Hi [[ session.user.profile.firstName ]]

La ansatte jobbe hjemmefra etter Gartners SASE modell

I 2019 definerte Gartner SASE, og hvordan fremtidens nettverkssikkerhet ligger i skyen. Lær hvordan Zscalers SASE løsning gir ansatte en sikker og effektiv hverdag fra hjemmekontor.

Å jobbe hjemmefra er ikke nytt, og mange organisasjoner har hatt løsninger for dette i årevis. Omfanget av arbeid hjemmefra har imidlertid økt kraftig på grunn av den siste tids utvikling. Dette medfører nye utfordringer. Hvordan lar du ansatte jobbe hjemmefra uten å redusere produktiviteten eller utsette bedriften for unødvendig risiko? Bli med på vårt webinar, 28. mai, for å lære mer om dette.

Agenda:
I dette webinaret vil Ole Andreas Kjos, Sr. Sales Engineer, hos Zscaler, samt Hans Thore Rafoss, Regional Sales Manager, hos Zscaler, se på fire utfordringer for bedrifter med ansatte som jobber hjemmefra. Vi dekker blant annet:
- Hvordan gi ansatte effektiv og trygg tilgang til internett, samt alle forretningsapplikasjoner, SaaS tjenester, applikasjoner i det interne nettverket og interne applikasjoner i public og private cloud
- Hvordan gi ansatte muligheten til å jobbe fra hvor som helst, og fra hvilken som helst enhet
- Hvordan sikre en god brukeropplevelse
- Hvordan minimere angrepsflaten for interne applikasjoner

Vil du vite hvordan de ansatte kan jobbe effektivt og trygt hjemmefra? Ønsker du å lære mer om Zscalers skybaserte Zero Trust løsning jobber sammen med Zscaler Internet Access som i 9 år på rad er lederen hos analyseselskapet Gartner for Secure Web Gateway? Da er du velkommen til å melde deg på dette webinaret for mer informasjon og faglig påfyll.

Vel møtt.
Recorded May 28 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hans Thore Rafoss, Regional Sales Manager & Ole Kjos, Sales Engineer at Zscaler
Presentation preview: La ansatte jobbe hjemmefra etter Gartners SASE modell

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Defend Against Supply Chain Ransomware Attacks like Kaseya Recorded: Jul 21 2021 31 mins
    Deepen Desai ,Chief Information Security Officer, Zscaler and Amit Banker Director, Security Research, Zscaler
    The recent Kaseya supply chain ransomware attack serves as the latest reminder that even the most widely trusted tools and partners in an IT environment can quickly become vulnerabilities. The only way to mitigate this risk is to build controls based on zero trust principles such as access control, traffic inspection, and identity-based microsegmentation. As we continue to see an escalation in both supply chain and ransomware attacks, zero trust is the most effective way to reduce business risk - from every attack - unlike traditional network security approaches that leave the front door open to threats from trusted sources.

    Join Zscaler CISO Deepen Desai as he breaks down the Kaseya attack. Attend this webinar to learn:

    1. Background on the REvil ransomware group and how their attack worked
    2. Best practices for safeguarding your organization against supply chain and ransomware attacks using the principles of identity and zero trust
    3. How the Zscaler Zero Trust Exchange prevents compromise, lateral movement, and data loss to disrupt every stage of an attack and protect your organization
  • Anatomy of a Cloud Breach: What Happened, How They Did It, and How to Avoid It Recorded: Jul 8 2021 39 mins
    Rich Campagna, SVP, Cloud Protection at Zscaler and Moinul Khan,VP, Product Management at Zscaler
    The vast majority of public cloud security incidents can be traced back to either insecure configurations or excessive and unnecessary permissions.

    Join -
    Rich Campagna, SVP, Cloud Protection at Zscaler, where he leads security strategy for the public cloud and Moinul Khan, VP, Product Management responsible for Zscaler's data protection solution.

    They will break down -
    1.Several high profile cloud breaches
    2.How to analyze the techniques used
    3.Offer practical insights on how to prevent these, and similar attacks, in your cloud deployments.
  • Clientless access to Private Applications for BYOD and third party users Recorded: Jun 21 2021 29 mins
    Lisa Lorenzin , Director, Transformation Strategy at Zscaler, and Kanishka K Pandit, Zscaler Product Marketing Manager
    In today’s work-from-anywhere world, employees and third-party users are connecting to corporate data and private applications using managed and unmanaged devices. Therefore, it’s more important than ever to add a layer of security without compromising user productivity.

    Join Lisa Lorenzin, Director, Transformation Strategy at Zscaler, and Kanishka K Pandit, Zscaler Product Marketing Manager, as they discuss best practices for securing BYOD and third-party application access with Zero Trust.

