Hi [[ session.user.profile.firstName ]]

Did you say ZTNA? How to: Securing Cloud Access and Remote Collaboration

Given the requirement to secure access to cloud applications and data from anywhere, at any time, on any user device, today’s security practitioners are moving quickly to adopt Zero Trust Network Access (ZTNA) practices.

By engaging software-defined perimeters to enforce identity and context-aware access policies for applications and data residing in hybrid IT environments, organizations can better support the remote workforce, and use of both managed and unmanaged devices.
At the same time, this undertaking triggers a number of related challenges including:

- Creating granular, identity-driven access controls for applications access

- Invoking a data-centric, context aware approach to information protection

- Enabling application cloaking to prevent discovery on the public Internet

- Fostering access to legacy applications in conjunction with IAM and MFA

- Ensuring a consistent user experience across SaaS and private applications

Can your organization protect its crown jewels throughout all of its applications, including SaaS, to prevent lateral movement and potential data loss?

Join us for this hands-on, “how to” webinar focused on engaging ZTNA to solve VPN “implicit trust” challenges. We will also discuss how the CipherCloud Zero-Trust Remote Access solution addresses many of these pressing applications access and data security requirements.
Recorded Jan 28 2021 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mahesh Rachakonda, Vice President – Product & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
Presentation preview: Did you say ZTNA? How to: Securing Cloud Access and Remote Collaboration

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SolarWinds Lessons Learned: 4 Steps to Securing Office 365 and Connected Apps Recorded: Feb 11 2021 56 mins
    Mahesh Rachakonda, VP of Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Are your Office 365 accounts, cloud applications and data safe from further attacks?

    In the aftermath of the massive SolarWinds supply chain breach, the need to better secure Office 365 and connected cloud applications has become increasingly clear.

    Beyond the havoc wreaked by attackers who compromised SolarWinds’ Office 365 accounts to infiltrate those of its customers, other organizations have now discovered the same hackers targeting their Office 365 applications and data.

    How can we better understand and respond to this scenario?

    In this Best Practices, “Lessons Learned” webinar, we’ll outline 4 key steps necessary to better secure Office 365 and connected cloud applications, including:

    - Gaining contextual, device and user-based access control over applications and sensitive data

    - Monitoring user behavior with Machine Learning to identify evolving threats in real-time

    - Applying a layered approach to end-to-end cloud data protection, including DLP and EDRM

    - Enlisting highly granular, user and data-centric policies to optimize security and compliance

    We’ll also examine how this approach complements application of the MITRE ATT&CK Cloud Matrix and detail the ability of the CipherCloud CASB+ solution to address these pressing cloud and data security challenges.
  • Did you say ZTNA? How to: Securing Cloud Access and Remote Collaboration Recorded: Jan 28 2021 60 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Given the requirement to secure access to cloud applications and data from anywhere, at any time, on any user device, today’s security practitioners are moving quickly to adopt Zero Trust Network Access (ZTNA) practices.

    By engaging software-defined perimeters to enforce identity and context-aware access policies for applications and data residing in hybrid IT environments, organizations can better support the remote workforce, and use of both managed and unmanaged devices.
    At the same time, this undertaking triggers a number of related challenges including:

    - Creating granular, identity-driven access controls for applications access

    - Invoking a data-centric, context aware approach to information protection

    - Enabling application cloaking to prevent discovery on the public Internet

    - Fostering access to legacy applications in conjunction with IAM and MFA

    - Ensuring a consistent user experience across SaaS and private applications

    Can your organization protect its crown jewels throughout all of its applications, including SaaS, to prevent lateral movement and potential data loss?

    Join us for this hands-on, “how to” webinar focused on engaging ZTNA to solve VPN “implicit trust” challenges. We will also discuss how the CipherCloud Zero-Trust Remote Access solution addresses many of these pressing applications access and data security requirements.
  • SolarWinds Attack Response: Mitigating Connected Cloud Risks in Office 365 Recorded: Jan 14 2021 60 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Arguably the no. 1 takeaway for security practitioners analyzing the recent cyber attacks targeting SolarWinds and its use of the Microsoft Office 365 cloud platform is the need to employ stronger mechanisms to detect and respond to such cross-platform threats in real time.

    As demonstrated in this scenario, attackers’ abilities to compromise existing defenses and subvert access controls for Office 365 and other cloud platforms enabled them to infiltrate multiple organizations to execute potential data theft, all while remaining undetected. This was a particularly damaging technique given the “trusted connection” relationship existing between Office 365 and other clouds.

