Hi [[ session.user.profile.firstName ]]

Rethinking Network Architecture with Security at the Core

Since the inception of the Internet, there’s been bad actors trying to take advantage of whatever they can get their hands on. Security professionals for organizations designed web proxies as the solution to protect users from behind a firewall.

Today, web proxies aren’t up to the monumental threats that organizations face on the daily with a majority distributed workforce.

Join this interview with Nick Edwards from Menlo Security and Mitch Ashley of Accelerated Strategies Group from TechStrongTV to hear about new security approaches that can enable knowledge workers to work seamlessly while staying 100% protected from Internet threats.
Recorded May 5 2021 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Edwards, VP of Product Management, Menlo Security | Mitch Ashley, CEO, Accelerated Strategies Group
Presentation preview: Rethinking Network Architecture with Security at the Core

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Solving Your Trust Issues with SASE Jul 28 2021 7:00 pm UTC 25 mins
    Jack Miller, Head of Global Pro Services | Menlo Security
    Zero Trust Security is an urgent priority for organizations with a vested interest in data security. But CISOs everywhere are struggling to find the best solution to enable Zero Trust measures without imposing restrictions and burdens on end-users or compromising their security stack.

    The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats. However, a disruptive solution utilizing isolation can provide 100% malware-free email and web browsing in a non-disruptive, scalable manner. YES – 100%. Join this session to learn more about the changing future of using SASE service models to achieve Zero Trust Security.
  • People are the new perimeter - secure the perimeter! Jul 1 2021 3:00 am UTC 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • People are the new perimeter - secure the perimeter! Jun 30 2021 11:00 am UTC 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • A new approach to SWG: breaking up with your onpremise web proxy is a no brainer Jun 23 2021 7:00 pm UTC 57 mins
    Nick Edwards, VP of Product Management, Menlo Security
    Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

    Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.
  • Defining the synergy between Zero Trust and SASE. Jun 17 2021 7:00 pm UTC 60 mins
    Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security
    Many security organizations are opting to take a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.

    By now you’ve also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
    · Why focusing on detection is a reactive approach to security
    · The relationship between SASE and Zero Trust
    · Getting the upper hand in fighting online security threats targeting your users.
  • Defining the synergy between Zero Trust and SASE. Jun 17 2021 11:00 am UTC 60 mins
    Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security
    Many security organizations are opting to take a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.

    By now you’ve also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
    · Why focusing on detection is a reactive approach to security
    · The relationship between SASE and Zero Trust
    · Getting the upper hand in fighting online security threats targeting your users.
  • Examining threat trends: Why organizations are looking to the cloud for security Jun 16 2021 7:00 pm UTC 60 mins
    Steve Piper, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in its eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

    Tune into this informative session to gain key insights to security concerns, projects, and priorities of security leaders globally to help define your internal strategy and investment plans.
  • Examining threat trends: Why organizations are looking to the cloud for security Recorded: Jun 15 2021 58 mins
    Steve Piper, CEO, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in it's eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.
    Gain key insights to security concerns, projects and priorities of security leaders globally to help define your internal strategy and investment plan
  • People are the new perimeter - secure the perimeter! Recorded: Jun 9 2021 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • [APAC Webinar] Preparing your Cloud Security Strategy for the Challenges of 2021 Recorded: Jun 9 2021 54 mins
    Boon Peng Lau, Sue Nguyen
    The world as we knew it transformed forever last year, online and offline. Cyber space changed significantly with attackers shifting from using their owned infrastructure to using legitimate infrastructure. Menlo Security’s Experts anticipate that cybercriminals will increasingly leverage more techniques that abuse legitimate design functionality in websites and the technologies that build them. Hence current security products and SOC analysts will find it harder to identify new threats in 2021.

    Join Menlo’s Director of Sales Engineering, Boon Peng Lau, at this webinar and learn ways to full proof your Cloud Security Strategy to outsmart this year’s threats and protect your people, whenever and wherever they work.

    You will learn how to prevent growing new threats like:

    • Phishing - via HTML smuggling, popular websites, and legitimate emails
    • Ransomware – data and system Ransom
    • Mobile Protection - from BEC and multi-vector attacks
    • Data Loss Prevention
  • VMware OCTO and Menlo Security: Why You Need Secure Access Service Edge (SASE)? Recorded: Jun 1 2021 85 mins
    G. Venkatachalam, VP, APJ CTO VMWare | S. Pitts, Digital Workspace Chief Technologist VMWare
    With Anywhere Workspace becoming the new industry standard, Network and Edge Security are modernising. End to End security architecture is the need of the hour to transform the legacy and traditionally bolted security architecture. VMware Cloud Native Secure Access Service Edge is industries’ most comprehensive and leading architecture to deliver security in an intrinsic or sequenced manner to branch edges, mobile users, campuses, and IoT devices. Menlo Security brings to you 100% malware elimination capability integrating with the VMware Secure Access Service Edge.

