Hi [[ session.user.profile.firstName ]]

[APAC Webinar] Securing the Future of Work

Today’s anywhere workforce needs everywhere protection. So how can businesses securely support a growing workforce of both in-office and remote workers without bottlenecking their VPN?

Cloud-delivered security is the answer! Businesses can achieve complete protection against phishing and web-based malware, without losing the native browsing experience or compromising the security of SaaS platforms.

Join this webinar to hear from experts—SANS Instructor Serge Borso and Menlo Security CTO Kowsik Guruswamy—on:
+ Why standard VPN architectures are failing to stop targeted threats.
+ How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
+ Specific use case examples that demonstrate why a cloud-based security layer is critical.
+ How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
Recorded Jul 21 2021 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kowsik Guruswamy, Serge Borso
Presentation preview: [APAC Webinar] Securing the Future of Work

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SASE for the Hybrid Workforce Aug 18 2021 4:00 pm UTC 60 mins
    Diana Kelley, SecurityCurve | Jonathan Nguyen-Duy, Fortinet | Mark Guntrip, Menlo Security
    In the last year, the move to remote and hybrid working models - and newly distributed employees accessing data from distributed locations - has opened up a need for more stringent and secure network access security models.

    This is balanced with the need for remote employees to have access to reliable, low-latency access and connectivity to cloud and data center applications. So what’s the solution? According to many, it’s SASE. SASE provides a flexible, simplistic no-fuss, secure access model and Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE. But what is SASE and why is it being heralded as the future of network security?

    Join us in this episode of The (Security) Balancing Act as security experts discuss:

    - What exactly SASE offers that traditional network security controls don’t
    - How SASE adoption has been in part fuelled by the pandemic, and what this means moving forward into the ’new normal’
    - The future of secure access models, and what to expect over the next 12 months
    - And more
  • A New Approach to Secure Web Gateways Aug 4 2021 3:00 am UTC 57 mins
    Nick Edwards, VP of Product Management, Menlo Security
    Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

    Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.
  • [APAC Webinar] Securing the Future of Work Aug 4 2021 3:00 am UTC 62 mins
    Kowsik Guruswamy, Serge Borso
    Today’s anywhere workforce needs everywhere protection. So how can businesses securely support a growing workforce of both in-office and remote workers without bottlenecking their VPN?

    Cloud-delivered security is the answer! Businesses can achieve complete protection against phishing and web-based malware, without losing the native browsing experience or compromising the security of SaaS platforms.

    Join this webinar to hear from experts—SANS Instructor Serge Borso and Menlo Security CTO Kowsik Guruswamy—on:
    + Why standard VPN architectures are failing to stop targeted threats.
    + How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    + Specific use case examples that demonstrate why a cloud-based security layer is critical.
    + How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • Zero Trust and the Power of Isolation for Threat Prevention Jul 28 2021 7:00 pm UTC 31 mins
    Marlese Lessing, SDxCentral & Mark Guntrip, Sr Director Cybersecurity Strategy, Menlo Security
    Recent waves of security breaches tied to phishing emails, ransomware attacks, and other threat campaigns are causing cybersecurity professionals to revisit their approaches to securing their organizations.

    Fueled by rapid cloud adoption to cater to distributed workforces, many organizations have found their legacy security measures fail to identify threats and protect modern networks. Legacy detect-and-remediate approaches have long been the cybersecurity standard, but savvy threat actors easily poke holes in that strategy.

    Organizations are looking to isolation-powered security solutions to provide an alternative method to current, failing architectures to overcome challenges presented by complex networks and expanded attack surfaces. These modern and effective techniques separate the network from the Internet, assuming all traffic is inherently bad–hence the moniker, “Zero Trust.”

    During this upcoming discussion, Marlese Lessing, from SDxCentral, dives deep on the topic with industry expert and Senior Director of Cybersecurity Strategy at Menlo Security, Mark Guntrip, to discuss the paradigm shift. Attendees can expect to learn about:

    • The rising threats of online attacks and security breaches.
    • How traditional detection-based solutions work and why they aren’t effective.
    • Why isolation-powered security solutions drastically reduce online security threats.
  • [APAC Webinar] Preparing your Cloud Security Strategy for the Challenges of 2021 Jul 28 2021 4:30 am UTC 54 mins
    Boon Peng Lau, Sue Nguyen
    The world as we knew it transformed forever last year, online and offline. Cyber space changed significantly with attackers shifting from using their owned infrastructure to using legitimate infrastructure. Menlo Security’s Experts anticipate that cybercriminals will increasingly leverage more techniques that abuse legitimate design functionality in websites and the technologies that build them. Hence current security products and SOC analysts will find it harder to identify new threats in 2021.

