Managing Compliance and Security in the Cloud

Presented by

Benny Czarny, Tzach Horowitz, Ariel Zeitlin, Diana Kelley

About this talk

"In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever. Join cloud, security and compliance experts as they discuss: - How to proactively analyze security risk from the business perspective - What you need to know about your data, and how to ensure it is compliant when in the cloud - How to automate security policy changes - Top challenges for CISOs and CIOs - Achieving security and compliance across multiple clouds - Steps to take today" Presenters Benny Czarny, CEO and Founder, OPSWAT Tzach Horowitz, Pre-Sale Director, Cybergym Ariel Zeitlin, CTO and co-founder, Guardicore Diana Kelley, Cybersecurity Field CTO, Microsoft

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (1469)
Enterprises today are beset by cyber attacks. Threat actors send attacks through any channel they can, and meanwhile, the cost of compromise is only going up. To solve the challenges faced by modern enterprises and to shut off major attack vectors, we offer two product platforms: MetaDefender for threat prevention and MetaAccess for cloud access control and endpoint compliance. Our guiding principles: Trust No File. Trust No Device. Why MetaDefender? Enterprises are investing more resources than ever in cyber security – and yet there are more and larger breaches every year. Thousands of threat prevention solutions are on the market, but most of them share one crucial flaw: they are based on detection, but detection is never 100% perfect. That's why our advanced threat prevention platform, MetaDefender, is not only based on detection. MetaDefender uses OPSWAT's unique data sanitization (Content Disarm and Reconstruction) to remove threats from files altogether by reconstructing the files and, in the process, stripping out potentially malicious active content and scripts. MetaDefender complements data sanitization with multi-scanning and vulnerability assessment. Why MetaAccess? The move by enterprises to cloud computing, SaaS applications, and bring your own device (BYOD) environments over the last decade has eliminated the traditional network perimeter, making most network access control (NAC) solutions obsolete. To meet the challenges of modern cloud-based environments and provide administrators with an access control solution for the cloud, we built MetaAccess. MetaAccess keeps SaaS applications and cloud data safe and secure. It allows access based on device health and compliance to help administrators block risky devices from connecting to sensitive cloud data and SaaS applications.