Implementing a true Secure Access Service Edge (SASE) architecture is a daunting task and it’s not a one size fits all approach. Nico Popp, Chief Product Officer, Forcepoint, brings the fifth and final step to adopting a SASE approach–the blueprint you need to succeed.
Step 5 in the series continues with a practical view on:
- How a SASE architecture is used to connect your users and protect your data
- Actionable steps for you to build a true SASE architecture
- How to evaluate and improve a SASE platform
- Advice on how to leverage existing investments and a strategy for where to invest
Homayun Yaqub, Senior Director of Strategy, Forcepoint
Today’s decentralized workforce offers an unprecedented risk landscape. Employees interact with enterprise data from anywhere. Attackers are getting in, and insider threats are on the rise.
Join Kimberly Finnigan Zink, Esq., Global Information Security Compliance Officer, GlobalFoundries and Homayun Yaqub, Senior Director of Strategy, Forcepoint for Step 4 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how behavior-centric analytics can differentiate between a trusted employee and a bad actor impersonating one.
Eric Jackson, Vice President, Product Management, Forcepoint & Keith Vallance, Head of Product, Boldon James
The traditional approach to data security does not encourage business productivity while still falling short when it comes to preventing data exfiltration.
Join Keith Vallance, Head of Product, Boldon James and Eric Jackson, VP & GM, User and Data Protection, Forcepoint for Step 3 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how user risk can help to get maximum from a data protection solution in a multi-cloud environment accessed by an increasingly mobile and remote workforce.
Florent Fortune, VP and GM Network and Edge Protection, Forcepoint & John Peterson, Chief Product Officer, Ericom
Transitioning overnight to working remotely (not just checking email) has shaken many organizations.
You’ve given people access to the apps they need, but will it scale for the long term?
Join John Peterson, Chief Product Officer, Ericom and Florent Fortune, VP & GM, Network and Edge Protection, Forcepoint for Step 2 in the foundation of a Secure Access Service Edge (SASE) approach which continues with how you can securely provide access to apps everywhere, without the pain traditionally associated with VPNs including these three takeaways:
1. Ensure that your team is browsing the web safely while staying productive
2. Protect your team from malware, ransomware, and zero-day threats
3. Protect employees from web-borne threats while working from home
Nico Fischbach, Global Chief Technology Officer, Forcepoint & Elie Abouzeid, Vice President, Information Security, DentaQuest
With your people working outside traditional offices and your data moving into cloud apps, more business is taking place outside the traditional enterprise boundary than inside. Your people are now your new perimeter.
Step 1 in the foundation of a Secure Access Service Edge (SASE) approach starts with bringing a human-centric approach to cyber security. Join Elie Abouzeid, Vice President, Information Security, DentaQuest and Nico Fischbach Global, CTO, Forcepoint and explore new approaches to secure connectivity that can accelerate your digital transformation to the cloud.
In this opening keynote to our Secure Access Service Edge (SASE) Summit, Forcepoint CEO Matt Moynahan, reflects on how the necessity for organizations to rapidly switch to remote working has shown what is possible.
This is an opportunity for security teams to rethink their strategy for today’s new business reality and implement a model that put users and data at the centre.
Join Matt as he shares his vision for revolutionising cyber security.
Dr. Chris Boorman, VP, Marketing, EMEA & APAC, Forcepoint & Dave Barnett, Dir Edge Protection Solutions, Forcepoint
In this webinar we kick-off our Secure Access Service Edge (SASE) Summit; a virtual event for cybersecurity professionals who are interested in learning how to implement a true SASE architecture.
Join Dr. Chris Boorman, Vice-President of International Marketing and Dave Barnett, Director of Edge Protection solutions, as they discuss this revolutionary approach to securing the cloud and preview the 5 Sessions that will give you a blueprint for SASE success:
Step 1: Connectivity in a Borderless World - The New Edge
Step 2: Secure Access for a Remote Work Environment
Step 3: Data Protection in a Multi-Cloud Environment
Step 4: Becoming More Risk Aware by Understanding User Behavior
Step 5: Blueprint for SASE Success
Taze Miller Partner Solutions Architect, Amazon Web Services & Karlene Berger, Sr. Director, Product Marketing, Forcepoint
As the race to move workloads and innovation into the cloud continues, security teams are often playing catch up. Forcepoint has partnered with Amazon Web Services to increase and modernize security within these environments.
In this joint webinar, Taze Miller from AWS will share security use cases, and Karlene Berger will share how Forcepoint has invested in integrations. Together, Forcepoint and AWS can deliver an integrated view of security that can drive productivity while minimizing risk for your AWS environment.
Join us to find out how you can get the most out of your current Forcepoint Web Security solutions.To better understand security gaps, potential risks, and help secure your users and your data as your organization shifts to working from home instead of from the office.
We’ll talk about:
-Existing features and capabilities that enable your workforce to work securely across the globe
-Gaining visibility to user behavior and cloud applications so you can control and adapt your policies, and improve your overall security posture
-Best practices and tips on adjusting policies to better accommodate the merger of work and home
Ashish Malpani, Sr. Director Product Marketing, Forcepoint & John Grady, ESG Analyst Cybersecurity
Today’s security leaders believe that network security is becoming more complex with the adoption of cloud, IoT devices, and remote workforce. Organizations are struggling to adopt new security architectures like Zero Trust and looking for technological solutions rather than business outcomes.
Implementing Zero Trust needs to focus on understanding user context and intent and evolving network security to protect the new edge while ensuring consistent data security.
Attend this webinar to learn more about the practical implementation of Zero Trust from John Grady (ESG), as he shares insights based on an extensive survey.
We’re over half-way through 2020 and we’ve arguably witnessed some of the most dramatic changes to the working environment for a generation. With so many of us now working from home, security practices have rapidly adapted to protect the new world.
