Hi [[ session.user.profile.firstName ]]

Securing On Premises Private Apps From Anywhere Without VPN

On-premises software's delivery model that is installed and operated from the in-house server and computing infrastructure. On average, government agencies have hundreds of private line of business applications running on-premises via either web-based or non-web protocols. In this BrightTALK session, we will be sharing the Secure Application Access (SAA) use cases from a public sector customer.

Airgap Secure Application Access (SAA) provides a single source of secure connectivity to private applications hosted in hybrid-cloud environments and multi-cloud IaaS such as AWS, Azure, and GCP.

Your remote and on-premises workforce needs access to business applications and company resources to work effectively. SAA helps IT security teams balance just the right amount of access yet maintain a high level of security and visibility into user activity. In addition to the obvious security benefits, the SAA offers detailed session logs, session recording, and audit control capabilities to ensure that you meet necessary compliance requirements.

SAA integrations with popular identity providers (Okta, Azure AD, GSuite, others) enable IT security to apply zero-trust principles to remote user access, enforcing continuous user identity verification and access authorization for every request made. While adopting a zero-trust framework closes the security gaps of too much network exposure enabled by legacy VPN solutions.
Recorded Sep 17 2021 13 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeff McDaniel
Presentation preview: Securing On Premises Private Apps From Anywhere Without VPN

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero Trust Security at the Edge for Anywhere Asset Access Oct 22 2021 3:00 pm UTC 30 mins
    Airgap Networks
    Robust and secured internet connectivity is essential to delivering on the promises of anywhere workforce. From defining the scope of experience across the workforce to protecting privileged and administrative access, a new zero trust security mindset is required from the browser to the critical asset. How do you achieve this agenda without the need of VPN?

    This session will help you understand how security at the edge combined with robust private application access management and secured browser solutions enable the security outcomes essential to anywhere workforce.
  • Protect Against Catastrophic OT ICS Cyber Attacks Recorded: Oct 13 2021 35 mins
    Airgap Networks
    The growing interconnectedness with increasing application of smart technology and devices means the risk of cyberattacks is rapidly growing.

    According to Forbes, in related sectors like automobiles, manufacturing, and tech farming (or AgriTech) awareness of cyber risk is growing and many automakers now court the attentions of cybersecurity professionals with private and public bug bounty programs. In recent years, manufacturers like GM and Ford have had CVEs issued for connected vehicle systems, though not all carmakers have CVEs to their name.

    In this episode of Ransomware Battleground, Higgs and Syya will dive right into the source of the discovery and share with Airgap’s audience on the recent TechFarming exploits. Also explain how a solution like Ransomware Kill Switch™ can service as your first responders when your organization is compromised. Join Us.

    Airgap provides an agentless Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device-to-device and device-to-application communication.
  • Zero Trust Security Explained by Dr. Chase Cunningham Recorded: Oct 8 2021 19 mins
    Dr. Chase Cunningham
    We all know it is not enough to manage your enterprise network by legacy firewall rules and packet analysis. For an education session, we will have Dr. Chase Cunningham provides updates on what we all observe in zero trust security and share his view on:
    - What is Zero Trust Security?
    - Challenges of Zero Trust?
    - What is in NIST 800-207? How do you use in the Cloud-First architecture?
    - Core Principles in Zero Trust Model
    - Leverage preventive security solutions and tips for achieving Zero Trust
    - Zero Trust and Anywhere (Hybrid) Workforce
    - How Airgap Zero Trust Isolation can help (Zero Trust Isolation and Secure App Access)

    Airgap provides an agentless Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device-to-device and device-to-application communication.
  • From NIST to CMMC: Stay Ahead of OT Cybersecurity Threats Recorded: Oct 1 2021 14 mins
    Airgap Networks
    "Industry 4.0" operational technology (OT) aims to increase automation, add “smart” devices, make data analytics more efficient and available, and interconnect networks for convenience. Cyber criminal’s latest target is on your operational technology (OT) and the attack incidents can be more destructive as well.

    Can your team stay ahead of today’s advanced hackers by strengthening your cyber risk incident response and management against OT cybersecurity threats?

    In this BrightTALK, we will be sharing the challenges the manufacturing vertical faces for IT/OT network segmentation to avoid a catastrophic shutdown when under attack.

