Hi [[ session.user.profile.firstName ]]

EUROPE: How SASE Helps Deliver Zero Trust Protection Against Advanced Threats

With people changing where they’re working once again—mixing home, office, and travel—security has to change to keep up. Instead of relying physically seeing who is connecting to the network, many organizations are looking to best practices such as Zero Trust to control how remote workers access and use sensitive information.

Zero Trust’s “never trust, always verify” principle, which is increasingly being delivered as a service through SASE cloud security, is providing a new foundation for safely connecting workers no matter where they are to web content, cloud apps, and internal private applications.

Key Takeaways:
1.Why Zero Trust matters with a remote workforce
2.How organizations are using SASE to deliver Zero Trust as a service to address advanced threats
3.How SASE and Zero Trust work together to go just securing access to providing continuous control over data even after it has been downloaded

Presenters:
Nick Cavalancia, Microsoft Cloud and Datacenter MVP
Jim Fulton, Director of SASE and Zero Trust Solutions
Dave Barnett, Head of Edge Protection, EMEA
Recorded Apr 7 2021 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Cavalancia, Jim Fulton, Dave Barnett
Presentation preview: EUROPE: How SASE Helps Deliver Zero Trust Protection Against Advanced Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Work Safely, From Anywhere – Putting Your Employees at the Center May 20 2021 8:00 am UTC 60 mins
    Alex Hilton, Cloud Industry Forum | Elizabeth Varghese, IBM | Dr Margaret Cunningham, Forcepoint
    As your employees are working from home, it is key that leaders provide them with tools and secure access to platforms and internal networks, allowing them to work as productively at home as they would in the corporate office. One key consideration to come out of remote working, is whether behaviour analytics, AI and machine learning ultimately help the employee, or become a violation of privacy and freedom. Leaders must now keep employees productive, satisfied and secure while working from home.

    As employees move to remote working positions, leaders must consider that not only is it important to keep data private and secure, it is essential that the privacy of employees, and customers not be overlooked. According to an IAPP survey, globally, 81% of privacy experts expect no or only a small reduction in privacy budgets. Evidently, privacy is still at the forefront of security measures, despite the effects of the pandemic.

    Join us in this session as we explore:
    - Does the way you frame the business change your approach for finding the best security solutions: users vs people.
    - What makes employees happy in their work but doesn’t compromise security, or privacy.
    - When behaviour is affected by your environment, how do you build a ‘home-life’ robust business security model

    Panellists:
    Alex Hilton, CEO, Cloud Industry Forum
    Elizabeth Varghese, Global Leader Talent & HR Strategy Reinvention, IBM
    Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint
  • APAC: Safeguarding the Usage of Data Uniformly, Everywhere May 20 2021 3:00 am UTC 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • AMER: Safeguarding the Usage of Data Uniformly, Everywhere May 19 2021 4:00 pm UTC 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • EMEA: Safeguarding the Usage of Data Uniformly, Everywhere May 19 2021 9:00 am UTC 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • AMER: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • EMEA: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • APAC: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • Sicheres Arbeiten, von überall - Ihre Mitarbeiter stehen im Mittelpunkt Recorded: May 11 2021 26 mins
    Carsten Hoffmann I Peter "Faxe" Lachenmair | Kurt Thomas
    Wenn Mitarbeiter von zu Hause arbeiten, ist es von entscheidender Bedeutung, dass ihnen die richtigen Tools zur Verfügung stehen. Diese Werkzeuge sollen den Mitarbeiter auch vor Fehlern und Gefahren schützen. Bei diesem Thema werden jetzt oft Verhaltensanalyse, künstliche Intelligenz und maschinelles Lernen diskutiert. Wie steht es um das Spannungsfeld zwischen Privatsphäre und Sicherheit Freiheit und Produktivität – gerade im Home Office?