    Join the conversation to learn:
    1. Zscaler’s Clientless access to private applications
    2. Best practices for securing BYOD
    3. How to provide fast, secure, local access to internal applications while simplifying the IT infrastructure

    You won’t want to miss this one. Register today.
  • Microsegmentation Made Easy with Identity and Automation. Recorded: Jun 9 2021 28 mins
    Peter Smith, Vice President of Secure Workload Communications at Zscaler
    Attackers exploit flat networks to move laterally inside cloud and data center environments. While microsegmentation can stop attackers, it has been impossibly complex for operations to deploy and manage until now. Learn how identity-based segmentation enables:

    1. 90% reduction in policies

    2. Requires no change to the network or the application

    3. Automated policy lifecycle using machine learning

    4. Zero trust security - see a firewall vs identity-based segmentation demo
  • Six Keys to Reducing Your Public Cloud Attack Surface Recorded: May 19 2021 49 mins
    Rich Campagna,SVP, Cloud Protection and Nagraj Seshadri,Sr. Director, Product Marketing Zscaler
    Public clouds have ushered in a new era of agility, scale, and performance for enterprise applications. But the DevOps culture driving these changes can also introduce risks. This webinar will focus on the six keys to reducing your public cloud attack surface while allowing your organization to innovate at the speed of cloud. The session will feature actionable advice that you can put into practice immediately, covering issues such as:

    1.Understanding the risk
    2.Securely configuring services
    3.Enforcing least-privileged access
    4.Applying identity-based micro segmentation
  • Lightboard Session: Enabling Digital Transformation Recorded: May 18 2021 45 mins
    Brian Deitch, Solutions Architect, Zscaler
    What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.

    Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Oct 29 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • 3 Common Mistakes to Avoid in Your Multi-Cloud Strategy Recorded: Oct 28 2020 36 mins
    Wolfgang Hustaedt, Solutions Architect, Zscaler
    Using more than one cloud provider is becoming the norm for enterprise architectures.

    But how will you provide unified access to them in a secure and reliable way?

    Learn how you can avoid the 3 common pitfalls of setting up a multi-cloud architecture. Furthermore, we will discuss ways you can provide access to multiple cloud environments, as well as the services in your own data center.
  • Three Ways ZTNA Protects Against Ransomware in 2020 Recorded: Oct 27 2020 28 mins
    Tony Fergusson, IT Infrastructure Architect, MAN Energy Solutions | Deepen Desai, VP of Security Research, Zscaler
    Ransomware is now using popular remote access VPNs as a Trojan horse to gain access to enterprise networks. This is frustrating for IT teams that are being asked to enable mobility for their users. Unfortunately, the technology they invested in to protect their business has been rendered obsolete.

    We understand. We’ve helped hundreds of companies embrace a new approach to remote access. In this session join our customer Tony Fergusson, IT Infrastructure Architect at MAN Energy Solutions, and the Zscaler team to learn:

    - How cyber criminals are exploiting remote access VPNs with ransomware
    - Why Gartner is recommending ZTNA (zero trust network access) to protect sensitive data
    - About best practices and hear real-world stories
  • Lightboard Session: Enabling Digital Transformation Recorded: Oct 22 2020 44 mins
    Brian Deitch, Solutions Architect, Zscaler
    What does safely exposing your internal applications to the Internet really mean? Why protect against SQLi, XSS, brute force, or credential stuffing from the open internet if you could just completely close every open door to it? The best breach prevention is to reduce your attack surface.

    Join Zscaler as we discuss zero trust application access and transparently protecting your work from anywhere users while inspecting their encrypted traffic.
  • How Gartner’s SASE will transform security in 2020 Recorded: Oct 6 2020 62 mins
    Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
    Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.

    The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).

    In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.

    Learn about:

    How SASE evolved to its current definition and the challenges it addresses
    The benefits of SASE deployments and how to get the most out of it
    The key benefits and pitfalls to be aware of when deploying a SASE solution
  • 3 Key Initiatives to Secure Your Remote Users in the Modern World Recorded: Oct 1 2020 35 mins
    Thomas Quinlan, Director of Solution Architecture, EMEA, Zscaler
    As users leave offices, and applications leave the data centre, the internet is becoming the new corporate network. Learn how you can utilise Gartner's SASE architecture to protect your users' access to the Internet and SaaS applications, wherever they may be - even when they're roaming.
    Learn how to take advantage of traffic forwarding (directly or with SDWAN) from fixed locations, how to enable roaming users to be secure and how to apply a consistent policy across the enterprise that follows each user.

    Zscaler provides Security as a Service to thousands of organisations worldwide, enabling them to leverage the latest in security technology, protecting users when accessing both the internet and their private applications.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Sep 29 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • Leveraging moving to the cloud to gain control of your apps and data Recorded: Aug 20 2020 41 mins
    Stan Lowe, Global Chief Information Security Officer, Zscaler
    For some organizations cloud moves can be a complex undertaking, we will discuss how to simplify this effort and leverage it to gain control and visibility into your applications and data.
  • COVID-19-themed Cyberattacks: What You Need to Know Recorded: Aug 18 2020 37 mins
    Deepen Desai, VP of Security Research, Zscaler
    Threat actors are leveraging fears and concerns around the COVID-19 outbreak to launch new attacks. With VPNs breaking from increased workloads forcing at-home workers to bypass traditional security controls, knowing what’s targeting your users during this critical time is more important than ever.

