Hi [[ session.user.profile.firstName ]]

APAC: Safeguarding the Usage of Data Uniformly, Everywhere

The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

In this session we dive into step 3 and learn how:
• To work anywhere, data MUST be safe everywhere
• Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
• SASE convergence = efficiency: write policies once, enforce everywhere
Recorded May 20 2021 16 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
Presentation preview: APAC: Safeguarding the Usage of Data Uniformly, Everywhere

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Une stratégie Zero Trust : Ne faites jamais confiance, Vérifiez toujours Jun 24 2021 8:00 am UTC 46 mins
    Venita Maupou & Vincent LeClerc (Forcepoint) | Alain De Maght (Hôpitaux Iris Sud)
    Les mots d’ordre du modèle de sécurité Zero Trust sont « Ne faites jamais confiance, Vérifiez toujours. À chaque fois. » Cette attitude envers la vérification est particulièrement importante dans le monde du post-Covid19. Tandis que de nombreux salariés travaillent toujours à distance et ont besoin d'avoir accès à des logiciels sur leurs appareils à domicile, votre modèle de sécurité doit être diligent. Cependant, en dépit de la pandémie, la sophistication des violations de données augmente depuis des années, et les mesures de sécurité doivent continuer à s’adapter aux risques continus. Selon Microsoft, 94% des sociétés ont déclaré qu’elles étaient en train de déployer une approche Zero Trust.

    Qu’est donc Zero Trust, et que peut-elle faire pour vous ?

    Dans cette session, nous allons examiner :
    - Pourquoi Zero Trust est en train de prendre son essor, et si Zero Trust peut faire du tort à l’expérience utilisateur, ou l’améliorer
    - Comment changer la façon dont vous envisagez la sécurité afin de préparer votre entreprise à la stratégie Zero Trust

    Participez à cette séance pour en apprendre plus sur l’utilité de la stratégie Zero Trust, et savoir s’il s’agit d’une la solution définitive ou simplement du début d’une stratégie évolutive de cyber sécurité.

    Les présentateurs:
    -Venita Maupou Sr Program Manager, Forcepoint
    -Vincent LeClerc, Sales Engineer, Forcepoint
    -Alain De Maght CISO, Hôpitaux Iris Sud
  • Business and Security Strategies for The Unbound Enterprise Jun 23 2021 8:30 am UTC 31 mins
    Nico Fischbach, Global CTO, Forcepoint | Elizabeth Nann, Exec. Dir. of Global Consumer Insights, WSJ Intelligence
    Executives agree in the vast potential for integrated, converged security approaches, believing security is the path to innovation and competitive advantages. That is the upshot from the new “The C-Suite Report: Business and Security Strategies for The Unbound Enterprise.”

    Join Elizabeth Nann, executive director of Consumer Insights for Wall Street Journal, and Nico Fischbach, global CTO and vice president of SASE Engineering, both with unique personal insights on the view from the board and SOC.

    Elizabeth’s and Nico’s share insights on:

    - How you can adapt your company to SASE and cloud consumption models
    - How much new innovation your company should take on as part of the journey to the new model
    - How to choose the right SASE partner – and the capabilities and services to look for
    - Ways to avoid fragmentation while implementing unified policy, unified reporting and better user experience.
    - How SASE can pave the way to ultimately get to a frictionless user experience
    - And, why Zero Trust and SASE are better together.
  • Zero-Trust-Strategie: Niemals vertrauen, immer überprüfen Jun 22 2021 8:00 am UTC 32 mins
    Carsten Hoffmann I Lars Kroll I Jens Schubert
    Das Schlüsselwort des Zero Trust-Sicherheitsmodells lautet „Nie vertrauen, immer überprüfen. Immer.“ Diese Einstellung zu Sicherheit ist in einer Welt nach Covid-19 besonders wichtig, da viele Mitarbeiter immer noch von zu Hause arbeiten und teilweise mit ihren eigenen Geräten auf Geschäftsdaten zugreifen.