    To get a copy of NIST / CMMC guideline, please contact info@airgap.io or visit airgap.io website.
  • Securing On Premises Private Apps From Anywhere Without VPN Recorded: Sep 17 2021 13 mins
    Jeff McDaniel
    On-premises software's delivery model that is installed and operated from the in-house server and computing infrastructure. On average, government agencies have hundreds of private line of business applications running on-premises via either web-based or non-web protocols. In this BrightTALK session, we will be sharing the Secure Application Access (SAA) use cases from a public sector customer.

    Airgap Secure Application Access (SAA) provides a single source of secure connectivity to private applications hosted in hybrid-cloud environments and multi-cloud IaaS such as AWS, Azure, and GCP.

    Your remote and on-premises workforce needs access to business applications and company resources to work effectively. SAA helps IT security teams balance just the right amount of access yet maintain a high level of security and visibility into user activity. In addition to the obvious security benefits, the SAA offers detailed session logs, session recording, and audit control capabilities to ensure that you meet necessary compliance requirements.

    SAA integrations with popular identity providers (Okta, Azure AD, GSuite, others) enable IT security to apply zero-trust principles to remote user access, enforcing continuous user identity verification and access authorization for every request made. While adopting a zero-trust framework closes the security gaps of too much network exposure enabled by legacy VPN solutions.
  • Protect Your Applications and Data from Ransomware Threats Recorded: Sep 3 2021 37 mins
    Ritesh Agrawal, CEO, Airgap Networks
    Typical enterprise attack surface has dramatically increased post COVID19. Employees, contractors, and vendors have access to enterprise crown jewels over legacy and insecure VPN technology for their respective home environments. It is no wonder that we are witnessing a rapid increase in cyber crimes in the last 18 months. Is protecting your application and data your top priority? If so, please join us in the session to understand the threat landscape and various technology options to safeguard your assets.

    We believe the fundamental issues faced by the organizations relate to excessive trust relationships over VLANs and VPNs. For better security, we must ensure that every transaction is authorized and authenticated and we must make this happen without the need for a bunch of legwork.

    Join us and learn more about our point of view on how you can protect your assets without the forklift upgrades. Ritesh Agrawal, Co-Founder and CEO of Airgap Networks will be discussing industry leadership and technology overview including the following -
    How does the modern Application Access approach compare to the traditional remote access VPN?
    What’s the best method to deploy and operate Universal Secure Access Solution?
    How to apply zero trust principles, specially for legacy protocols such as SSH, SMB, WMI, RDP etc. ?
    What’s the importance of SSO/MFA authentication coupled with intent check?
    Walkthrough (Demo) real-world use cases across private and public sectors.
  • Ransomware Battleground: Tractorloads of Vulnerabilities Recorded: Aug 26 2021 39 mins
    Higinio Ochoa Syya Yasotornrat
    The growing interconnectedness with increasing application of smart technology and devices means the risk of cyberattacks is rapidly growing.

    According to Forbes, in related sectors like automobiles, manufacturing, and tech farming (or AgriTech) awareness of cyber risk is growing and many automakers now court the attentions of cybersecurity professionals with private and public bug bounty programs. In recent years, manufacturers like GM and Ford have had CVEs issued for connected vehicle systems, though not all carmakers have CVEs to their name.

    In this episode of Ransomware Battleground, Higgs and Syya will dive right into the source of the discovery and share with Airgap’s audience on the recent TechFarming exploits. Also explain how a solution like Ransomware Kill Switch™ can service as your first responders when your organization is compromised. Join Us.