    Laut einer IAPP-Umfrage erwarten weltweit 81 % der Datenschutzexperten keine oder nur eine geringe Kürzung der Datenschutzbudgets. Offenbar steht der Datenschutz trotz der Auswirkungen der Pandemie immer noch an erster Stelle der Sicherheitsmaßnahmen.
  • APAC: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 6 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • AMER: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 5 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • EUROPE: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 5 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • Travaillez en sécurité, de n’importe où - Placer vos employés au centre Recorded: Apr 29 2021 41 mins
    Venita Maupou | Nicolas Fouillet | Younes Grar | Luc Grissonnanche
    Alors que les employés travaillent à domicile, il est essentiel que les dirigeants leur fournissent des outils et un accès sécurisé aux plateformes et réseaux internes, leur permettant de travailler aussi efficacement à la maison qu’au bureau. Une question clé issue du travail à distance, est la suivante : les analyses de comportement, l’intelligence artificielle et le machine learning (apprentissage automatique) aident-ils les employés ou se transforment-ils en une violation de la vie privée et de la liberté? Les dirigeants doivent faire en sorte que leurs employés restent efficaces, heureux et en sécurité tout en travaillant à domicile.

    Lorsque les employés passent au travail à distance, les dirigeants doivent assurer que les données restent privées et en sécurité, mais il est essentiel que la vie privée des employés et des clients ne soit pas oubliée. Selon une enquête IAPP, au niveau international, 81% des spécialistes des questions relatives au respect de la vie privée s’attendent à ce qu'il n’y ait aucune ou seulement une faible baisse des budgets de protection de la vie privée. Bien évidemment, la protection de la vie privée est en première ligne des mesures de sécurité, malgré les effets de la pandémie.

    Participez à cette séance dans laquelle nous évoquons les points suivants :
    - La façon dont vous définissez votre activité change-t-elle la façon qui vous aide à trouver des solutions de sécurité : utilisateurs contre individus.
    - Ce qui rend les employés heureux au travail mais ne remet pas en cause la sécurité, ou la vie privée.
    - Lorsque le comportement est influencé par votre environnement, comment élaborez-vous un modèle de sécurité de l’activité robuste et compatible avec la vie de famille ?

    Les présentateurs:
    -Venita Maupou, Senior Program Manager & Nicolas Fouillet, Sales Engineer chez Forcepoint
    -Younes Grar, IT Consultant
    -Luc Grissonnanche, Sales Engineering Manager EMEA chez HelpSystems
  • AMERICAS: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
  • EUROPE: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
  • APAC: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
  • The State of SASE and 5 Steps to Success Recorded: Apr 20 2021 55 mins
    Alex Hilton, Chief Executive, Cloud Industry Forum & Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    More than 40% of enterprises will have strategies to adopt SASE by 2024, according to Gartner. This initiative has been hugely pushed forward due to the pandemic, with the focus now shifting to enabling people to work safely from anywhere.

    A Secure Access Service Edge (SASE) can improve and streamline how enterprises keep their workers, and clients’ data safe. However, there are multiple steps for professionals to consider when implementing their SASE strategies, from inspecting their network security to understanding user behaviour.

    With such a high-level interest for a relatively new approach to network security, it’s time to ask questions about the longevity of SASE, whether it was deployed correctly, and what solutions it will provide in the future?

    Join us to learn:
    - 5 steps to succeed with SASE
    - How cybersecurity professionals are successfully implementing their SASE architecture
    - How SASE adoption has been approached, and what these techniques mean in the long run
    - The future of SASE and secure access
  • Rester dans la course : Une longueur d’avance sur la transformation numérique Recorded: Apr 15 2021 47 mins
    Venita Maupou, Rémi Enjalbert, Stéphane Chmielewski, Benjamin Leroux
    Tandis que les entreprises ont dû s’adapter rapidement au changement en passant du travail au bureau au travail à distance, la transformation numérique a continué à se développer en 2020. Ces changements comprennent, sans s’y limiter, le passage au cloud, et ses diverses utilisations pour à la fois accéder aux données clients dans le domaine bancaire ou la fabrication, jusqu’à la transformation du SD-WAN, qui a fait évoluer pour toujours la façon dont nous restons connectés.