    To address this issue and increase the likelihood of identifying and preventing such threats - those that take advantage of pervasive risks directly related to complex ecosystems of cloud applications and infrastructure - practitioners clearly require centralized capabilities designed to pinpoint and mitigate cross cloud platform attacks.

    In this webinar, we’ll examine the specific steps that enabled attackers to gain access to Office 365 and leverage its connected cloud relationship with other applications to carry out their campaign. We will also highlighting key capabilities of the CipherCloud CASB+ that can help organizations address such conditions, including:

    - Monitoring of all 3rd-party applications connected to your cloud applications

    - Logging and reporting cross-cloud security events and impacts

    - Detecting unusual cloud activity and anomalous user behavior

    - Leveraging automated cloud anti-malware and APT prevention

    - Ensuring cloud data protection via E-DRM and other controls

    - Assessing and remediating risk in cloud applications configurations

    Join us for the timely best practices webinar aimed at helping you avoid costly breach incidents.
  • How Secure Are Your ServiceNow Workflows? Ensuring Data Privacy in the Cloud Recorded: Dec 15 2020 59 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    ServiceNow is a standard-bearer for transforming and modernizing business operations in the cloud, across a wide array of modules including IT Service and Operations Management, Human Resources, Customer Service Management, and Financial Management.

    Remote admins and users are connecting direct-to-net from insecure home network to access data in ServiceNow; in many cases using unmanaged devices. At the same time, as organizations embrace ServiceNow applications and send more of their sensitive data into the cloud - from employee PII, PHI, and other HR data, to ITSM records carrying detailed identifiable information attractive to potential attackers - the need for dedicated security, privacy, and compliance controls over the corporate blueprint has become increasingly clear.

    From the CIO and line of business officials, to the CISO and security teams tasked with protecting ServiceNow applications data, today’s practitioners require additional capabilities to ensure data privacy and answer key questions including:

    - How can I discover sensitive information existing in ServiceNow cloud to ensure compliance?

    - How can I enable visibility and control over sensitive data being uploaded, downloaded, and shared by ServiceNow users?

    - How can I provide Zero Trust access to the ServiceNow modules from any device and location?

    - How can I continuously assess, detect, and mitigate user risks within the ServiceNow environment?

    - How can I ensure end-to-end cloud data protection - both inside and outside of the ServiceNow environment?

    - How can I ensure data resident in ServiceNow is compliant with GDPR, CCPA, PCI, HIPAA, and other data protection laws?

    In this targeted best practices webinar, learn how security professionals are extending ServiceNow’s native security defenses through use of CASBs’ centralized cloud monitoring, Zero Trust access, data protection and compliance capabilities.
  • The Top Seven Tips for Securing SAP SuccessFactors Recorded: Nov 24 2020 48 mins
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Numerous organizations are turning to the SAP SuccessFactors platform to help “manage through disruption” by adopting capabilities spanning Talent Management, HR and Payroll, and related analytics, among others. At the same time, addressing any related risk or security exposure remains a top priority.

    To that end, companies deploying SAP SuccessFactors as their strategic HR and Human Capital Management platform must also include advanced cloud and data security capabilities to protect sensitive data, prevent data exfiltration and maintain regulatory compliance. That’s why leading IT Security and HRIS practitioners have turned to CipherCloud to provide the security, data protection and governance required when embracing cloud HR and HCM.

    In this best practices webinar, join CipherCloud as we highlight the Top Seven Tips for Securing SAP SuccessFactors, spanning key requirements including:
    - Maintaining continuous visibility into applications usage
    - Controlling access from trusted locations and devices
    - Maintaining optimized protection wherever data travels
    - Enforcing policies to ensure compliance [ex. GDPR]
    - Encrypting any protected data with full key control
    - Detecting threats including malware and compromises
    - Performing context-driven forensic investigation

    Register today to learn how the CipherCloud CASB+ solution can accelerate your organization’s use of SuccessFactors HR, Recruiting, Organizational Management and Payroll capabilities.
  • The Policy Predicament - Getting the Most out of Cloud DLP Recorded: Nov 5 2020 60 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Accelerated cloud adoption proved to be the biggest thing that ever happened to data loss prevention (DLP). With so much information finding its way into cloud applications, practitioners had to find a vehicle for active enforcement. In effect, strategic use of email, network, endpoint and other “on-prem” DLP finally became a reality, along with growing adoption of DLP capabilities designed specifically for the cloud.

