Claim Ownership

Author:

Subscribed: 0Played: 0
Share

Description

 Episodes
Reverse
Our guest for the show is Jack Britton. Jack is the Director of Sales Engineering for Talon Cybersecurity. Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience. He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be Demo: https://talon-sec.com/talon-learn-more/ Whitepaper: https://talon-sec.com/resources/whitepapers/white-paper-an-enterprise-browser-for-the-digital-business/ About Jack:  https://www.linkedin.com/in/jackrbritton/ Jack Britton is the Director of Sales Engineering for Talon Cybersecurity.  Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience.  He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company.  There he led Offensive Security, Digital Forensic and Incident Response, Executive Digital Protection Services, and Managed Security Evaluation Services.  He is an RSA Scholar and has earned both B.S and Masters in Science in Cybersecurity at the University of Maryland Global Campus.  Jack volunteers to support Global Humanitarian Aid needs and he is an advisor with the National Child Protection Task Force. About Talon: Talon is enabling and securing the distributed workforce by creating the first browser-based workspace that was designed with built-in security for the modern and hybrid workforce, working from anywhere and on any device.  Talon simplifies the company's security stack, with rapid end-to-end deployment which allows a robust endpoint-agnostic security posture.
Our guest for the show is Mike Schuricht , Mike is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be  Demo:  https://www.forcepoint.com/videos/forcepoint-remote-browser-isolation-rbi-demo-performance-and-security Whitepaper:  https://www.forcepoint.com/product/forcepoint-one About Mike:  Mike Schuricht is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Mike joined Bitglass from Palo Alto Networks where he was responsible for security management and user-interface strategy for both Panorama and PAN-OS. Prior to joining Palo Alto Networks, Mike held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal product line. Mike holds an MS and BS in Computer Engineering from University of California, Santa Barbara. About Forcepoint:  Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries.
Join us for a Season 4 kickoff Episode, This season we are transitioning to a more end user-centric security topic Browser Isolation. This security concept is an old concept and goes back to 1995 when CITRIX was first introduced. However, since then many things have changed and the fact we are using browsers for almost anything at work including gaming and video consumption brings the need for defense-in-depth and zero trust We invite you to join us and watch the kickoff episode! There are about 1.7 billion websites on the internet, and 4.5 billion people interact with these websites daily. An unprecedented number of 500,000 new websites are created daily following websitesetup.org stats. This noise serves as a great disguise for the adversaries. While the bad actors adopt automation and DevOps in line with the rest of the market, they can spin up new phishing websites with high similarity to the original website. Other attack vectors that gain popularity are infecting legitimate websites with malware or utilizing formjacking and other OWASP Top 10 weaknesses. That being said, it's challenging to be reactive to protect people when we know the adversaries are always one step ahead. This is where the Isolation or air-gaping approach for the websites could be a helpful mechanism in protecting the end-user. The season will examine a few approaches and solution architectures by vendors: -Remote Browser Isolaiton -Secure Enterprise Browser -Browse Plugin based Security We believe that this topic is fascinating and has so many great solutions on the market. You will have the opportunity to familiarize yourself with many great options to protect the end-user and also a variety of attacks such as:  -Malicious documents and files download -Drive-by downloads -Redirect attacks -Zero-day exploits -Cross-site scripting -A load of malicious Java scripts -Malvertising  -Cookie stuffing and session fixation Here are some of the questions we plan to ask the participants, -What's the name of the offering/product addressing the browser isolation? -Describe your overall architecture at a high level? -What is the user experience compared to browsing, especially with SPA (Single Page Application)? -Please describe how you integrate with IAM/SSO providers? -How would your technology work with existing SWG or ZTNA vendors? Does it replace or complement it? -Is the isolation done for all URLs/APPS or only for the risky ones?  -Can I use the solution to isolate internal web-based resources and how can you support legacy web applications that run only on old versions of Internet Explorer? -Please describe how users can work and edit documents via browser? -How does your solution address BYOD Devices? How about Mobile devices? -How do your products work with browser extensions such as Lastpass, Webex, etc.? -How can the organization get visibility or a report of attacks prevented by the technology?