    Airgap provides an agentless Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device-to-device and device-to-application communication.
  • Ransomware Kill Switch Demo with Jeff McDaniel Recorded: Aug 20 2021 19 mins
    Jeff McDaniel
    How do you reduce the blast radius in real-time? Looking for the easy button to stop ransomware spread? Is Ransomware KIll Switch too good to be true? Join Jeff and Chuck on this replay of our BlackHat USA 2021 Live. Jeff will go over how Ransomware Kill Switch can control Ransomware attack surfaces with DEFCON-like risk control.
  • 3 Key Ingredients for Endpoint Resilience Recorded: Aug 18 2021 26 mins
    Vinay Adavi, CPO, Airgap Networks
    Zero Trust adheres to the principle, "Never trust, always verify." The modern enterprise has an incredible diversity of endpoints accessing data. Not all endpoints are managed or even owned by the organization, leading to different device configurations and software patch levels. This creates a massive attack surface and, if left unresolved, accessing work data from untrusted endpoints can easily become the weakest link in your Zero Trust security strategy. In this BrightTALK, Vinay Adavi (CPO of Airgap Networks) will walk through the key ingredients you should consider to secure your endpoint with identity based segmentation. Also he will be explaining to the audience how the EDR solution partnership can provide the fork-lift free transformation into the Zero Trust Endpoint deployment.
  • Finding the Balance: Cyber Insurance and Ransomware Incident Mitigation Recorded: Aug 13 2021 26 mins
    Ritesh Agrawal and Zack Atya
    Cybersecurity insurance is not a cybersecurity strategy. While there is no way to 100% protect a company’s business operations, data, and IP from cyber threats, there are ways to mitigate risk through a cybersecurity initiative focused on people, processes, and technology. Start with Zero Trust and security-first design principle with Airgap.

    At the heart of this initiative are three basic fundamentals: an understanding of what needs to be protected, the value associated with these assets, and the company’s overall risk tolerance. These drive the rightsizing of company’s cybersecurity strategy to safeguard its assets and reputation.

    In this session, Airgap CEO Ritesh Agrawal and our partner in cyber insurance will discuss how you can strike the balance to secure your enterprise networks with Airgap Ransomware Kill Switch.

    Airgap provides an agentless Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device-to-device and device-to-application communication.
  • Ransomware in Manufacturing: IT, OT, and IOT Convergence Recorded: Jul 23 2021 29 mins
    Dr. Chase Cunningham and SecurView
    IT/OT convergence in manufacturing drives Industry 4.0 and uses the data from IT to inform or influence the actions of OT, the technology used in physical operations such as robots, industrial control systems and sensors. How do you cut the interdependencies and isolate the networks in the wake of Cyber Attacks? In this BrightTALK, we will focus on Ransomware defense and Ransomware Kill Switch use cases to minimize the attack surface for manufacturing going through Industry 4.0 and digital transformation. Join Us.

    Ransomware threat is growing rapidly. While there are a whole bunch of security companies that are trying to prevent ransomware from getting into your network, Airgap's "Zero Trust Isolation Platform" protects your organization even if your perimeter is breached or if you have unpatched vulnerable servers inside your data center. Additionally, Airgap’s “Ransomware Kill Switch” is the most potent ransomware response for the IT organization. Airgap can be deployed in minutes without any agents, forklift upgrades, or design changes. The company is founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io
  • Red Team v.s. Blue Team: How does Incident Response work? Recorded: Jul 21 2021 30 mins
    Higinio Ochoa
    Red team and blue team play an important role in defending against advanced cyber attacks that threaten business communications. In this special episode of Ransomware Battleground, we talk through the flow in incident response per cyber kill chain.

    Ransomware Kill Switch™ can be used by the incident response to control/contain the blast radius in real time using the preventive and proactive zero trust approach. However, when the detections failed on zero day exploits, how can you use Ransomware Kill Switch™ in the post exfiltration mitigation phase?

    Airgap provides an agentless Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device-to-device and device-to-application communication.

    To schedule a demo, please visit https://airgap.io
  • Kaseya Ransomware Attack and Incident Response with Ransomware Kill Switch Recorded: Jul 12 2021 39 mins
    Airgap Networks
    Kaseya Ltd. is a Miami-based company that provides software to help other businesses manage their networks. The hackers targeted Kaseya’s virtual systems/server administrator (VSA), a type of software that large companies and technology-service providers use to manage and send out software updates to systems on computer networks. The hacks are caused by cybercriminals who acquired and used zero-day vulnerabilities. What do we know about REvil's behavior pattern in this incident? What can you do when your detection solution failed?

    In this BrightTALK, we will demonstrate the post-ransomware incident use cases and how you can automate in-network detection and Ransomware incident response to isolate inside the enterprise network.

    The integrated Zero Trust enterprise access solution provides organizations an advanced level of visibility and turns every connected endpoint into a Zero Trust endpoint to stop Ransomware lateral movement before they spread.