    Fast forward and DLP has become the backbone of enterprise data protection. However, today’s mandate isn’t merely supporting growing cloud use - it’s about properly enlisting DLP in the cloud everything world. As such, actionable DLP policies must account for a huge range of complicated scenarios across cloud-based email, file-sharing, image scanning and collaboration - addressing a nearly endless array of business workflows, users and devices.

    So how do organizations effectively tackle this evolving cloud DLP policy challenge?

    In this best practices webinar learn how centralized DLP policies can be architected to:
    - Identify and classify data across any apps including Office 365, Box, SAP and more
    - Support complex workflows including multi-organization cloud collaboration
    - Enact multi-step enforcement for both managed and unmanaged devices
    - Address compliance across standards including GDPR, PCI, SOX and HIPAA
    - Weave traditional and cloud DLP policies into consistent, centralized data protection

    If your organization is working to extend its cloud DLP policy expertise - register today to learn how a unified approach including the CipherCloud CASB+ platform, can help.
  • Reinventing Data Security for the Remote Workforce in A “Cloud First” World Recorded: Oct 13 2020 61 mins
    Sundaram Lakshmanan, CTO, CipherCloud & Matt Hines, VP and Evangelist, CipherCloud
    If the overnight expansion of the remote workforce has taught us one lesson, it is that improving data protection for cloud apps has become the primary challenge facing today’s security practitioners. 

    In fact, one might easily conclude that - based on the massive strategic benefits appreciated by increased cloud adoption and remote access - in the very near future many organizations may seek to offload responsibility for just about every manner of security, save user and data-centric protection. So what does this mean for security architects, management and operational staff as we move quickly toward that “cloud everything” future? 

    Clearly, organizations will require stronger methods for protecting cloud data, along with user and device access when traditional network, hardware and app stack defenses have become largely outmoded. Further, as more users log into the cloud to collaborate via both managed and unmanaged devices, extended cloud security capabilities will need to account for key considerations including:

    - How to protect against inappropriate data access and handling while enabling open shares across the huge range of sensitive company data?

    - How to account for user and device security posture to thwart emerging threats that seek to exploit compromised accounts and endpoints?

    - How to ensure proper enforcement and remediation when issues do arise, including the ability to encrypt or wipe information as it moves off the cloud?

    In this best practices webinar, join us to discuss the hugely important challenge of addressing the confluence of cloud, user, data, and device security in the name of enabling the real-time collaboration required by today’s remote workforce. Along with the involved challenges and use cases, we’ll outline dedicated CASB solutions use cases and best practices that address this specific set of real-world challenges.
  • Safeguarding FinTech Data in the Cloud to Enable the Remote Workforce Recorded: Oct 1 2020 55 mins
    Fazal Sadikali, Managing Partner at Cloud Insights and Sanjay Chetwani, Senior Director, Alliances & OEM at CipherCloud
    With COVID-19 fundamentally changing the manner in which today’s Financial Services organizations do business - driving further uptake of the cloud and expansion of the remote workforce-related data security considerations abound.

    As practitioners seek to enable critical business services while accounting for cloud apps and information accessed by both managed and unmanaged devices, related data protection practices must be adapted quickly. Today’s FinTech organizations are specifically challenged to invoke consistent controls to safeguard cloud data among both internal users and business partners while also ensuring compliance with the wide array of applicable industry standards - including GLBA, PCI-DSS, Sarbanes-Oxley, Dodd-Frank, GDPR and CCPA, among others.

    To advance your understanding of proven cloud data security and compliance best practices, supported by key technical capabilities spanning every requirement from classification to enforcement, join industry experts CipherCloud and CloudInsights for a webinar that addresses key questions including:
    - How can sensitive FinTech data be effectively identified and classified in the cloud?
    - What data protection techniques can be applied to secure and obfuscate that information to prevent data loss?
    - Which controls can be used to meet the regulatory, data privacy, and data protection requirements for FinTech data hosted in the cloud?

    Register today for this targeted FinTech data security event.
  • 5 Steps to Improving Data Protection for Salesforce, ServiceNow and Workday Recorded: Sep 17 2020 59 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Enterprise SaaS apps including Salesforce, ServiceNow, and Workday, among many others, provide critical services to millions of today’s organizations, automating and streamlining workflows while enabling real-time collaboration from any location.

