Hi [[ session.user.profile.firstName ]]

Best Practices for Providing Remote Access to Internal Apps and Networks

One of the best ways to empower your remote workforce is to provide them with the freedom and flexibility to get their work done efficiently, and with minimal risk. Did you know your Forcepoint NGFW can give your remote team access to internal web applications via their browser—without any expensive software or complex licenses? Or that your admins can manage your internal network for free, using Forcepoint VPN?

In this webinar, you’ll learn how to make the most out of your NGFW while your team works remotely. We’ll show you:

- Two different ways to set up application access for users and network access for admins
- Things to keep in mind as you set up the Forcepoint Next Gen Firewall (NGFW) VPN capabilities
- Forcepoint resources available to admins to help secure your remote workforce
Recorded Apr 22 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jim Fulton, Solution Marketing Director & Klaus Majewski, Director, Technology
Presentation preview: Best Practices for Providing Remote Access to Internal Apps and Networks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Speed, Efficiency, and Resilience – Can You Have it All? Recorded: Sep 22 2020 29 mins
    Sandy Carter, Vice President of Amazon Web Services (AWS) and Myrna Soto ,Chief Strategy and Trust Officer at Forcepoint
    Global events this year have accelerated organizations’ digital transformation efforts out of necessity. Many have done more in the last six months than in the last five years. Sandy Carter, Vice President of Amazon Web Services (AWS) and Myrna Soto ,Chief Strategy and Trust Officer at Forcepoint, discuss how this has impacted Cloud and Security strategies worldwide. As we enter this new phase, can we apply lessons learnt about speed, efficiency, and resiliency to gain competitive advantage?
  • On the Cybersecurity Forefront - Behavioral Analytics to the Rescue Recorded: Sep 16 2020 43 mins
    Bob Bragdon, SVP/Managing Dir of CSO, Worldwide at IDG and Jim Fulton, Dir, Cloud & Edge Protection Solutions, Forcepoint
    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioral analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world.

    Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use and best practices for deploying such solutions from IT security practitioners.
  • Strategies for Enhancing your Conduct Risk Management. Recorded: Sep 9 2020 25 mins
    Myrna Soto, Chief Security Strategist & Trust Officer | Homayun Yaqub | James Wilde
    Join us as we discuss best practices around developing your own strategy for enhancing your conduct risk management. With most employees having to shift to remote working overnight, it has become even more challenging to strike the balance between maximizing employee productivity and minimizing your risk.

    In this webinar we’ll cover:

    - Covid-19 impact and the need for insider risk management in the financial services industry.
    - Modern conduct risk and how organizations can evolve their strategies.
    - Using continuous risk monitoring to stay ahead of breaches.
  • On the Cybersecurity Forefront: Behavioural Analytics to the Rescue Recorded: Sep 1 2020 43 mins
    Bob Bragdon, SVP/Managing Dir of CSO, Worldwide at IDG & Jim Fulton, Dir, Cloud & Edge Protection Solutions, Forcepoint
    Most companies have hundreds of apps deployed in the cloud, and those numbers will only continue to increase. Securing a growing collection of cloud apps is one of the most challenging tasks for IT security teams, according to a new IDG survey. Behavioural analytics are one powerful set of tools being used to battle ever-changing cybersecurity threats in a mobile, cloud-dependent world.

    Join IDG’s Bob Bragdon and Forcepoint’s Jim Fulton as we explore the survey findings, including why behavioural analytics is growing in use, and best practices for deploying such solutions from IT security practitioners.
  • Security for AWS Environments with Forcepoint. Recorded: Aug 25 2020 15 mins
    Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint
    As the race to move workloads and innovation into the cloud continues, security teams are often playing catch up. Forcepoint has partnered with Amazon Web Services to increase and modernize security within these environments.

    In this joint webinar, Taze Miller from AWS will share security use cases, and Karlene Berger will share how Forcepoint has invested in integrations. Together, Forcepoint and AWS can deliver an integrated view of security that can drive productivity while minimizing risk for your AWS environment.
  • Exploring SASE and the Future of Network Security. Recorded: Aug 12 2020 32 mins
    Dave Barnett, Dynamic Edge Sales Specialist Director, Forcepoint & Mike Smart, Director of Product Marketing, Forcepoint
    SASE (Secure Access Service Edge) is a way to re-architect secure connectivity and is designed to help security and risk management leaders address the changes posed by digital transformation.