We are airing our eighth and final episode in Season 3, this season is dedicated to application security, our guest for the show is Daniel Krivelevich Co-Founder and CTO of Cider Security To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo: https://www.cidersecurity.io/demo/ WhitePaper: https://www.cidersecurity.io/top-10-cicd-security-risks/ Daniel BIO: https://www.linkedin.com/in/daniel-krivelevich/ Cyber Security expert and problem solver, 15+ years of enterprise security experience with a strong orientation to Application & Cloud Security. Held several positions in 8200, after which spent several years hopping between defensive and offensive security positions.  After having led Application Security and Cloud Security with Sygnia for four years, working with 100+ enterprises on optimizing Cyber resilience,  Daniel Co-Founded Cider Security as the company’s CTO. About Cider: Cider Security is a first-of-its-kind AppSec Operating System that provides Security and Engineering teams a single, consistent method to orchestrate and implement end-to-end CI/CD security through a single, unified platform. The company takes a holistic approach to the security of the engineering processes and systems, from code to deployment. It establishes a comprehensive Technical DNA of the engineering environment, giving Security teams the transparency and visibility needed to optimize AppSec and achieve full resilience. Founded in late 2020 by cybersecurity industry veterans, Guy Flechter and Daniel Krivelevich, Cider Security's mission is to solve the most commonly encountered challenges CISOs and security engineers face today. For more information, visit www.cidersecurity.io/.
We are airing our sixth episode in Season 3, this season is dedicated to application security, our guest for the show is Kieran Miller is the Chief Architect at Garantir, before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo:  https://garantir.io/contact/ WhitePaper: https://garantir.io/wp-content/uploads/2021/04/Garantir-Deploying-A-Fast-Secure-Code-Signing-System.pdf Kieran: https://www.linkedin.com/in/kieran-miller-0776136/ Kieran Miller is the Chief Architect at Garantir, a cybersecurity company based in San Diego, California. Before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto, which was later acquired by Thales, followed by multiple years as a senior security consultant. With over a decade of cybersecurity experience, Kieran has expertise in multiple dimensions of enterprise security, from data security and identity access management to secure software development. Garantir overview: Garantir is a cybersecurity company that provides advanced cryptographic solutions to the enterprise. The Garantir team has worked on the security needs of businesses of all sizes, from startups to Fortune 500 companies. At the core of Garantir’s philosophy is the belief that securing business infrastructure and data should not hinder performance or interrupt day-to-day operations. With GaraSign, Garantir’s flagship product, private keys remain secured at all times, while a client-side hashing architecture ensures high performance for all cryptographic operations, including code signing, SSH, S/MIME, document signing, TLS, secure backup, and more.
This Season is dedicated to Application security, our guest for the show is James Brotsos Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC:   https://checkmarx.com/product/software-security-platform/ Whitepaper:  https://checkmarx.com/resources/ebooks-and-whitepapers Checmarx: Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry’s most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software—including proprietary code, open-source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. James Brotsos | Product Manager – Developer Experience |  https://www.linkedin.com/in/jbrotsos/ Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx – a leader in Application Security Testing Solutions.  He comes with fifteen years of software engineering experience in network protocol and kernel development. In his spare time, he volunteers mentoring Computer Science high school students in the Bay Area. He is an active “maker”, and his main hobby is following IoT technology and trends.