    Join us to learn and share:

    Why Secure Access Service Edge is needed for your organisation?
    What are the modern design principals that organisations are adopting to transform security and operations?
    What are the use cases, solution and services using which you can lead your organisations transformation?
  • Managing Unknown-Unknown Threats to Critical Infrastructure Assets Recorded: May 28 2021 55 mins
    Ashwin Pal, Abu Odigie, Sue Nguyen
    Safeguarding Australia's critical infrastructure assets from cyber-attacks is a high priority. To manage increasing cyber threats to our national and economic interests, the Australian Federal Government has proposed a Critical Infrastructure Security Legislation Amendment Bill 2020 to mandate a broad cross-section of the Australian economy, encompassing 11 different industry classifications as of this writing. Effective risk management is the bill's foundation that seeks to enforce comprehensive risk governance and mitigation measures.

    On this webcast, Ashwin Pal, Cybersecurity Director at Unisys APAC and Menlo Security will provide updates on the proposed legislation and its requirements on your organisation now. You will also learn how some of the world's most sophisticated Critical Infrastructure organisations effectively manage risks to comply with cybersecurity legislation and eliminate known, unknown, and unknown-unknown threats.

    The webinar agenda includes:
    • An operational introduction to the Critical Infrastructure Bill.
    • What CISOs and CROs must do now to be compliance-ready.
    • Managing cyber risks to Critical Infrastructure Assets
    • Preventing Zero-Day threats and mitigate Unknown-Unknowns threats with a Zero-trust approach powered by Isolation
    • How the US Department of Defense prevents Zero-Day threats and mitigate Unknown-Unknowns threats with a Zero-trust approach powered by Isolation.
  • Trust in the Time of Covid-19 Recorded: May 25 2021 20 mins
    Nick Edwards, VP of Product at Menlo Security
    Lovesickness is an illness, both physical and emotional. Or at least that is what literature such as love In The Time of Cholera tells us.

    The same can also be said of operating a business in a perpetual environment of low Trust. Covid-19 continues to extract a toll on both a personal and professional level, with Trust being a top casualty. Remote work, coupled with an even greater proliferation of unmanaged devices, compounded by ruthless pandemic-based phishing attacks and ransomware have made worse an already challenging state of affairs in cybersecurity.

    What can be learned from our battles against Cholera and COVID-19? What worked and what didn’t? What truths did we previously hold as sacrosanct, merit rethinking? How can we leverage the current crisis in a way to advance Trust in our professional lives? Tune in to this session to learn how some organizations are rethinking their approach to making the internet safe for work in a post-pandemic world.
  • Rethinking Network Architecture with Security at the Core Recorded: May 5 2021 26 mins
    Nick Edwards, VP of Product Management, Menlo Security | Mitch Ashley, CEO, Accelerated Strategies Group
    Since the inception of the Internet, there’s been bad actors trying to take advantage of whatever they can get their hands on. Security professionals for organizations designed web proxies as the solution to protect users from behind a firewall.

    Today, web proxies aren’t up to the monumental threats that organizations face on the daily with a majority distributed workforce.

    Join this interview with Nick Edwards from Menlo Security and Mitch Ashley of Accelerated Strategies Group from TechStrongTV to hear about new security approaches that can enable knowledge workers to work seamlessly while staying 100% protected from Internet threats.
  • [APAC Webinar] Building Resilience for Government & Defence Organisations in2021 Recorded: Apr 20 2021 72 mins
    Lt. General Philip Jones CB CBE DL; Paul Chichester; John Spicer; Ian McGowan; Kowsik Guruswamy.
    Despite the sophistication of the cyber-attacks on US Government institutions at the end of 2020, nobody is ready to wave a white flag. These state-sponsored attacks highlight the limitations of maintaining the cyber status quo and the need to take a fundamentally different approach to the red flags of cyber risk.

    Join expert speakers including:
    Lt. General Philip Jones CB CBE DL; Paul Chichester, Director of Operations, NCSC; John Spicer, CTO & Co-Founder, Nteligen; Ian McGowan, MD & Founder, Barrier Networks, and Kowsik Guruswamy, CTO, Menlo Security – as they share their relevant experience of building and maintaining resilience for critical infrastructure and partner and supplier eco-systems.

    At this session you will learn:
    + How adopting new approaches to cyber resilience delivers rapid return
    + How to recognise and prioritise red flags of cyber risk
    + How to reduce risk to critical infrastructure from partners and supplier ecosystems
    + How cyber best practice is being achieved within global Government and Defence
  • [APAC Webinar] Securing the Future of Work Recorded: Apr 20 2021 62 mins
    Kowsik Guruswamy, Serge Borso
    Today’s anywhere workforce needs everywhere protection. So how can businesses securely support a growing workforce of both in-office and remote workers without bottlenecking their VPN?

