Trust no device: how to achieve device security and compliance.

Presented by

Yiyi Miao, VP of Products & Mike Goldgof, VP of Marketing - Opswat

About this talk

As more web applications move to the cloud and more unmanaged devices access corporate resources, the network perimeter has all but disappeared. Yet most existing solutions have been designed to work with traditional network infrastructure. The result is increased data breaches. Learn from domain experts at OPSWAT about how the new Zero Trust model applies to device visibility and control, and how organizations must adapt their security policies to mitigate the risks associated with a perimeter-less network, including corporate data leakage, data privacy and regulatory compliance. In this session you will learn: 1.How security for the perimeter-less network differs from traditional networks – Why are traditional security policies no longer effective with the rise of bring-your-own-devices (BYOD) and the use of cloud solutions? 2.The top six security challenges in a perimeter-less network – Using real-word examples, we will share the top six security challenges of perimeter-less networks, including endpoint misconfiguration, vulnerabilities, device ownership and malware. 3.The practical steps that organizations can take to mitigate these security risks – We will discuss policies and technologies that organizations can harness to secure access to corporate data in a perimeter-less network.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (1469)
Enterprises today are beset by cyber attacks. Threat actors send attacks through any channel they can, and meanwhile, the cost of compromise is only going up. To solve the challenges faced by modern enterprises and to shut off major attack vectors, we offer two product platforms: MetaDefender for threat prevention and MetaAccess for cloud access control and endpoint compliance. Our guiding principles: Trust No File. Trust No Device. Why MetaDefender? Enterprises are investing more resources than ever in cyber security – and yet there are more and larger breaches every year. Thousands of threat prevention solutions are on the market, but most of them share one crucial flaw: they are based on detection, but detection is never 100% perfect. That's why our advanced threat prevention platform, MetaDefender, is not only based on detection. MetaDefender uses OPSWAT's unique data sanitization (Content Disarm and Reconstruction) to remove threats from files altogether by reconstructing the files and, in the process, stripping out potentially malicious active content and scripts. MetaDefender complements data sanitization with multi-scanning and vulnerability assessment. Why MetaAccess? The move by enterprises to cloud computing, SaaS applications, and bring your own device (BYOD) environments over the last decade has eliminated the traditional network perimeter, making most network access control (NAC) solutions obsolete. To meet the challenges of modern cloud-based environments and provide administrators with an access control solution for the cloud, we built MetaAccess. MetaAccess keeps SaaS applications and cloud data safe and secure. It allows access based on device health and compliance to help administrators block risky devices from connecting to sensitive cloud data and SaaS applications.