    Forcepoint experts Dave Barnett and Mike Smart discuss shifting infrastructures and the benefits of a single cloud-first platform. Security and IT leaders can discover key use cases for SASE:

    - Improved branch office and remote user connectivity
    - Simplified protection of users wherever they sit
    - Visibility and control of cloud-based apps and data
  • SASE Summit: Blueprint for Secure Access Service Edge (SASE) Success Recorded: Aug 11 2020 22 mins
    Nico Popp, Chief Product Officer, Forcepoint
    Implementing a true Secure Access Service Edge (SASE) architecture is a daunting task and it’s not a one size fits all approach. Nico Popp, Chief Product Officer, Forcepoint, brings the fifth and final step to adopting a SASE approach–the blueprint you need to succeed.
    Step 5 in the series continues with a practical view on:

    - How a SASE architecture is used to connect your users and protect your data
    - Actionable steps for you to build a true SASE architecture
    - How to evaluate and improve a SASE platform
    - Advice on how to leverage existing investments and a strategy for where to invest
  • SASE Summit: Becoming More Risk Aware by Understanding User Behavior Recorded: Aug 11 2020 24 mins
    Homayun Yaqub, Senior Director of Strategy, Forcepoint
    Today’s decentralized workforce offers an unprecedented risk landscape. Employees interact with enterprise data from anywhere. Attackers are getting in, and insider threats are on the rise.

    Join Kimberly Finnigan Zink, Esq., Global Information Security Compliance Officer, GlobalFoundries and Homayun Yaqub, Senior Director of Strategy, Forcepoint for Step 4 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how behavior-centric analytics can differentiate between a trusted employee and a bad actor impersonating one.
  • SASE Summit: Data Protection in a Multi-Cloud Environment Recorded: Aug 11 2020 27 mins
    Eric Jackson, Vice President, Product Management, Forcepoint & Keith Vallance, Head of Product, Boldon James
    The traditional approach to data security does not encourage business productivity while still falling short when it comes to preventing data exfiltration.

    Join Keith Vallance, Head of Product, Boldon James and Eric Jackson, VP & GM, User and Data Protection, Forcepoint for Step 3 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how user risk can help to get maximum from a data protection solution in a multi-cloud environment accessed by an increasingly mobile and remote workforce.
  • SASE Summit: Secure Access for a Remote Work Environment Recorded: Aug 11 2020 24 mins
    Florent Fortune, VP and GM Network and Edge Protection, Forcepoint & John Peterson, Chief Product Officer, Ericom
    Transitioning overnight to working remotely (not just checking email) has shaken many organizations.

    You’ve given people access to the apps they need, but will it scale for the long term?

    Join John Peterson, Chief Product Officer, Ericom and Florent Fortune, VP & GM, Network and Edge Protection, Forcepoint for Step 2 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how you can securely provide access to apps everywhere, without the pain traditionally associated with VPNs including these three takeaways:

    1. Ensure that your team is browsing the web safely while staying productive
    2. Protect your team from malware, ransomware, and zero-day threats
    3. Protect employees from web-borne threats while working from home
  • SASE Summit: Connectivity in a Borderless World – The New Edge Recorded: Aug 11 2020 18 mins
    Nico Fischbach, Global Chief Technology Officer, Forcepoint & Elie Abouzeid, Vice President, Information Security, DentaQuest
    With your people working outside traditional offices and your data moving into cloud apps, more business is taking place outside the traditional enterprise boundary than inside. Your people are now your new perimeter.

    Step 1 in the foundation of a Secure Access Service Edge (SASE) approach starts with bringing a human-centric approach to cyber security. Join Elie Abouzeid, Vice President, Information Security, DentaQuest and Nico Fischbach Global, CTO, Forcepoint and explore new approaches to secure connectivity that can accelerate your digital transformation to the cloud.
  • SASE Summit: A CEO's Perspective Recorded: Aug 11 2020 11 mins
    Matt Moynahan, CEO, Forcepoint
    In this opening keynote to our Secure Access Service Edge (SASE) Summit, Forcepoint CEO Matt Moynahan, reflects on how the necessity for organizations to rapidly switch to remote working has shown what is possible.

    This is an opportunity for security teams to rethink their strategy for today’s new business reality and implement a model that put users and data at the centre.

    Join Matt as he shares his vision for revolutionising cyber security.
  • SASE Summit: Stepping up to SASE Recorded: Aug 10 2020 20 mins
    Dr. Chris Boorman, VP, Marketing, EMEA & APAC, Forcepoint & Dave Barnett, Dir Edge Protection Solutions, Forcepoint
    In this webinar we kick-off our Secure Access Service Edge (SASE) Summit; a virtual event for cybersecurity professionals who are interested in learning how to implement a true SASE architecture.

