Hi [[ session.user.profile.firstName ]]

Sur la corde raide entre protéger les données et favoriser le travail à distance

Depuis les 12 derniers mois, un énorme changement s’est opéré dans le travail à distance. Cela n’est cependant pas près de se terminer. Le travail est passé de ce qui était un lieu, à une activité et la façon dont nous travaillons a changé pour toujours. Une enquête Gartner a révélé que 74% des Directeurs financiers ont l’intention de faire passer certains des membres de leurs équipes au télétravail de façon permanente. Le problème auquel beaucoup d’entreprises font face est que le travail à distance se traduit par des utilisateurs et des données qui opèrent hors des secteurs traditionnels de l’informatique et de la défense, des entreprises qui font automatiquement confiance au membres de leur réseau. Les dirigeants doivent apprendre à protéger les données internes à l’entreprise, lorsque leurs employés se trouvent « à l’extérieur ». Ce changement dans l’environnement de travail a poussé les dirigeants à prendre des décisions critiques en ce qui concerne le teletravail, l’utilisation du cloud et la façon dont ils sécurisent leurs données et assurent la sécurité de leurs employés.

Comment les entreprises protègent-elles donc leurs données, tout en accordant un accès plus facile à des effectifs de plus en plus éparpillés ? Comment permettons-nous aux employés d’avoir un accès sécurisé aux données, partout et à tout moment ?

Participez à cette session dans laquelle nous évoquons :
- Le rythme du changement causé par la pandémie, et de quelle façon celui-ci impacte la sécurité, la conformité des données et les questions de vie privée des employés et des clients.
- De quelle façon protégeons-nous les données des dangers et de l’exfiltration tout en permettant d’y accéder comme jamais auparavant ?
- De quelle façon est-il possible de préserver la sécurité des travailleurs à distance, tout en évitant les frictions et en permettant aux employés de faire leur travail?
Recorded Mar 18 2021 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Venita Maupou, Forcepoint | Rudy Montier, Forcepoint | Javier Alonso, SHAM | Antoine Ferron, BitLogiK
Presentation preview: Sur la corde raide entre protéger les données et favoriser le travail à distance

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • AMER: Business and Security Strategies for The Unbound Enterprise Jun 16 2021 4:00 pm UTC 31 mins
    Nico Fischbach, Global CTO, Forcepoint | Elizabeth Nann, Exec. Dir. of Global Consumer Insights, WSJ Intelligence
    Executives agree in the vast potential for integrated, converged security approaches, believing security is the path to innovation and competitive advantages. That is the upshot from the new “The C-Suite Report: Business and Security Strategies for The Unbound Enterprise.”

    Join Elizabeth Nann, executive director of Consumer Insights for Wall Street Journal, and Nico Fischbach, global CTO and vice president of SASE Engineering, both with unique personal insights on the view from the board and SOC.

    Elizabeth’s and Nico’s share insights on:

    - How you can adapt your company to SASE and cloud consumption models
    - How much new innovation your company should take on as part of the journey to the new model
    - How to choose the right SASE partner – and the capabilities and services to look for
    - Ways to avoid fragmentation while implementing unified policy, unified reporting and better user experience.
    - How SASE can pave the way to ultimately get to a frictionless user experience
    - And, why Zero Trust and SASE are better together.
  • EMEA: Business and Security Strategies for The Unbound Enterprise Jun 16 2021 9:00 am UTC 31 mins
    Nico Fischbach, Global CTO, Forcepoint | Elizabeth Nann, Exec. Dir. of Global Consumer Insights, WSJ Intelligence
    Executives agree in the vast potential for integrated, converged security approaches, believing security is the path to innovation and competitive advantages. That is the upshot from the new “The C-Suite Report: Business and Security Strategies for The Unbound Enterprise.”

    Join Elizabeth Nann, executive director of Consumer Insights for Wall Street Journal, and Nico Fischbach, global CTO and vice president of SASE Engineering, both with unique personal insights on the view from the board and SOC.

    Elizabeth’s and Nico’s share insights on:

    - How you can adapt your company to SASE and cloud consumption models
    - How much new innovation your company should take on as part of the journey to the new model
    - How to choose the right SASE partner – and the capabilities and services to look for
    - Ways to avoid fragmentation while implementing unified policy, unified reporting and better user experience.
    - How SASE can pave the way to ultimately get to a frictionless user experience
    - And, why Zero Trust and SASE are better together.
  • APAC: Business and Security Strategies for The Unbound Enterprise Jun 16 2021 3:00 am UTC 31 mins
    Nico Fischbach, Global CTO, Forcepoint | Elizabeth Nann, Exec. Dir. of Global Consumer Insights, WSJ Intelligence
    Executives agree in the vast potential for integrated, converged security approaches, believing security is the path to innovation and competitive advantages. That is the upshot from the new “The C-Suite Report: Business and Security Strategies for The Unbound Enterprise.”