    Tandis que la transformation numérique a été un élément clé de 2020, la transformation des entreprises et du leadership a également évoluée. 2020 a obligé, plus qu’auparavant, les dirigeants à réfléchir de façon plus critique à leurs stratégies de sécurité de l’entreprise. La transformation participative s’est développée et les dirigeants doivent dorénavant écouter les utilisateurs plutôt que de leur dire non, et adopter la Shadow IT. D’autres domaines de transformation comprennent les décisions liées à l’adoption du cloud, à la gestion de la sécurité des employés sur les appareils utilisés à domicile, et à de plus larges questions de vie privée.

    Il est essentiel que les dirigeants aient suffisamment de connaissances afin de prendre les meilleures décisions possibles pour leurs sociétés.

    Dans cette séance, nous allons aborder les points suivants:
    -La principale force motrice de la transformation numérique
    -La responsabilité des choix informatiques ; comment adopter le Shadow IT sans mettre en danger la sécurité
    -Les sociétés et leurs employés prennent-ils des décisions plus audacieuses et celles-ci peuvent-elles être plus bénéfiques et faire baisser le coût de propriété ?
    -Prendre les meilleures décisions de sécurité pour votre activité ; les réflexions autour de l’adoption du cloud et des appareils des employés

    Presenters:
    -Venita Maupou Senior Program Manager/Rémi Enjalbert Senior Sales Engineer, Forcepoint
    -Stéphane Chmielewski CISO, Finologee
    -Benjamin Leroux Marketing Director, Advens
  • AMERICAS: Fast Tracking SASE in 2021 Recorded: Apr 14 2021 17 mins
    Eric Hanselman, Principal Research Analyst, 451 Research | Nico Popp, Chief Product Officer, Forcepoint
    Remote work can be effective, secure, and manageable. But with so much of the workforce getting their jobs done from home, the network approaches and technologies used for security and access control prior to COVID-19 are now riddled with vulnerabilities. Organizations must quickly change how network and cloud security are delivered so they can provide fast, reliable, and secure access to their users and employees no matter where they’re located. Hence, we’ve seen a renewed focus on SASE technology. Find out how to fast track the shift to SASE this year.
  • EUROPE: Fast Tracking SASE in 2021 Recorded: Apr 14 2021 17 mins
    Eric Hanselman, Principal Research Analyst, 451 Research | Nico Popp, Chief Product Officer, Forcepoint
    Remote work can be effective, secure, and manageable. But with so much of the workforce getting their jobs done from home, the network approaches and technologies used for security and access control prior to COVID-19 are now riddled with vulnerabilities. Organizations must quickly change how network and cloud security are delivered so they can provide fast, reliable, and secure access to their users and employees no matter where they’re located. Hence, we’ve seen a renewed focus on SASE technology. Find out how to fast track the shift to SASE this year.
  • APAC: Fast Tracking SASE in 2021 Recorded: Apr 14 2021 17 mins
    Eric Hanselman, Principal Research Analyst, 451 Research | Nico Popp, Chief Product Officer, Forcepoint
    Remote work can be effective, secure, and manageable. But with so much of the workforce getting their jobs done from home, the network approaches and technologies used for security and access control prior to COVID-19 are now riddled with vulnerabilities. Organizations must quickly change how network and cloud security are delivered so they can provide fast, reliable, and secure access to their users and employees no matter where they’re located. Hence, we’ve seen a renewed focus on SASE technology. Find out how to fast track the shift to SASE this year.
Connect and protect your remote, global workforce
Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. The right connectivity and security through digital transformation can provide important benefits, including increased productivity and improved user experience at a much lower cost, whether it’s for accessing cloud applications or legacy applications. Being able to use the same policies, the same tools for visualizing what's happening on a network, and extending that seamlessly into the cloud will help security teams understand use of and manage risk.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: EUROPE: How SASE Helps Deliver Zero Trust Protection Against Advanced Threats
  • Live at: Apr 7 2021 9:00 am
  • Presented by: Nick Cavalancia, Jim Fulton, Dave Barnett
  • From:
Your email has been sent.
or close