    Join Dr. Chris Boorman, Vice-President of International Marketing and Dave Barnett, Director of Edge Protection solutions, as they discuss this revolutionary approach to securing the cloud and preview the 5 Sessions that will give you a blueprint for SASE success:

    Step 1: Connectivity in a Borderless World - The New Edge
    Step 2: Secure Access for a Remote Work Environment
    Step 3: Data Protection in a Multi-Cloud Environment
    Step 4: Becoming More Risk Aware by Understanding User Behavior
    Step 5: Blueprint for SASE Success
  • Security for AWS Environments with Forcepoint. Recorded: Jul 29 2020 15 mins
    Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint
    As the race to move workloads and innovation into the cloud continues, security teams are often playing catch up. Forcepoint has partnered with Amazon Web Services to increase and modernize security within these environments.

    In this joint webinar, Taze Miller from AWS will share security use cases, and Karlene Berger will share how Forcepoint has invested in integrations. Together, Forcepoint and AWS can deliver an integrated view of security that can drive productivity while minimizing risk for your AWS environment.
  • SASE Summit Fireside Chat: A CIOs Perspective on Insider Threats Recorded: Jul 28 2020 30 mins
    Lisa Schreiber, Chief Customer Success Officer, Forcepoint & Carl Eberling, SVP-IT and CIO, Forcepoint
    During a recent Secure Access Service Edge (SASE) CyberSummit Lisa Schreiber, Chief Customer Success Officer, Forcepoint conducts a fireside chat with Carl Eberling, SVP-IT and CIO, Forcepoint. With a 20-year career in technology, Carl has seen a lot of change on how insider threats have and continue to change. Hear the real-world examples and insights straight from a CIOs perspective and learn how you can keep not only your data and intellectual property safe, but also how you can have your employees be more aware.
  • Get the Most out of Your Forcepoint Web Security Solutions. Recorded: Jul 22 2020 26 mins
    Colette Tomasiak, Sr. Product Marketing Manager & Yuval Sarig, Manager Sales Engineering
    Join us to find out how you can get the most out of your current Forcepoint Web Security solutions.To better understand security gaps, potential risks, and help secure your users and your data as your organization shifts to working from home instead of from the office.

    We’ll talk about:

    -Existing features and capabilities that enable your workforce to work securely across the globe
    -Gaining visibility to user behavior and cloud applications so you can control and adapt your policies, and improve your overall security posture
    -Best practices and tips on adjusting policies to better accommodate the merger of work and home
  • SASE Summit Keynote 3 - The Security Landscape: A CISOs Perspective Recorded: Jul 22 2020 11 mins
    Myrna Soto, Chief Security Strategist and Trust Officer, Forcepoint
    Securing the perimeter of infrastructures has become harder than ever in a rapidly changing World. With technology moving to the cloud and the edge of the network moving to the home, it’s critically becoming more important to safeguard your data and intellectual property.

    Join Myrna Soto, Chief Security Strategist and Trust Officer, Forcepoint for a CISOs perspective on adopting new models like Secure Access Service Edge (SASE) and how they are becoming important as organizations move towards a digital transformation.
  • SASE Summit Keynote 2 - Security Delivered Through the Cloud Recorded: Jul 22 2020 24 mins
    Sandy Carter, Vice President, Amazon Web Services (AWS)
    During a recent SASE CyberSummit, Sandy Carter, Vice President of Amazon Web Services (AWS) delivered a keynote session and describes the importance of culture to drive innovation. Learn how Forcepoint’s partnership with AWS helps keep users and data protected as companies embrace the cloud.
  • SASE Summit Keynote 1 - Navigating the Cybersecurity Path Forward Recorded: Jul 22 2020 18 mins
    Ramin Behesti, Group Chief Product and Technology Officer, Dow Jones
    In a perimeter-less world, how do you protect users and data from attacks and threats?

    Ramin Behesti, Group Chief Product and Technology Officer at Dow Jones delivered a keynote session for a recent SASE CyberSummit and shared his insights and advice on how to navigate your cybersecurity strategy through uncharted territory.
  • Navigating the Confusion Around Zero-Trust Recorded: Jul 15 2020 39 mins
    Ashish Malpani, Sr. Director Product Marketing, Forcepoint & John Grady, ESG Analyst Cybersecurity
    Today’s security leaders believe that network security is becoming more complex with the adoption of cloud, IoT devices, and remote workforce. Organizations are struggling to adopt new security architectures like Zero Trust and looking for technological solutions rather than business outcomes.

    Implementing Zero Trust needs to focus on understanding user context and intent and evolving network security to protect the new edge while ensuring consistent data security.

    Attend this webinar to learn more about the practical implementation of Zero Trust from John Grady (ESG), as he shares insights based on an extensive survey.
Connect and protect your mobile, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Providing Remote Access to Internal Apps and Networks
  • Live at: Apr 22 2020 4:00 pm
  • Presented by: Jim Fulton, Solution Marketing Director & Klaus Majewski, Director, Technology
  • From:
Your email has been sent.
or close