience.
  • Preventing Phishing Attacks in the Digital Workforce Recorded: Oct 21 2020 57 mins
    James Locus, Sr. Product Marketing Manager - Menlo Security & BP Lau, Director Systems Engineer - Menlo Security
    Poor cybersecurity habits and simple mistakes made by employees place organisations at greater risk of credential theft and infiltration. Despite all the advancements in cybersecurity, phishing continues to be the number one source of breaches. As companies move toward a more digital and remote workforce—especially during the Covid-19 pandemic—the risk of employees falling for a phishing attack increases.

    Cybercriminals are becoming more adept at fooling employees with timely topics, sometimes when people are at their most vulnerable. A particularly important goal of attackers is to gather employee credentials, which are then used to capture and control company data for malicious financial gain.

    In this webinar, we will discuss the current phishing trends of 2020 and demonstrate how to prevent attacks in the digital workforce. Some of the questions we will discuss include:

    - How have phishing attack trends changed as a result of Covid-19?
    - What common phishing techniques are working for attackers?
    - How can you eliminate the risk of phishing for your digital and remote workforce?
  • [IDG Webinar] Avoiding the Top 3 Security Challenges of Digital Transformation Recorded: Oct 20 2020 29 mins
    Mehul Patel - Menlo Security, Inc. & Barbara R. Call - IDG
    According to Gartner, “Digital transformation, cloud adoption, edge computing, and mobile mean that appliance-based network security models (designed originally to protect on-premises architectures) are being replaced.”

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems such as ERP, CRM, collaboration and communication platforms, customer-facing apps, and other business tools that were once on-prem are moving to the cloud as a widely trusted alternative. Users can log in from anywhere and access all the information they need to conduct business on a daily basis.

    Office 365, for example, is now used by 1 in 5 corporate employees worldwide, making it the most widely used cloud service by user count. Clearly, businesses are moving to the cloud!

    Join us for a provocative discussion of the following questions to help you cut through the noise and understand how you can succeed in your cloud transformation:

    •Why are existing security infrastructures inadequate for large-scale SaaS adoption?
    •How can you reduce MPLS backhaul costs and increase Internet bandwidth for users?
    •How can you maintain visibility and control over users’ traffic and protect against data exfiltration?

    Save your seat today to learn how you can leverage the benefits of cloud technologies — including efficiency, agility, and scalability — while avoiding the pitfalls.

    Speakers:

    Mehul Patel, Director, Product Marketing - Menlo Security, Inc.
    Barbara R. Call, Sr. Director, Content Operations & Strategy, Strategic Marketing Services - IDG
  • [Frost & Sullivan] Shifting Security to the Cloud Recorded: Oct 14 2020 62 mins
    Kenny Yeo, Head of Cybersecurity Practice - APAC Frost & Sullivan, Mehul Patel, Sr. Dir PMM - Menlo Security
    Gain Advantage with a Cloud First Approach

    In this webinar, industry experts will discuss the evolution of web-based threats and their impact on security architectures that are causing organisations to start ‘Shifting Security to the Cloud’. Hear from Head of Cybersecurity Practice at Frost & Sullivan, Kenny Yeo, present the rising trends around ‘Shifting Security to the Cloud’ with analysis of considerations for adopting a cloud-first approach. Then join panelists from Menlo Security and Frost & Sullivan as they discuss and answer questions around cloud security deployment

    Topics You Will Learn About:

    - What are the factors impacting cloud adoption?
    - Why is web security moving to the cloud?
    - How can cloud security deployments benefit your organisation?
  • [Combat Phishing] How to Turn Your Phishing Links Into Read Only Recorded: Oct 13 2020 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Zero Trust Internet - Moving Beyond "Almost Safe" Recorded: Oct 6 2020 16 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    According to CyberEdge's "2020 Cyberthreat Defense Report", 69 percent of security professionals believe they will experience a successful cyberattack in 2020, and their concerns are not unfounded.

    An alternative security approach is to not trust anything on the network and ensure granular access as and when required—an approach known as Zero Trust. The challenge with adopting a Zero Trust approach is balancing necessary security measures with end-user productivity. By applying a Zero Trust approach to users accessing the Internet, you can eliminate 99 percent of attacks. So how do you adopt Zero Trust Internet access?

    Register for this webinar to discover:

    - Why enterprise spending on cybersecurity continues to go up, yet they keep getting infected again and again and again.
    - Why digital transformation is accelerating the adoption of cloud based apps and services, rendering legacy security architectures obsolete.
    - How we need to invert our thinking from being app/data centric to a cloud-based, user centric approach.
    - Can we move beyond good vs. bad and "almost safe" to Zero Trust?
  • [Breakfast Talk: Ep. 4] Tiêu chuẩn An ninh mạng mới, cho xu hướng làm việc từ xa Recorded: Oct 2 2020 71 mins
    Duc Nguyen, Nhà sáng lập & Tổng Giám Đốc - CyRadar & Dung (Danny) Anh Le, Kỹ sư Kinh doanh Cấp cao - Menlo Security (US)
    Thành công của doanh nghiệp hiện nay phụ thuộc nhiều vào phương pháp tổ chức làm việc từ xa. Ngay cả khi thế giới vượt qua được đại dịch COVID-19, mô hình làm việc mà chúng ta quay trở lại cũng sẽ rất khác biệt so với mô hình trước đây.

    Hãy tham gia với chúng tôi để có một buổi toạ đàm, nơi mà mọi người có thể chia sẻ những quan điểm thực tế về tương lai sẽ như thế nào và cách tổ chức của doanh nghiệp có thể tiếp tục đảm bảo an ninh cho việc truy cập từ xa trong một thời gian dài sắp tới.

    Các thành viên sẽ thảo luận về những nội dung như:

    •Covid-19 đã thay đổi cách thức hoạt động của các tổ chức ở Hoa Kỳ / Việt Nam như thế nào
    •Các mối đe dọa về an ninh mạng đã thay đổi như thế nào trong Covid-19
    •Tương lai hậu-cách ly sẽ ra sao đối với lực lượng lao động an toàn và hiệu quả.
    •Cần có những chuẩn bị để giúp những người làm việc từ xa từ trạng thái 'bình thường mới' trở lại nơi làm việc
  • [Breakfast Talk: Ep. 3] New Cybersecurity Norms for Returning Employees Recorded: Oct 1 2020 58 mins
    Jonathan C. Pineda, CISO & Data Protection Officer - GSIS & James Locus, Sr. PMM - Menlo Security
    Business success is now dependent on how much can be done by working remotely. Even when the world manages to overcome the COVID-19 pandemic, the working model that we return to will be very different from the one we left.

    Join us for an interactive session presenting practical views on what the future will look like, and how your organization can continue to secure remote access for a long time to come.

    In Episode 3 of our Breakfast Talk Series, our panelists discuss:

    • How Covid-19 has changed the way organisations work in US/ Philippines
    • How has the threat landscape changed during Covid-19
    • What a post-lockdown future will look like for a secure and productive workforce.
    • Preparations required

    Cybersecurity experts Jonathan C. Pineda, CISO & Data Protection Officer - GSIS join James Locus, Menlo Security’s senior product manager, and Dennis Tan, Menlo Security’s regional director, in a breakfast talk hosted by Alvina Koh.
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped hundreds of Global 2000 companies and major government agencies achieve Secure Cloud Transformation. The Menlo Security Cloud Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CTO Insights: Tackle VPN Challenges, Secure Global Remote Workers
  • Live at: Aug 18 2020 2:00 pm
  • Presented by: Kowsik Guruswamy, CTO - Menlo Security
  • From:
Your email has been sent.
or close