    At the same time, related incidents such as the much-publicized Equifax data breach, continue to create concern as practitioners seek additional security capabilities and best practices that go beyond SaaS apps’ native security controls. Organizations need reassurance that they can apply a zero trust approach to securing cloud information, services and access, invoking layered defenses to prevent against potential threats and data exposure.

    In this best practices webinar, we’ll cover many of the leading SaaS apps security challenges facing today’s organizations, along with key steps that practitioners can utilize to rapidly improve their overall security standing. We’ll specifically dive in to the advanced capabilities of Cloud Access Security Broker (CASB) technologies in addressing these requirements and highlight how the CipherCloud CASB+ platform addresses pertinent questions including:

    - How do I gain 360-degree visibility into cloud user activity, including file uploads and information sharing?
    - How do I detect suspicious user behavior and prevent data loss due to compromised accounts or insider threats?
    - How do I detect and protect sensitive information such as PII, PCI, and PHI data as it travels across cloud apps?
    - How do I differentiate managed and unmanaged devices to enable secure data access and collaboration?
    - How do I ensure compliance with the latest data protection laws such as GDPR, CCPA, and HIPPA?

    Register today to gain valuable insights and best practices for securing your company’s data in leading enterprise SaaS applications.
  • Best Practices: Operationalizing Security for O365 Collaboration Recorded: Sep 3 2020 51 mins
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    With the remote workforce becoming the norm for many organizations and adoption of Microsoft’s Teams and Office 365 platform growing at a furious pace, today’s security practitioners face a complex set of challenges as they seek to enable cloud collaboration while protecting sensitive data.

    In this informational webinar, learn how today’s leading-edge CASB solution empowers security operations teams to keep up with the pace of O365 deployment, offering a single pane of glass for email and collaboration security, along with related compliance. By delivering the full breadth of O365 monitoring, data in motion and enforcement capabilities, we’ll detail how CipherCloud CASB+ addresses critical capabilities including:

    - Securing data in Teams Channels and Chats, along with O365 email
    - Utilizing integrated DLP and IRM with multi-level policy enforcement
    - Detecting anomalous user behavior and enabling response
    - Leveraging Data Discovery to ensure data privacy and compliance.
    - Expanding policies across multiple cloud apps and platforms

    Register today for this O365 secure collaboration best practices webinar.
  • How To: Enabling Data Protection and Compliance in the G Suite Environment Recorded: Aug 6 2020 53 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    With over 2 billion active users, including a growing number of enterprises, G Suite is here to stay as cloud productivity and collaboration suite. Yet, even as today’s organizations wrap their arms around the platform, related data security and compliance concerns abound.

    As workers embrace G Suite to access and share confidential information - and connect with other users across your partner ecosystem - ensuring consistent data protection and regulatory compliance is no simple task. Without the right set of integrated security capabilities and unified policies, it’s difficult to maintain visibility and control.

    Join us at 9 am PDT on August 6, 2020, for a live webinar discussion that details “How To: Enabling Data Protection and Compliance in the G Suite Environment” - focusing on issues including:

    - Gaining 360-degree visibility into G Suite user activity and related data risks
    - Protecting sensitive information or file shares containing PHI, PCI or PII data
    - Applying digital rights management during downloads and offline shares
    - Enabling consistent policies for all G Suite emails, files, and messages
    - Addressing global compliance and data residency requirements

    In addition to highlighting common challenges and emerging best practices, we’ll demonstrate how CipherCloud CASB+ enables adaptive security and continuous governance that meets your organization’s growing G Suite requirements.
  • Using Data Security as a Service (DSaaS) to Transform Information Protection Recorded: Jul 23 2020 74 mins
    Fazal Sadikali, Managing Partner at Cloud Insights and Sanjay Chetwani, Senior Director, Alliances & OEM at CipherCloud
    Just as high-profile cyberattacks continue to evolve and challenge even the most capable IT security practitioners, defensive capabilities are also advancing to offer previously unavailable levels of information protection.

    So what’s the next great leap forward in enterprise data security?

    Enter DSaaS – or Data Security as a Service.

    Rapidly emerging cloud capabilities offer IT pros an ever-expanding array of options for speeding applications delivery – most often through use of APIs. In the same manner, DSaaS employs advanced API functionality to streamline critical elements of data protection and compliance – across core requirements spanning data encryption, masking and rights management.