In this webinar, Forcepoint’s Chief Product Officer Nico Popp, looks back over the last 6 months to deliver his top 10 emerging cybersecurity trends in 2020, including:
-The end of hardware?
- Alternatives to never-ending patches
- Replacing the VPN with ZTNA/PA (Zero-Trust Network Access)
- The move to SASE (Secure Access Service Edge)
Join Nico and get his perspective on the trends that are helping shape the future of cybersecurity.
Matt Moynahan, Chief Executive Officer at Forcepoint & Lucas Di Grassi, Founding Driver of Formula E and Chairman of Roborace
While every industry struggles with the spectre of future obsolescence, some are slower than others to embrace change. The emergence of the digital era has created a need for agility and forward-thinking vision to drive transformation across every industry today.
Different industries are powering the future in fascinating ways. Autonomous racing and green energy are defining the next generation in motorsport, while understanding human behaviour and delivering automated and adaptive risk response have become essential components of modern cybersecurity.
Join Matt Moynahan, Chief Executive Officer for Forcepoint and Lucas di Grassi, Founding Driver of Formula E and Chairman of Roborace for an insightful conversation on;
- Driving transformation within storied industries ripe for disruption
- What it takes to be a champion for change on the local and global levels
- The explosion of data and the criticality in securing data for business and within our day-to-day lives
With the majority of workers going remote, does your data protection strategy still hold?
Join us as we go over the best practices to increase security effectiveness for your existing Forcepoint Data Loss Prevention solution. You’ll come away with insights on how to tackle challenges facing data protection in today's realities.
We’ll talk about:
•Best practices and tips on adjusting your strategy and policies to better increase security effectiveness for your merging remote workforce
•Existing features and capabilities that enable your workforce to work securely while remote
•Improving your overall security posture and other factors your organization should be prepared for
Nick Savvides, Strategic Business Director, Forcepoint
Most enterprises today have adopted a plethora of cloud applications and cloud platforms. In the early days, VM security was important. In the SaaS explosion, CASB was important. Now, in the era of server-less applications even more abstraction is needed. Trying to implement artificial permitters and mapping legacy controls to these new cloud native applications, where a VM doesn’t exist, your integrations are APIs and your users are building new capabilities daily which simply doesn’t work. This has given rise to next-generation cloud controls and protections that are centered on the relation between users and the data rather than infrastructure. In this session we will cut through the buzzwords and identify the strategies and technologies need to effectively protect your users and data, wherever their applications live.
Nick Savvides, Strategic Business Director, Forcepoint
The security stack at main data centres has become increasingly heavy out of necessity, to protect us against ever more sophisticated attackers. Unfortunately, replicating this in our distributed sites, in our branch offices, our stores, our satellites and even our supply chain sites is difficult, costly and often fails to deliver the security efficacy needed by the modern enterprise.
Join this webinar to hear from Nick Savvides, Forcepoint Strategic Business Director, who will showcase a solution for enterprises to move away from heavy site security, to light site sight security, where majority of security controls are converged within the network connectivity into a single plane in the cloud.
Nearly half of all corporate data is stored in the cloud. As employees utilize cloud apps for convenience or to improve productivity, more data flows to the cloud via unsanctioned apps and personal devices.
Your cybersecurity strategy should address the sprawl of Shadow IT and its risk to users & data. In this webinar, we’ll outline the importance of data protection in the cloud, specifically for Office 365 apps. Here are some things you’ll learn:
•The three pillars of data protection
•How to protect data accessed from endpoints and personal devices
•How Forcepoint can help secure O365
•The 5 main cloud risk problems
•Common use cases for Forcepoint CASB
Elizabeth Nann, Exec Dir. of Global Consumer Insights WSJ Intelligence & Carl Leonard, Principal Security Analyst, Forcepoint
The stark reality is that attackers today have a +90% success rate. It’s not a matter of “if” but “when” they will breach your network. There has never been a greater opportunity or impetus to get cybersecurity right than this moment in time. Your business literally depends on it. But how do you navigate the path forward when there are growing disparities today between CEOs and CISOs on the most effective cybersecurity path forward?
Join Elizabeth Nann, Executive Director of Consumer Insights for Wall Street Journal and Carl Leonard, Principal Security Analyst at Forcepoint for an insightful discussion on key findings from the report and implications for both the industry and your business today.
Highlights of the discussion will include;
- Overcoming a lack of common vocabulary between CEOs and CISOs in communicating cyber risks and business impacts
- Navigating disparities in CEOs proactive approach and CISOs reactive approach to cybersecurity
- And, why, despite claiming vendor fatigue, CISOs use more than 50 security vendors on average today and more than 62% report they want even more
Nico Popp, Chief Product Officer, Forcepoint and guest speaker, Dr Chase Cunningham, VP, Principal Analyst, Forrester
Perimeter security is no longer sufficient. The cloud adds complexity, fluidity, and nuance to network security. A zero-trust network helps keep your people and data safe by treating all networks as untrusted.
Join us as Dr. Cunningham, Principal Analyst at Forrester, and Nico Popp, Forcepoint’s Chief Product Officer, discuss the disconnect between security, operations and business and offer insights on how to build and implement a zero-trust strategy.
Attend this session and you’ll discover:
• An actionable blueprint for adopting Zero Trust during the process of digital transformation
• Use cases that highlight the importance of Zero Trust
• How to implement Zero-Trust in enterprise environments
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.
How Working from Home has changed Cybersecurity with CEO Matt MoynahanMatt Moynahan, CEO, Forcepoint | Eric Trexler, VP Sales - Global Government, Forcepoint | Arika Pierce, Co-host[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]18 mins