    Join Menlo’s Director of Sales Engineering, Boon Peng Lau, at this webinar and learn ways to full proof your Cloud Security Strategy to outsmart this year’s threats and protect your people, whenever and wherever they work.

    You will learn how to prevent growing new threats like:

    • Phishing - via HTML smuggling, popular websites, and legitimate emails
    • Ransomware – data and system Ransom
    • Mobile Protection - from BEC and multi-vector attacks
    • Data Loss Prevention
  • Examining threat trends: Why organizations are looking to the cloud for security Jul 27 2021 3:00 am UTC 59 mins
    Steve Piper, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in its eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

    Tune into this informative session to gain key insights to security concerns, projects, and priorities of security leaders globally to help define your internal strategy and investment plans.
  • Solving Your Trust Issues with SASE Recorded: Jul 21 2021 25 mins
    Jack Miller, Head of Global Pro Services | Menlo Security
    Zero Trust Security is an urgent priority for organizations with a vested interest in data security. But CISOs everywhere are struggling to find the best solution to enable Zero Trust measures without imposing restrictions and burdens on end-users or compromising their security stack.

    The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats. However, a disruptive solution utilizing isolation can provide 100% malware-free email and web browsing in a non-disruptive, scalable manner. YES – 100%. Join this session to learn more about the changing future of using SASE service models to achieve Zero Trust Security.
  • [APAC Webinar] Securing the Future of Work Recorded: Jul 21 2021 62 mins
    Kowsik Guruswamy, Serge Borso
    Today’s anywhere workforce needs everywhere protection. So how can businesses securely support a growing workforce of both in-office and remote workers without bottlenecking their VPN?

    Cloud-delivered security is the answer! Businesses can achieve complete protection against phishing and web-based malware, without losing the native browsing experience or compromising the security of SaaS platforms.

    Join this webinar to hear from experts—SANS Instructor Serge Borso and Menlo Security CTO Kowsik Guruswamy—on:
    + Why standard VPN architectures are failing to stop targeted threats.
    + How direct-to-Internet services can ease corporate VPN traffic without losing security cover.
    + Specific use case examples that demonstrate why a cloud-based security layer is critical.
    + How to achieve 100 percent malware and phishing protection with cloud-based security on an Isolation Core™.
  • [APAC Webinar] Solving your trust issues with SASE Recorded: Jul 19 2021 25 mins
    Jack Miller
    The current web, email, and end-point security solutions are not sufficient to address the exponential growth and advancement of cyber threats.

    You can achieve 100% malware-free email and web browsing for your organization in a non-disruptive, easy to use manner. YES –100%!

    Join Menlo Security’s Head of Global ProfessionalServicesand former CISO, Jack Miller, for this session on using SASE service models to achieve Zero Trust Security.
  • [APAC Webinar] Preventing Zero-Day Threats that Evade Sandboxes Recorded: Jul 19 2021 51 mins
    Nick Edwards, Yi-Xian Yong, Boon Peng Lau, Sue Nguyen
    Sandbox environments observe and detect malware behaviour. And that's why Sandboxes fail.

    Traditionally, Sandboxing has been used for protection against web-based threats, but it's no secret that malware and tactics are fast evolving to counter traditional security approaches and technology. Detect and respond techniques and tools have never delivered the safety that users and businesses need.

    Most Sandboxes have fundamental flaws that today's sophisticated malware can easily evade and exploit. As businesses of all sizes embrace remote working and migrate to software as a service (SaaS) consumption model, security is being entirely re-architected to support this transition.

    Join Nick Edwards, Menlo Security's Vice President of Product, at this webinar to hear the latest techniques used by attackers to evade sandbox environments. You'll learn ways to fight back and outsmart cybercriminals to secure and enable remote work without limits or worry.

    Nick will discuss:

    • Why Sandboxes are failing.
    • Real-life examples of ways sandboxes fail.
    • How you can achieve 100% protection against Zero-Day threats.
  • [APAC Webinar] How to combat phishing and ransomware Recorded: Jul 19 2021 57 mins
    Jack Miller, Boon Peng Lau, Sue Nguyen
    Phishing and ransomware are likely among your top concerns right now, given the endless headline-grabbing breaches involving nasty malware across our region lately.