    Join this special Zscaler ThreatLabZ webinar to hear all about the latest COVID-19-related threats, and what you need to know to keep your at-home users safe.

    In this session, you’ll learn:
    - How threat actors are leveraging the COVID-19 pandemic
    - What top COVID-19 threats are targeting your users
    - New COVID-19 phishing and malware campaigns
    - What you can do to keep your at-home users safe
  • Secure SD-WAN without compromise Recorded: Aug 13 2020 44 mins
    Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak
    As applications migrate to the cloud and the world becomes increasingly mobile, organisations are embracing SD-WAN and cloud-based security as an alternative to cumbersome router-centric WANs and costly security appliances. Discover how secure SD-WAN can help enterprises achieve the full transformational promise of the cloud. 

    Join Andy Brown, Solutions Architect, Zscaler & Simon Pamplin, Director of Technical Sales, Silver Peak on the 12th May at 2pm BST to discover:

    - The challenges of legacy approaches to networking and security
    - Why shifts in traffic patterns and the fundamental nature of apps are forcing organisations to embrace new wide area network and security models
    - How the Silver Peak and Zscaler Secure SD-WAN solution delivers lower costs, simplified operations, and the highest quality experience for your IT organisation and end users
  • How Gartner’s SASE will transform security in 2020 Recorded: Aug 11 2020 62 mins
    Manoj Apte, Chief Strategy Officer, Zscaler & Dan Shelton, Director Transformation Strategy, Zscaler
    Doing business has significantly changed during the past decade. New digital business models empower companies to engage with customers and employees in ways that consistently deliver access to applications and services no matter where they are or what device they are using to access it.

    The traditional approaches of perimeter-based security no longer align with today’s business models. Instead, they increase cost and complexity while delivering a poor user experience. To address this ongoing challenge, Gartner has developed a new model of networking and security that matches these new requirements, called Secure Access Service Edge (SASE).

    In this webinar, we’ll discuss why Gartner has defined this new SASE architecture and how it will change IT.

    Learn about:

    - How SASE evolved to its current definition and the challenges it addresses
    - The benefits of SASE deployments and how to get the most out of it
    - The key benefits and pitfalls to be aware of when deploying a SASE solution
  • Enable Your Employees to Work from Home Quickly and Securely Recorded: Aug 5 2020 56 mins
    Jay Chaudhry, CEO Zscaler, Mike Towers,CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco
    Join Jay Chaudhry, CEO and founder of Zscaler and customers Mike Towers, CISO Takeda Pharmaceuticals and Alex Philips, CIO National Oilwell Varco as they share details on how to provide a productive and secure work-from-home experience for their employees:

    - How Takeda Pharmaceuticals International and National Oilwell Varco quickly enabled all its employees to work from home while keeping the organization secure.
    - How you can be up-and-running in a matter of days.
    - Requirements for enabling your team work from home.
    - How to apply some of the lessons learned as well as best practices.
  • The CIO Mandate for Secure Cloud Transformation Recorded: Jul 21 2020 59 mins
    Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, Managing Director at Cloud Security Zero
    The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that cling to legacy architectures put enterprises at risk. Secure Cloud Transformation is a practical cyber security approach that prioritises security and user performance to align with today’s way of working.

    The session will be hosted by Nathan Howe, Director Transformation Strategy at Zscaler, and Tony Fergusson, who will share experiences from his time at a manufacturing and transportation services company with 12,000 users in over 100 locations and 70 countries

    They will discuss how enterprise IT leaders can:

    • Improve customer digital experience while safeguarding sensitive information

    • Increase user performance while minimising risk

    • Drive revenue and scalability while controlling costs

    Are you ready for a secure cloud transformation? Sign up for this webinar today!
  • How to Fight What You Can't See: Advanced Threats in Internet Browsing Recorded: Jul 16 2020 52 mins
    Yogi Chandiramani - Zscaler | Lidor Pergament - Zscaler | Yohann Royer - Schneider Electric
    Threat actors are sneaking malicious content into encrypted traffic, making it difficult for enterprises to detect and prevent against threats.

    During this session, our experts will demonstrate on how to inspect encrypted traffic at scale and ensure best practice from a business and legal standpoint.

    We'll be featuring a case study from Schneider Electric.
Enabling the Secure Transformation to the Cloud
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant.

Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside.

By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: La ansatte jobbe hjemmefra etter Gartners SASE modell
  • Live at: May 28 2020 8:00 am
  • Presented by: Hans Thore Rafoss, Regional Sales Manager & Ole Kjos, Sales Engineer at Zscaler
  • From:
Your email has been sent.
or close