This Season is dedicated to Application security, our guest for the show is Abhi Veldurthy from CloudDefense.  He joins us to discuss their SAST, SCA, and VA solutions. Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC: https://www.clouddefense.ai/request-demo Whitepaper: https://www.clouddefense.ai/ CloudDefense Summary CloudDefense is an Application Security company that provides a single pane of glass view into the overall security health of an organization. It provides tools to discover open source vulnerabilities, open-source licenses, static analysis (SAST), API and Web penetration testing, as well as Cloud Native, Cloud Infra, and Container Vulnerabilities with a few clicks. CloudDefense helps you in preventing accidental slippage of critical security issues in production. Abhi Veldurthy Bio https://www.linkedin.com/in/aveldurthy/ Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy, while leading the engineering efforts at the company. He has a Masters in Information Security from Carnegie Mellon and is deeply passionate about application development and is using this powerful combination to build a holistic security solution at CloudDefense. Prior to joining CloudDefense, Abhi has worked with LinkedIn, Amazon and Yahoo.
This Season is dedicated to Application security , our guest for the show is Gadi Bashvitz  from NeuraLegion   He joins us to discuss their DAST solution. Gadi Bashighly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC:  https://nexploit.app/signup Whitepaper:  https://www.neuralegion.com/whitepapers/creating-implementing-a-modern-day-dast-solution/ Guest's Bio: Gadi Bashvitz is a highly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF and since then he has founded and successfully grew multiple companies in various industries. Gadi has an exceptional ability to distill the essence from complex concepts and communicate them to customers, the team and in various speaking events. He takes a proactive and critical approach to any challenge, identify the opportunity it presents and take advantage of the opportunity. Gadi is the President & Chief Customer Officer at NeuraLegion, driving the DevSecOps revolution. Connect our guest: https://www.linkedin.com/in/bashvitz/ Company Description: NeuraLegion provides solutions for Application security from build to compliance. We offer a developer focused API & Application DAST automation platform. Enhancing DevOps & CI/CD by removing human bottlenecks with no false positives and business logic attacks. Reducing reliance on manual testing, integrated early & often to detect & fix security issues before they hit production. To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
Join us for a Season 3 kickoff Episode, This season we are switching gears from SASE and doing a deep dive in Application Security. We truly believe that Application security is one of the most overlooked domains in cybersecurity. Recent supply chain attacks are great examples of why we decided to bring awareness to the subject. You can learn more about how to maximize the value you get from the various solutions by listening to the kickoff episode regardless if you are a big company or a smaller one We already recorded several great vendors such as Neuralegion Snyk.io Clouddefense.ai, Garantir.io and looking to record several more great vendors We are honored to have Tanya Janca, also known as SheHacksPurple, is the best-selling author of Alice and Bob Learn Application Security. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). Video episode  Kickoff (security-architecture.org) Please subscribe to our podcast and follow our work on Linkedin: https://www.linkedin.com/company/secarchpodcast More about Tanya: https://www.linkedin.com/in/tanya-janca/ To promote our work and support the podcast, please review us here: https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
Jian from Google's (BeyondCorp)  joins us to discuss the #SASE #ZTNA offering.  Jian is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements, or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper https://services.google.com/fh/files/misc/secure_access_to_saas_apps_with_bce.pdf Demo https://zipline.appspot.com/serve/beyond-corp-clickable-demo/beyond-corp-clickable-demo BeyondCorp is Google's implementation of the zero trust model. It builds upon a decade of experience at Google, combined with ideas and best practices from the community. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN. Jian Jian Zhen is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. He has 20 years of experience in the security industry and has worked in various areas including cloud security, EDR, and SIEM. Most recently, Jian was a co-founder of TrustPath that delivered a real-time threat prevention solution. Prior to that, Jian was the SVP of Products at Endgame, an endpoint detection and response company. Jian was also the Director of Cloud Solutions at VMware that delivered vCloud solutions for telcos and data center operators.