    Hear how our joint solution can provide your organization:
    * Advanced Ransomware detection and incident response with of Ransomware Kill Switch™
    * Consolidated SOC threat intelligence and analytics
    * End to end visibility and intelligence into malware behaviors

    Airgap provides an agent-less Anti-Ransomware platform to stop the spread of malware in the enterprise network. Our industry’s first Ransomware Kill Switch™ locks down your most critical network assets at the first indication of compromise with complete control and policy enforcement over the device--device-application communication. Visit us at Black Hat 2021 USA in Vegas or Virtual. For expo passes, contact info@airgap.io.
  • Ransomeware Vulnerability Scanner Explained: What and How? Recorded: Jun 17 2021 24 mins
    Airgap Networks
    Lateral movement is a key tactic that distinguishes today’s advanced persistent threats (APTs) from simplistic cyberattacks of the past. The attack on JBS was part of a wave of incursions using ransomware, in which companies are hit with demands for multimillion-dollar payments to regain control of their operating systems. And yet, there is no guarantee that the hackers wouldn’t find another way to strike. (WSJ)

    Lateral movement refers to the techniques that a cyber attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets. After entering the network, the attacker maintains ongoing access by moving through the compromised environment and obtaining increased privileges using various tools. How do you see the vulnerabilities in advance? In this talk, we will introduce the Ransomware Vulnerability Scanner, a free network scanner at https://airgap.io, and help you stay ahead of adversaries. See it and fix it today!
  • Power-Boost Ransomware Incident Response with Ransomware Kill Switch Recorded: Jun 9 2021 27 mins
    Airgap Networks
    Organizations of all sizes can be the target of ransomware. Cyberattacks continue to be one of the biggest threats to global businesses and there is no sign of this slowing down. Attack frequency has reached unprecedented levels. The FBI does not support paying a ransom in response to a ransomware attack. So, the question is - How do you get ahead of Ransomware Attacks?

    Data intelligence drives decisions. In this solution directed talk, we will elaborate on how Airgap's Ransomware Kill Switch can help:

    - Integrate with cyberattack incident report flow and endpoint telemetry to automate your ransomware defense
    - Exchange security intelligence data across leading SIEM and SOAR platforms
    - Integrates with leading endpoint management for autonomous and adaptive policies from endpoint to enterprise

    When you are on Ransomware incident response, you are competing with time. Join us before RSAC 2021 for the live streaming session with Airgap. Schedule a demo on Ransomware Kill Switch at https://airgap.io/events/

    About Airgap Networks
    Ransomware threat is growing rapidly. While there are a whole bunch of security companies that are trying to prevent ransomware from getting into your network, Airgap's "Zero Trust Isolation Platform" protects your organization even if your perimeter is breached or if you have unpatched vulnerable servers inside your data center. Additionally, Airgap’s “Ransomware Kill Switch” is the most potent ransomware response for the IT organization. Airgap can be deployed in minutes without any agents, forklift upgrades, or design changes. The company is founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io
  • Ransomware in Healthcare: Got Ransomware Kill Switch for Device Cybersecurity Recorded: Jun 8 2021 38 mins
    Airgap Networks
    Hackers are outpacing healthcare in the overall cybersecurity race. With the recent OT/IoT/IoMT device hacks gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons, and schools, Zero Trust design, and implementation in healthcare stands out to help stop attack proliferation. Zero Trust can be practiced in phased implementation. Ransomware can be stopped with the Ransomware Kill Switch, particularly so when it's automated with APIs. In this segment, Kris Kistler, CISO of Cognizant Healthcare, will discuss how Zero Trust transformation as a journey for healthcare facilities and share the view to defend device cybersecurity. Furthermore, we will be asking him on the view of Ransomware Kill Switch in Healthcare. Join us!
  • Ransomware Battleground: Shots Fired at Esports Final Round Recorded: Jun 4 2021 47 mins
    Airgap Networks
    In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source)

    Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).

    In this series of Ransomware Battleground, we will try to:
    - Know the eSports industry and the leading MMO game developers
    - Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted
    - Who is Egregor Ransomware Crew? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?
    - What is their extortion behavior and ransom demand and Crypto tracing?
    - Is it too far fetched to say Zero Trust is needed for eSports development?
    - Got Ransomware Kill Switch for eSports?