    In this CipherCloud webcast, learn how DSaaS can help your organization address data security issues at the source – regardless of cloud, application or device. We’ll detail highly compelling promises of DSaaS including:
    - How DSaaS allows you to secure any data set (including PII, PHI, and more) through a frictionless API at the application level.
    - How DSaaS provides a compelling model to secure unstructured data in the expanding mobile, remote workforce.
    - How your business can use DSaaS to integrate advanced data security practices, despite business model complexity.

    Gone are the days of increased deployment complexity at higher technology stack levels. Join us for this webcast on July 23, 2020, at 9 AM PDT where the team at CipherCloud has invited Fazal Sadikali, Managing Partner at Cloud Insights a seasoned expert in cloud security domain to share his view and thesis as well as possible state of the future data security approaches, and learn how DSaaS capabilities – offered on-demand, as a service, at a highly consumable pricing model – provide a new engine for IT and data security transformation.
  • Identify and remediate misconfigurations in Salesforce and Office 365 Recorded: Jul 9 2020 35 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engineering at CipherCloud
    Cloud adoption is on the rise. Organizations are tapping to the unlimited supply of on-demand servers and services for business transformation and remote collaboration at reduced operational expenditure.

    But the skillset of IT teams is unable to match an organization's growing cloud portfolio. Difficulty in maintaining simultaneous visibility across all cloud apps creates a huge security gap, leaving the clouds susceptible to threats and breaches due to security and access misconfigurations.

    Join us for a webinar session on July 9, 2020, at 9 AM PDT to understand how CipherCloud’s Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) perform an automated assessment of your IaaS and SaaS landscape against well-defined security guidelines, reducing the operational complexity in managing multiple apps, preventing data loss from misconfigurations and ensuring compliance in a multi-cloud environment.
  • CASB Best Practices 101: Securing Emails and Messaging Apps Recorded: Jun 18 2020 35 mins
    Salah Nassar, Vice President of Marketing at CipherCloud and Neeraj Nayak, Sr. Manager, Product Marketing at CipherCloud
    With the growing popularity of SaaS applications and remote working becoming a norm, it has never been more important to secure collaboration over popular cloud-based email and messaging apps - Microsoft Outlook, Teams, Slack and Gmail, and prevent confidential information from falling into the wrong hands.

    Join us for an exciting webinar session on June 18, 2020, at 9 AM PDT to get valuable insights on the industry’s first email information protection solution integrated within a CASB. CipherCloud's Secure Email Gateway enables you to build cyber defenses across your cloud-mobile environment, with a holistic solution for SaaS governance and email security.

    Key webinar topics include:
    - Real-time detection and protection of sensitive content shared through emails
    - Preventing data leaks through accidental email forwards
    - Enabling secure collaboration over emails and messaging apps, with complete data and user visibility
    - Demo: Secure collaboration in Office 365 using CipherCloud's Secure Email Gateway
  • CASB Best Practices 101: How to prevent data breaches and ransomware? Recorded: Jun 11 2020 37 mins
    Salah Nassar, Vice President of Marketing at CipherCloud and Rob Ayoub, Senior PMM Cloud Detection Products, FireEye
    In today's Mobile-SaaS-Remote Environment and the increased reliance on cloud collaboration, maintaining visibility and protection of sensitive data has never been more important.

    In the new COVID-19 realities of remote work, many organizations have expedited their adoption of cloud apps such as Office365, Box and Slack and in turn greatly increased their threat vector specifically for data breaches and ransomware. Solving for this new risk requires a multifaceted security approach - data protection and threat prevention.

    In this webinar, FireEye’s Rob Ayoub and CipherCloud’s Salah Nassar will discuss and share prescriptive advice and best practices that every organization can start using immediately.
  • Secure sensitive financial data in the cloud from unmanaged device access Recorded: May 21 2020 63 mins
    Salah Nassar, VP of Marketing at CipherCloud and Mahesh Rachakonda, VP of Product & Solution Engineering at CipherCloud
    The continued increase in the number of unmanaged devices accessing enterprise cloud apps and email clients (Outlook, Gmail) have surged exponentially in the new normal. With a growing remote workforce, controlling access permissions for unmanaged devices is the way forward to protecting sensitive data while ensuring productivity doesn't take a hit. The need of the hour is a human-centric and identity-centric approach to cloud security.