    Join Elizabeth Nann, executive director of Consumer Insights for Wall Street Journal, and Nico Fischbach, global CTO and vice president of SASE Engineering, both with unique personal insights on the view from the board and SOC.

    Elizabeth’s and Nico’s share insights on:

    - How you can adapt your company to SASE and cloud consumption models
    - How much new innovation your company should take on as part of the journey to the new model
    - How to choose the right SASE partner – and the capabilities and services to look for
    - Ways to avoid fragmentation while implementing unified policy, unified reporting and better user experience.
    - How SASE can pave the way to ultimately get to a frictionless user experience
    - And, why Zero Trust and SASE are better together.
  • Work Safely, From Anywhere – Putting Your Employees at the Center May 20 2021 8:00 am UTC 60 mins
    Alex Hilton, Cloud Industry Forum | Elizabeth Varghese, IBM | Dr Margaret Cunningham, Forcepoint
    As your employees are working from home, it is key that leaders provide them with tools and secure access to platforms and internal networks, allowing them to work as productively at home as they would in the corporate office. One key consideration to come out of remote working, is whether behaviour analytics, AI and machine learning ultimately help the employee, or become a violation of privacy and freedom. Leaders must now keep employees productive, satisfied and secure while working from home.

    As employees move to remote working positions, leaders must consider that not only is it important to keep data private and secure, it is essential that the privacy of employees, and customers not be overlooked. According to an IAPP survey, globally, 81% of privacy experts expect no or only a small reduction in privacy budgets. Evidently, privacy is still at the forefront of security measures, despite the effects of the pandemic.

    Join us in this session as we explore:
    - Does the way you frame the business change your approach for finding the best security solutions: users vs people.
    - What makes employees happy in their work but doesn’t compromise security, or privacy.
    - When behaviour is affected by your environment, how do you build a ‘home-life’ robust business security model

    Panellists:
    Alex Hilton, CEO, Cloud Industry Forum
    Elizabeth Varghese, Global Leader Talent & HR Strategy Reinvention, IBM
    Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint
  • APAC: Safeguarding the Usage of Data Uniformly, Everywhere May 20 2021 3:00 am UTC 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • AMER: Safeguarding the Usage of Data Uniformly, Everywhere May 19 2021 4:00 pm UTC 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • EMEA: Safeguarding the Usage of Data Uniformly, Everywhere May 19 2021 9:00 am UTC 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • AMER: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • EMEA: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • APAC: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • Sicheres Arbeiten, von überall - Ihre Mitarbeiter stehen im Mittelpunkt Recorded: May 11 2021 26 mins
    Carsten Hoffmann I Peter "Faxe" Lachenmair | Kurt Thomas
    Wenn Mitarbeiter von zu Hause arbeiten, ist es von entscheidender Bedeutung, dass ihnen die richtigen Tools zur Verfügung stehen. Diese Werkzeuge sollen den Mitarbeiter auch vor Fehlern und Gefahren schützen. Bei diesem Thema werden jetzt oft Verhaltensanalyse, künstliche Intelligenz und maschinelles Lernen diskutiert. Wie steht es um das Spannungsfeld zwischen Privatsphäre und Sicherheit Freiheit und Produktivität – gerade im Home Office?

    Laut einer IAPP-Umfrage erwarten weltweit 81 % der Datenschutzexperten keine oder nur eine geringe Kürzung der Datenschutzbudgets. Offenbar steht der Datenschutz trotz der Auswirkungen der Pandemie immer noch an erster Stelle der Sicherheitsmaßnahmen.
  • APAC: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 6 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • AMER: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 5 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • EUROPE: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 5 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • Travaillez en sécurité, de n’importe où - Placer vos employés au centre Recorded: Apr 29 2021 41 mins
    Venita Maupou | Nicolas Fouillet | Younes Grar | Luc Grissonnanche
    Alors que les employés travaillent à domicile, il est essentiel que les dirigeants leur fournissent des outils et un accès sécurisé aux plateformes et réseaux internes, leur permettant de travailler aussi efficacement à la maison qu’au bureau. Une question clé issue du travail à distance, est la suivante : les analyses de comportement, l’intelligence artificielle et le machine learning (apprentissage automatique) aident-ils les employés ou se transforment-ils en une violation de la vie privée et de la liberté? Les dirigeants doivent faire en sorte que leurs employés restent efficaces, heureux et en sécurité tout en travaillant à domicile.