    Let's close the final round of this Battleground series with Syya and Nigel. Join us!
  • Ransomware Battleground: Shots Fired at Esports Round 2 Recorded: May 28 2021 32 mins
    Poul Frederiksen, Syya Yasotornrat, Nigel Leblanc and Higinio Ochoa
    In 2021, the global eSports market was valued at just over 1.08 billion U.S. dollars.(Source)

    Online games and specifically the Massive Multiplayer (MMO) games, experience multiple attacks from hackers, platform competition that try to block players’ access to the gaming platforms, as well as cheating players that can attack other players slowing their connection, while gaining a competitive advantage. These attacks can take the entire game offline. Can you visualize losing $400,000 dollars per hour (Source).

    In this series of Ransomware Battleground, we will try to
    Know the eSports industry and the leading MMO game developers
    Understand where the “crown jewels” assets such as in-game currency, identity information, and gaming development resources…are hosted
    Who is Egregor Ransomware Crew? Is it as RaaS? And how do they hack into corporate networks and deploy the ransomware?
    What is their extortion behavior and ransom demand and Crypto tracing?
    Is it too far-fetched to say Zero Trust is needed for eSports development?

    Let’s open up a new conversation series with Syya, Poul, Nigel and Big-Time Higgs. Join us!
  • Ransomware in Education: Got Ransomware Kill Switch with James Mountain Recorded: May 25 2021 23 mins
    Airgap Networks
    Spiking ransomware attacks against schools make pandemic education even harder. As schools planning for Recovery 2021 and back to school in full capacity, we are excited to share the use case of IT practices at the Palmer College of Chiropractic and their journey of DIY Zero Trust Isolation. Isolation is the best security. How do you get started with Zero Trust? Is there an easy entry product like Automated Ransomware Kill Switch that any school ISD can put in practice before ransomware attacks? Join us and learn from this interactive and insightful conversation with James Mountain on:
    - Lesson learned on must-have design principles for the homegrown Zero Trust Isolation
    - Maintain security hygiene as devices from remote learning coming back to in-person classroom setting
    - Defend device cybersecurity in healthcare facilities for managed and unmanaged devices (OT/IOT)
    - Deploy Identity based segmentation and ringfencing in a distributed remote & branch campus settings
    - Ransomware Kill Switch use cases: How do you reduce the ransomware attack blast radius when the 10% happens?
    - How about an Automated Ransomware Kill Switch that guards your school 24/7?

    Don't miss this new updated episode with James and Chuck!
  • Get Ahead of Ransomware Attacks with Automated Ransomware Kill Switch Recorded: May 24 2021 27 mins
    Airgap Networks
    Organizations of all sizes can be the target of ransomware. Cyberattacks continue to be one of the biggest threats to global businesses and there is no sign of this slowing down. Attack frequency has reached unprecedented levels. The FBI does not support paying a ransom in response to a ransomware attack. So, the question is - How do you get ahead of Ransomware Attacks?

    Data intelligence drives decisions. In this solution directed talk, we will elaborate on how Airgap's Ransomware Kill Switch can help:

    - Integrate with cyberattack incident report flow and endpoint telemetry to automate your ransomware defense
    - Exchange security intelligence data across leading SIEM and SOAR platforms
    - Integrates with leading endpoint management for autonomous and adaptive policies from endpoint to enterprise

    When you are on Ransomware incident response, you are competing with time. Join us before RSAC 2021 for the live streaming session with Airgap. Schedule a demo on Ransomware Kill Switch at https://airgap.io/events/

    About Airgap Networks
    Ransomware threat is growing rapidly. While there are a whole bunch of security companies that are trying to prevent ransomware from getting into your network, Airgap's "Zero Trust Isolation Platform" protects your organization even if your perimeter is breached or if you have unpatched vulnerable servers inside your data center. Additionally, Airgap’s “Ransomware Kill Switch” is the most potent ransomware response for the IT organization. Airgap can be deployed in minutes without any agents, forklift upgrades, or design changes. The company is founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io
The Best Defense Against Ransomware Propagation
Ransomware attacks and threats are growing exponentially. While many security companies are trying to prevent ransomware from breaching the perimeter of your network, Airgap's Zero Trust Isolation Platform protects your organization from the inside out. Additionally, Airgap’s Ransomware Kill Switch is the most potent ransomware response for an IT organization. The solution can be deployed in minutes without any endpoint agents, forklift upgrades, or design changes. Airgap was founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io or email media@airgap.io

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing On Premises Private Apps From Anywhere Without VPN
  • Live at: Sep 17 2021 3:00 pm
  • Presented by: Jeff McDaniel
  • From:
Your email has been sent.
or close