    Unabhängig von der Pandemie werden Cyber Angriffe seit Jahren immer raffinierter und die Auswirkungen immer kostspieliger. Sicherheitsmaßnahmen müssen an die Risiken angepasst werden. Laut Microsoft haben 94 % der Unternehmen berichtet, dass sie dabei sind Zero-Trust- zu implementieren.
    Was ist also Zero Trust, und welche Vorteile bietet es Ihnen?

    In dieser Session werden wir folgende Punkte diskutieren:
    - Warum Zero Trust jetzt an Bedeutung gewinnt und ob Zero Trust die Benutzererfahrung beeinträchtigen oder verbessern kann.
    - Umdenken im Sicherheitsbereich, um Ihre Organisation auf eine Zero-Trust-Strategie vorzubereiten.

    Nehmen Sie an dieser Session teil, um mehr über den Wert einer Zero Trust-Strategie zu erfahren und darüber, ob Zero Trust das Endergebnis ist oder ob es nur der Ausgangspunkt für eine zukunftssichere Cybersicherheitsstrategie ist.
  • AMER: Business and Security Strategies for The Unbound Enterprise Jun 16 2021 4:00 pm UTC 31 mins
    Nico Fischbach, Global CTO, Forcepoint | Elizabeth Nann, Exec. Dir. of Global Consumer Insights, WSJ Intelligence
    Executives agree in the vast potential for integrated, converged security approaches, believing security is the path to innovation and competitive advantages. That is the upshot from the new “The C-Suite Report: Business and Security Strategies for The Unbound Enterprise.”

    Join Elizabeth Nann, executive director of Consumer Insights for Wall Street Journal, and Nico Fischbach, global CTO and vice president of SASE Engineering, both with unique personal insights on the view from the board and SOC.

    Elizabeth’s and Nico’s share insights on:

    - How you can adapt your company to SASE and cloud consumption models
    - How much new innovation your company should take on as part of the journey to the new model
    - How to choose the right SASE partner – and the capabilities and services to look for
    - Ways to avoid fragmentation while implementing unified policy, unified reporting and better user experience.
    - How SASE can pave the way to ultimately get to a frictionless user experience
    - And, why Zero Trust and SASE are better together.
  • 5 steps to a data-first SASE architecture Jun 16 2021 12:00 pm UTC 60 mins
    Jim Fulton, Sr. Director of data-first SASE and Zero Trust Data Protection Solutions
    In a hybrid, unbound enterprise the working models of protecting the edge are no longer enough. Users and apps are everywhere, so it’s essential to protect your data. Secure Service Access Edge (SASE) makes it possible for people to work safely from anywhere and, with zero trust principles applied, you can ensure explicit permissions for the user. A data-first SASE architecture with ZTNA built in makes it possible to ensure the right person has access to the right data and understand the usage of data so you can apply appropriate control points where needed. Forcepoint’s data-first SASE approach is customizable, allowing you to apply the capabilities you need based on the challenges you have.

    Join this webcast to learn the five steps to creating an integrated cloud and network security strategy:

    - Protect remote workers in web and cloud
    - Control access to cloud & private apps without VPNs
    - Connect and protect branch offices
    - Safeguard the usage of data everywhere
    - Continuously monitor user risk
  • APAC: Business and Security Strategies for The Unbound Enterprise Jun 16 2021 3:00 am UTC 31 mins
    Nico Fischbach, Global CTO, Forcepoint | Elizabeth Nann, Exec. Dir. of Global Consumer Insights, WSJ Intelligence
    Executives agree in the vast potential for integrated, converged security approaches, believing security is the path to innovation and competitive advantages. That is the upshot from the new “The C-Suite Report: Business and Security Strategies for The Unbound Enterprise.”

    Join Elizabeth Nann, executive director of Consumer Insights for Wall Street Journal, and Nico Fischbach, global CTO and vice president of SASE Engineering, both with unique personal insights on the view from the board and SOC.