    In this webinar, we will discuss how CipherCloud's cloud-native security solutions allows organisations to classify between a personal and an enterprise-owned device connecting to the SaaS apps from remote locations, providing 360-degree visibility into the user activity. The webinar will also focus on data protection through contextual access to the cloud resources, enabling secure remote collaboration.
  • Intelligence Led Threat Protection For SaaS-Mobile Environments Recorded: May 6 2020 60 mins
    Rob Ayoub, Sr. Product Marketing Manager, FireEye; Salah Nassar, VP of Marketing, CipherCloud, Inc.
    The continued migration to the cloud and the unprecedented rise in the number of employees working from home has created challenging security implications, leaving many organizations scrambling to gain needed visibility and control into their SaaS/Cloud usage. With employees working remotely, SOC teams need to see threats wherever their companies do business and the ability to reduce those threats as quickly as possible.

    In this webinar, we will discuss how FireEye’s detection capabilities can be combined with CipherCloud to stop malicious content from being shared.

    Register Now!
  • A Cloud-First Security Architecture – Secure Access Service Edge (SASE) Recorded: Apr 16 2020 46 mins
    Salah Nassar, Vice President of Marketing at CipherCloud and Neeraj Nayak, Sr. Manager, Product Marketing at CipherCloud
    The continued migration to the cloud and the unprecedented rise in the number of employees working from home has created challenging network and security implications, leaving many organizations off-guard on how to architect a network and security deployment that protects from breaches while maintaining business continuity. With employees working remotely, sometimes using BYO devices, connecting from unsecured networks directly to cloud applications that contain the organizations’ crown-jewels, many organizations don’t know where to begin.

    In this webinar, we will discuss how Secure Access Service Edge, or SASE, can help organizations build a framework that provides the security and network architecture that supports the emerging cloud-mobile environment.
  • Managing Cloud Security Risks in a Remote Workforce Environment Recorded: Apr 15 2020 31 mins
    Salah Nassar, Vice President of Marketing at CipherCloud and Neeraj Nayak, Sr. Manager, Product Marketing at CipherCloud
    Many organizations are moving at a rapid pace to maintain business continuity and turn on cloud apps to support the remote workforce. Security controls should not hinder or slow down the deployment process however it has to solve the main problems caused – reducing threats, exposure to data leaks, and maintaining compliance.

    This webinar focuses on all the burning issues relevant to securing a remote workforce and tangible steps to ensure visibility, control and protection of the remote workforce and cloud apps.

    This webinar will provide insights to:
    - Cloud security challenges in a remote workforce environment
    - Secure adoption of cloud applications while enforcing strong policies, protecting data, maintaining data privacy and regulatory compliance requirements
    - Healthcare university supporting the deployment of Office 365 case study
  • The Coronavirus pandemic impact on Healthcare Data Security - Case Study Recorded: Mar 26 2020 56 mins
    Salah Nassar, VP of Marketing at CipherCloud and Mahesh Rachakonda, VP of Product & Solution Engineering at CipherCloud
    The COVID-19 outbreak has severely hampered the business continuity of the healthcare industry. As a result of the pandemic, many have adopted a work-from-home policy for all non-patient facing workers to prevent exposure to the coronavirus. The sudden influx of remote workers has put a strain on existing network infrastructure, leaving many with sub-par connectivity. Furthermore, remote workers are connecting direct-to-net and using SaaS apps to continue their day-to-day operations; in many cases using unmanaged devices possibly leading to data and compliance breaches.

    Join us for a live webinar discussion on March 26, 2020, at 10 am PDT where our industry experts will provide insights on leveraging cloud-based security for HIPAA compliance while working from home using personal devices. Key webinar topics include:
    - Remote user support to safely access and share sensitive data securely
    - Protect PHI/PII/PCI data on home computers, BYOD and unmanaged devices
    - Securely adopt cloud applications while maintaining HIPAA/PCI and other regulatory compliance
    - Maintain business continuity while scaling to thousands of remote users
Webinars on Zero-Trust Cloud Security and Data Protection
Updates and discussions on latest cloud security trends and CipherCloud CASB offerings for zero-trust cloud security, presented by industry leaders and subject matter experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Did you say ZTNA? How to: Securing Cloud Access and Remote Collaboration
  • Live at: Jan 28 2021 5:30 pm
  • Presented by: Mahesh Rachakonda, Vice President – Product & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
  • From:
Your email has been sent.
or close