Managing Security in the Age of the Disappearing Network Perimeter

Logo
Presented by

Ulf Mattsson | Damien Chastrette | William Miroux

About this talk

Global commerce was in transition before the pandemic. Now, businesses are accelerating their digital aspirations and work will never be the same. Mobility has raised business productivity, but it’s brought its share of issues, as well. One of the biggest challenges is the need to provide complete, consistent security across devices that you may not own. • How do I control in one place the security and identification of all devices connecting to my network? • How can I address the challenge of managing security in a world where cloud computing, mobility and the Internet of things are eroding the network perimeter? • How can I provide Data Privacy and Data Security and be compliant with GDPR and local regulations? • How do I give support engineers access to my organization's admin portal, provides Internet security, web security, firewalls, sandboxing, SSL inspection, antivirus, vulnerability management and granular control of user activity in cloud computing, mobile and Internet of things environments? • How can I provide automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. • How can I repurpose the existing WiFi and create key metrics of the deployment and visitors use and integrate data with existing CRM tools? • How do I dissociate and secure the use of my network among daily guests, consultants, employees and IOT devices? We will discuss how a cloud-based proxy and firewall can route all traffic through its software to apply corporate and security policies.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (787)
Subscribers (198324)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.