    Elizabeth’s and Nico’s share insights on:

    - How you can adapt your company to SASE and cloud consumption models
    - How much new innovation your company should take on as part of the journey to the new model
    - How to choose the right SASE partner – and the capabilities and services to look for
    - Ways to avoid fragmentation while implementing unified policy, unified reporting and better user experience.
    - How SASE can pave the way to ultimately get to a frictionless user experience
    - And, why Zero Trust and SASE are better together.
  • Work Safely, From Anywhere – Putting Your Employees at the Center Recorded: May 20 2021 53 mins
    Alex Hilton, Cloud Industry Forum | Elizabeth Varghese, IBM | Dr Margaret Cunningham, Forcepoint
    As your employees are working from home, it is key that leaders provide them with tools and secure access to platforms and internal networks, allowing them to work as productively at home as they would in the corporate office. One key consideration to come out of remote working, is whether behaviour analytics, AI and machine learning ultimately help the employee, or become a violation of privacy and freedom. Leaders must now keep employees productive, satisfied and secure while working from home.

    As employees move to remote working positions, leaders must consider that not only is it important to keep data private and secure, it is essential that the privacy of employees, and customers not be overlooked. According to an IAPP survey, globally, 81% of privacy experts expect no or only a small reduction in privacy budgets. Evidently, privacy is still at the forefront of security measures, despite the effects of the pandemic.

    Join us in this session as we explore:
    - Does the way you frame the business change your approach for finding the best security solutions: users vs people.
    - What makes employees happy in their work but doesn’t compromise security, or privacy.
    - When behaviour is affected by your environment, how do you build a ‘home-life’ robust business security model

    Panellists:
    Alex Hilton, CEO, Cloud Industry Forum
    Elizabeth Varghese, Global Leader Talent & HR Strategy Reinvention, IBM
    Dr Margaret Cunningham, Principal Research Scientist for Human Behaviour, Forcepoint
  • APAC: Safeguarding the Usage of Data Uniformly, Everywhere Recorded: May 20 2021 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • AMER: Safeguarding the Usage of Data Uniformly, Everywhere Recorded: May 19 2021 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • EMEA: Safeguarding the Usage of Data Uniformly, Everywhere Recorded: May 19 2021 16 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 3 and learn how:
    • To work anywhere, data MUST be safe everywhere
    • Data-centric SASE goes beyond access to controlling usage, which is Zero Trust
    • SASE convergence = efficiency: write policies once, enforce everywhere
  • AMER: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • EMEA: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • APAC: Controlling Access to Cloud and Private Apps without VPNs Recorded: May 12 2021 18 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 caused many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term workarounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rearview mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 2 and learn how:
    • VPNs and backhauling cause more problems than they solve
    • Visibility into app usage more important than ever with remote
    • Zero Trust explicit permission done right keeps things seamless, easy
  • Sicheres Arbeiten, von überall - Ihre Mitarbeiter stehen im Mittelpunkt Recorded: May 11 2021 26 mins
    Carsten Hoffmann I Peter "Faxe" Lachenmair | Kurt Thomas
    Wenn Mitarbeiter von zu Hause arbeiten, ist es von entscheidender Bedeutung, dass ihnen die richtigen Tools zur Verfügung stehen. Diese Werkzeuge sollen den Mitarbeiter auch vor Fehlern und Gefahren schützen. Bei diesem Thema werden jetzt oft Verhaltensanalyse, künstliche Intelligenz und maschinelles Lernen diskutiert. Wie steht es um das Spannungsfeld zwischen Privatsphäre und Sicherheit Freiheit und Produktivität – gerade im Home Office?

    Laut einer IAPP-Umfrage erwarten weltweit 81 % der Datenschutzexperten keine oder nur eine geringe Kürzung der Datenschutzbudgets. Offenbar steht der Datenschutz trotz der Auswirkungen der Pandemie immer noch an erster Stelle der Sicherheitsmaßnahmen.
  • APAC: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 6 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • AMER: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 5 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • EUROPE: Protecting Remoting Workers on the Web and in the Cloud through SASE Recorded: May 5 2021 14 mins
    Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
    The pandemic of 2020 required many IT teams to perform heroic acts to keep people productive amid the unprecedented exodus from the office. With the focus now shifting to enabling people to work safely from anywhere, not just their home, many organizations are looking to replace the short-term work-arounds they put in place with more sustainable solutions. As SASE was designed specifically for this use case, interest in this cloud-based architecture has been greatly accelerated.