    Lorsque les employés passent au travail à distance, les dirigeants doivent assurer que les données restent privées et en sécurité, mais il est essentiel que la vie privée des employés et des clients ne soit pas oubliée. Selon une enquête IAPP, au niveau international, 81% des spécialistes des questions relatives au respect de la vie privée s’attendent à ce qu'il n’y ait aucune ou seulement une faible baisse des budgets de protection de la vie privée. Bien évidemment, la protection de la vie privée est en première ligne des mesures de sécurité, malgré les effets de la pandémie.

    Participez à cette séance dans laquelle nous évoquons les points suivants :
    - La façon dont vous définissez votre activité change-t-elle la façon qui vous aide à trouver des solutions de sécurité : utilisateurs contre individus.
    - Ce qui rend les employés heureux au travail mais ne remet pas en cause la sécurité, ou la vie privée.
    - Lorsque le comportement est influencé par votre environnement, comment élaborez-vous un modèle de sécurité de l’activité robuste et compatible avec la vie de famille ?

    Les présentateurs:
    -Venita Maupou, Senior Program Manager & Nicolas Fouillet, Sales Engineer chez Forcepoint
    -Younes Grar, IT Consultant
    -Luc Grissonnanche, Sales Engineering Manager EMEA chez HelpSystems
  • AMERICAS: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
  • EUROPE: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
  • APAC: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
  • The State of SASE and 5 Steps to Success Recorded: Apr 20 2021 55 mins
    Alex Hilton, Chief Executive, Cloud Industry Forum & Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    More than 40% of enterprises will have strategies to adopt SASE by 2024, according to Gartner. This initiative has been hugely pushed forward due to the pandemic, with the focus now shifting to enabling people to work safely from anywhere.

    A Secure Access Service Edge (SASE) can improve and streamline how enterprises keep their workers, and clients’ data safe. However, there are multiple steps for professionals to consider when implementing their SASE strategies, from inspecting their network security to understanding user behaviour.

    With such a high-level interest for a relatively new approach to network security, it’s time to ask questions about the longevity of SASE, whether it was deployed correctly, and what solutions it will provide in the future?

    Join us to learn:
    - 5 steps to succeed with SASE
    - How cybersecurity professionals are successfully implementing their SASE architecture
    - How SASE adoption has been approached, and what these techniques mean in the long run
    - The future of SASE and secure access
  • Rester dans la course : Une longueur d’avance sur la transformation numérique Recorded: Apr 15 2021 47 mins
    Venita Maupou, Rémi Enjalbert, Stéphane Chmielewski, Benjamin Leroux
    Tandis que les entreprises ont dû s’adapter rapidement au changement en passant du travail au bureau au travail à distance, la transformation numérique a continué à se développer en 2020. Ces changements comprennent, sans s’y limiter, le passage au cloud, et ses diverses utilisations pour à la fois accéder aux données clients dans le domaine bancaire ou la fabrication, jusqu’à la transformation du SD-WAN, qui a fait évoluer pour toujours la façon dont nous restons connectés.

    Tandis que la transformation numérique a été un élément clé de 2020, la transformation des entreprises et du leadership a également évoluée. 2020 a obligé, plus qu’auparavant, les dirigeants à réfléchir de façon plus critique à leurs stratégies de sécurité de l’entreprise. La transformation participative s’est développée et les dirigeants doivent dorénavant écouter les utilisateurs plutôt que de leur dire non, et adopter la Shadow IT. D’autres domaines de transformation comprennent les décisions liées à l’adoption du cloud, à la gestion de la sécurité des employés sur les appareils utilisés à domicile, et à de plus larges questions de vie privée.

    Il est essentiel que les dirigeants aient suffisamment de connaissances afin de prendre les meilleures décisions possibles pour leurs sociétés.

    Dans cette séance, nous allons aborder les points suivants:
    -La principale force motrice de la transformation numérique
    -La responsabilité des choix informatiques ; comment adopter le Shadow IT sans mettre en danger la sécurité
    -Les sociétés et leurs employés prennent-ils des décisions plus audacieuses et celles-ci peuvent-elles être plus bénéfiques et faire baisser le coût de propriété ?
    -Prendre les meilleures décisions de sécurité pour votre activité ; les réflexions autour de l’adoption du cloud et des appareils des employés

    Presenters:
    -Venita Maupou Senior Program Manager/Rémi Enjalbert Senior Sales Engineer, Forcepoint
    -Stéphane Chmielewski CISO, Finologee
    -Benjamin Leroux Marketing Director, Advens
Connect and protect your remote, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Sur la corde raide entre protéger les données et favoriser le travail à distance
  • Live at: Mar 18 2021 9:00 am
  • Presented by: Venita Maupou, Forcepoint | Rudy Montier, Forcepoint | Javier Alonso, SHAM | Antoine Ferron, BitLogiK
  • From:
Your email has been sent.
or close