    According to the Asia Pacific Risk Center at Marsh and McLennan, the Asia Pacific region is 80 percent more likely to be targeted by hackers than other parts of the world. Our region's rapidly growing speed and scope of digital transformation and IoT connectivity, coupled with a lack of government support and cybersecurity investments among corporations, makes us particularly vulnerable to cyber exploitation.

    But you can make malware a memory. Yes, even ransomware.

    On this webinar your will learn and discover:

    • How have phishing and ransomware attack trends changed as a result of COVID-19?
    • Ways can you eliminate malware and protect your digital and remote workforce.
    • How Japan's largest corporation, the Japan Post Holdings, achieves 110% malware protection without impacting end-user experience or convenience.
  • Your Data Has Moved to the Cloud. Has Your Security Stack? Recorded: Jul 14 2021 61 mins
    Jack Miller, Head of Professional Services, Menlo Security and Mitch Ashley, Analytist at Accelerated Strategies Group
    To protect productivity and enable modern businesses, today’s mobile workforce needs fast, secure, and reliable Internet access. Much of the currently deployed security technology is not equipped to secure today’s volume of Internet traffic, SaaS applications, or offer the security capabilities needed to overcome the challenges presented by today’s expanded attack surface. So, how should security teams secure work and keep up with the demands of the business and workforce?

    During this discussion, Jack Miller, Head of Global Professional Services at Menlo Security and a former CISO, will answer that question and dive deep into how organizations are moving away from legacy security solutions to overcome the challenges that remote work presents today.

    Speakers:
    Jack Miller, Head of Professional Services, Menlo Security
    Mitch Ashley, Analytist at Accelerated Strategies Group
  • A New Approach to Secure Web Gateways Recorded: Jul 14 2021 57 mins
    Nick Edwards, VP of Product Management, Menlo Security
    Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

    Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.
  • Examining threat trends: Why organizations are looking to the cloud for security Recorded: Jul 7 2021 59 mins
    Steve Piper, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in its eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

    Tune into this informative session to gain key insights to security concerns, projects, and priorities of security leaders globally to help define your internal strategy and investment plans.
  • People are the new perimeter - secure the perimeter! Recorded: Jul 1 2021 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • People are the new perimeter - secure the perimeter! Recorded: Jun 30 2021 53 mins
    Mark Guntrip, Sr Dir, Cybersecurity Strategy, Menlo Security
    With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect - people, data and applications.
    Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.
  • A new approach to SWG: breaking up with your onpremise web proxy is a no brainer Recorded: Jun 23 2021 57 mins
    Nick Edwards, VP of Product Management, Menlo Security
    Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

    Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.
  • Defining the synergy between Zero Trust and SASE. Recorded: Jun 17 2021 27 mins
    Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security
    Many security organizations are opting to take a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.

    By now you’ve also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
    · Why focusing on detection is a reactive approach to security
    · The relationship between SASE and Zero Trust
    · Getting the upper hand in fighting online security threats targeting your users.
  • Defining the synergy between Zero Trust and SASE. Recorded: Jun 17 2021 27 mins
    Mark Guntrip, Sr Director of Cybersecurity Strategy, Menlo Security
    Many security organizations are opting to take a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.

    By now you’ve also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
    · Why focusing on detection is a reactive approach to security
    · The relationship between SASE and Zero Trust
    · Getting the upper hand in fighting online security threats targeting your users.
  • Examining threat trends: Why organizations are looking to the cloud for security Recorded: Jun 16 2021 59 mins
    Steve Piper, CyberEdge; Nick Edwards, VP of Product Management, Menlo Security
    Now in its eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practitioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.

    Tune into this informative session to gain key insights to security concerns, projects, and priorities of security leaders globally to help define your internal strategy and investment plans.
Securing work where it happens. In the cloud.
Menlo Security enables organizations to outsmart threats, completely eliminating attacks and fully protecting productivity with a one-of-a-kind, isolation-powered cloud security platform. It’s the only solution to deliver on the promise of cloud security—by providing the most secure Zero Trust approach to preventing malicious attacks; by making security invisible to end users while they work online; and by removing the operational burden for security teams. Now organizations can offer a safe online experience, empowering users to work without worry while they keep the business moving forward.. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: [APAC Webinar] Securing the Future of Work
  • Live at: Jul 21 2021 4:30 am
  • Presented by: Kowsik Guruswamy, Serge Borso
  • From:
Your email has been sent.
or close