    So where should start? Let’s explore what’s holding you back. In a 5-step approach, you can select your on-ramp in your journey to a SASE architecture and avoid looking in the rear-view mirror, because if you’ve implemented SASE successfully, you’ll achieve a Zero Trust approach.

    In this session we dive into step 1 and learn how:

    • When people working in multiple places at once, security must keep up
    • SASE often starts with web/cloud security
    • Remote Browser Isolation (RBI), the latest in web security and SASE, is Zero Trust as a Service (ZTaaS)
  • Travaillez en sécurité, de n’importe où - Placer vos employés au centre Recorded: Apr 29 2021 41 mins
    Venita Maupou | Nicolas Fouillet | Younes Grar | Luc Grissonnanche
    Alors que les employés travaillent à domicile, il est essentiel que les dirigeants leur fournissent des outils et un accès sécurisé aux plateformes et réseaux internes, leur permettant de travailler aussi efficacement à la maison qu’au bureau. Une question clé issue du travail à distance, est la suivante : les analyses de comportement, l’intelligence artificielle et le machine learning (apprentissage automatique) aident-ils les employés ou se transforment-ils en une violation de la vie privée et de la liberté? Les dirigeants doivent faire en sorte que leurs employés restent efficaces, heureux et en sécurité tout en travaillant à domicile.

    Lorsque les employés passent au travail à distance, les dirigeants doivent assurer que les données restent privées et en sécurité, mais il est essentiel que la vie privée des employés et des clients ne soit pas oubliée. Selon une enquête IAPP, au niveau international, 81% des spécialistes des questions relatives au respect de la vie privée s’attendent à ce qu'il n’y ait aucune ou seulement une faible baisse des budgets de protection de la vie privée. Bien évidemment, la protection de la vie privée est en première ligne des mesures de sécurité, malgré les effets de la pandémie.

    Participez à cette séance dans laquelle nous évoquons les points suivants :
    - La façon dont vous définissez votre activité change-t-elle la façon qui vous aide à trouver des solutions de sécurité : utilisateurs contre individus.
    - Ce qui rend les employés heureux au travail mais ne remet pas en cause la sécurité, ou la vie privée.
    - Lorsque le comportement est influencé par votre environnement, comment élaborez-vous un modèle de sécurité de l’activité robuste et compatible avec la vie de famille ?

    Les présentateurs:
    -Venita Maupou, Senior Program Manager & Nicolas Fouillet, Sales Engineer chez Forcepoint
    -Younes Grar, IT Consultant
    -Luc Grissonnanche, Sales Engineering Manager EMEA chez HelpSystems
  • AMERICAS: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
  • EUROPE: A Modern Approach to Zero Trust Recorded: Apr 28 2021 20 mins
    John Grady, Senior Analyst, ESG | Petko Stoyanov, CTO, Global Governments, Forcepoint
    With all of the devices, locations, connection types, and opportunities for compromise we have today, user accounts and connected devices should not be trusted by default. In fact, information access should only be provided in limited or as-needed fashion. This “Zero Trust” approach to network security is uniquely suited to safeguarding organizations in an age of cloud applications, virtualized desktops, and widespread network access. Find out why.
Strategic sessions on Cloud, Network & Data Security
To enable users to work anywhere, we must put data protection at the center of cloud and network security strategies. In this channel, we explore the latest technologies, security trends and frameworks like Zero Trust and SASE to help you not only determine where you are, but also what you still need to do to protect your business. Get the materials and building blocks you need to implement a data-first SASE architecture. See for yourself. https://www.forcepoint.com/sase

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: APAC: Safeguarding the Usage of Data Uniformly, Everywhere
  • Live at: May 20 2021 3:00 am
  • Presented by: Chase Cunningham, Chief Strategy Officer, Eircom - Jim Fulton, Director of SASE and Zero Trust Solutions, Forcepoint
  • From:
Your email has been sent.
or close