    Cloud-delivered security is the answer! Businesses can achieve complete protection against phishing and web-based malware, without losing the native browsing experience or compromising the security of SaaS platforms.

    Join this webinar to hear from experts—SANS Instructor Serge Borso and Menlo Security CTO Kowsik Guruswamy—on:
    + Why standard VPN architectures are failing to stop targeted threats.
    + How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    + Specific use case examples that demonstrate why a cloud-based security layer is critical.
    + How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • CTO Insights: Overcoming VPN Challenges to Secure Remote Workers Recorded: Apr 15 2021 21 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Today’s CIOs and CISOs play a critical role in business continuity. Their most pressing issue is enabling remote workers to be secure, while being productive. Many companies leverage VPNs, but are discovering that they’re running out of capacity and bandwidth when nearly all of their workforce is becoming remote overnight.

    With such a large remote workforce, the attack surface is expanding because workers and data are outside of the traditional perimeter, causing CIOs and CISOs to consider VPN alternatives.

    Join this webinar and hear your peer—Menlo Security’s CTO, Kowsik Guruswamy—on what he is seeing from customers dealing with these challenges and learn:

    - What are the technical and security challenges of a company operating with a large remote workforce
    - What types of attacks or security issues are exacerbated (phishing and SaaS attacks) when workers are remote
    - What is the best strategy to relieve VPN issues and what are the alternatives to migrate to
    - What are the long-term implications for what we’ve learned during the current crisis

    You’ll also hear about some special, limited-time programs that Menlo Security has initiated to help customers stay secure and agile as they make the transition to supporting a global remote workforce.*
  • [APAC Webinar] Preparing your Cloud Security Strategy for the Challenges of 2021 Recorded: Apr 9 2021 54 mins
    Boon Peng Lau, Sue Nguyen
    The world as we knew it transformed forever last year, online and offline. Cyber space changed significantly with attackers shifting from using their owned infrastructure to using legitimate infrastructure. Menlo Security’s Experts anticipate that cybercriminals will increasingly leverage more techniques that abuse legitimate design functionality in websites and the technologies that build them. Hence current security products and SOC analysts will find it harder to identify new threats in 2021.

    Join Menlo’s Director of Sales Engineering, Boon Peng Lau, at this webinar and learn ways to full proof your Cloud Security Strategy to outsmart this year’s threats and protect your people, whenever and wherever they work.

    You will learn how to prevent growing new threats like:

    • Phishing - via HTML smuggling, popular websites, and legitimate emails
    • Ransomware – data and system Ransom
    • Mobile Protection - from BEC and multi-vector attacks
    • Data Loss Prevention
  • Solving Your Trust Issues with SASE Recorded: Apr 8 2021 25 mins
    Jack Miller, Head of Global Pro Services | Menlo Security
    Zero Trust Security is an urgent priority for organizations with a vested interest in data security. But CISOs everywhere are struggling to find the best solution to enable Zero Trust measures without imposing restrictions and burdens on end-users or compromising their security stack.

    The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats. However, a disruptive solution utilizing isolation can provide 100% malware-free email and web browsing in a non-disruptive, scalable manner. YES – 100%. Join this session to learn more about the changing future of using SASE service models to achieve Zero Trust Security.
  • (APAC) Five Cloud Security Considerations for CISOs Recorded: Apr 7 2021 32 mins
    Kowsik Guruswamy, CTO - Menlo Security
    Legacy security platforms can’t keep up with the architecture changes driven by digital transformation, remote working, and cloud migration. Hackers are exploiting these outdated security stacks, so it’s time for a change!

    As modern enterprises implement their cloud transformation, CISOs need to understand how to overcome the security risks.

    Join Menlo Security’s CTO, Kowsik Guruswamy, as he discusses the five key cloud security considerations a CISO should recognize in securing their organization’s transition to the cloud.

    Understand and learn:

    1. Why granular access to enterprise apps enables digital transformation.
    2. How to enable Zero Trust Internet access to protect against all Internet threats.
    3. How to safeguard against data leakage and SaaS governance.
    4. How to ensure complete visibility to SSL traffic and protect against SSL threats.
    5. How browser interactions enable continuous threat monitoring
Securing work where it happens. In the cloud.
Menlo Security enables organizations to outsmart threats, completely eliminating attacks and fully protecting productivity with a one-of-a-kind, isolation-powered cloud security platform. It’s the only solution to deliver on the promise of cloud security—by providing the most secure Zero Trust approach to preventing malicious attacks; by making security invisible to end users while they work online; and by removing the operational burden for security teams. Now organizations can offer a safe online experience, empowering users to work without worry while they keep the business moving forward.. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Rethinking Network Architecture with Security at the Core
  • Live at: May 5 2021 3:00 pm
  • Presented by: Nick Edwards, VP of Product Management, Menlo Security | Mitch Ashley, CEO, Accelerated Strategies Group
  • From:
Your email has been sent.
or close