Gil from Axis Security, joins us to discuss the #SASE #ZTNA offering. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: http://bit.ly/3s7MzA9 Demo: http://bit.ly/3bVRjmJ Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences. Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader. Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel's leading academic institutions. About Axis Axis Security’s fast, simple, and secure approach to application access is built on a zero-trust, agentless-first approach. Application Access Cloud enables more use cases, covering more apps than any other access solution, keeping users off the network and away from the apps themselves. Axis eliminates the need for VPNs, VDIs, network changes, or agents on every device. With Application Access Cloud deployment is fast, access is easy, and the organization is more secure than ever.
Trevor A. Combs from BeyondTrust joins us to discuss the SASE  ZTNA offering. Trevor is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: https://www.beyondtrust.com/resources/whitepapers/enable-and-secure-your-remote-workforce Demo: https://www.beyondtrust.com/resources/videos/demo-privileged-remote-access About Trevor: Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that, he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction, and Vendor Outsourcing industries. He has over 20 years in the Support and Security space. In Trevor’s free time, he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology, and keep their data and personal information safe. BeyondTrust: Most privileged access management solutions just focus on passwords. BeyondTrust is different. Our innovative Universal Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust's Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks. Trusted by more customers, our Universal
Rafi from Fortinet joins us to discuss the #SASE #ZTNA offering. Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). About Rafi: Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. Prior to joining Fortinet as a Systems Engineer, Rafi worked with Fortune 25 companies to analyze, decode, and respond to Advanced Persistent Threats from one of North America’s premier Security Operations Centres. Building on this experience, Rafi was charged with architecting and implementing advanced security and monitoring infrastructure protecting sensitive corporate and government data on a global basis. Rafi holds several industry certifications from the SANS institute. About Frotinet The Fortinet Security Fabric platform secures the largest enterprise, service provider, and government organizations around the world. More than 455,000 customers trust Fortinet to protect their organizations.
We are airing a special episode as part of our season one where we talk about industry leaders from many different angles. Our guest for the show is Greg Irwin, Greg is Co-Founder and Moderator at BWG    Today we are talking about one of the main aspects of any company, MONEY.    Topics on the show   Let’s discuss the Enterprise Security Market, and why it's so important to investors right now How resilient is investor interest in Enterprise Security? How does ZT compare to other major themes in enterprise security - supply chain security, data governance security, cloud security, remote workers? How do different investors (VC, PE, Public Equity) view the Enterprise Security Market? Given the crowded security vendor market, how does a vendor cause disruption and differentiate? How are the winners selected? How are the platform vendors viewed compared to the security best-of-breed vendors? What are investors expecting with regards to the impact of COVID on the market in 2021 and beyond? Greg's Bio Greg Irwin is Co-Founder and Moderator at BWG Strategy and has 20+ years of experience in the Technology market. Having spent nearly a decade at Avaya and the last seven years moderating industry forums on everything from Enterprise Software, Cyber Security, IT Infrastructure and beyond, Greg has a fantastic pulse technology trends, tech roadmaps, and which solution vendors are on the cutting edge of innovation.  From 1994-2001, Greg worked in investment banking at Salmon Smith Barney / Citigroup covering Technology/Telecom. Greg earned a Bachelor of Engineering from Dartmouth College.  He lives in Westfield, NJ with his wife Hillary and two children. BWG Description Through its virtual forums, BWG Strategy brings together skilled professionals to share experiences, learn and build valuable relationships all while providing timely primary research on real-world trends and unique insights. https://bwgstrategy.com/
Sriram from Akamai joins us to discuss the #SASE #ZTNA offering. Sriram is a Product Line director within Akamai’s Enterprise Division He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Product Whitepaper: Product Demo: About Sriram: Sriram Balasubramanian is a Product Line director within Akamai’s Enterprise Division. He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields including Networking, Security and Internet of Things. Prior to Akamai, Sriram spent 7 years with Cisco Systems leading various emerging initiatives within the company. Sriram holds a Bachelor and Master’s degree in computer science. About Akamai: Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone – and attacks and threats far away.
Paul Vallée from Tehama joins us to discuss the SASE  ZTNA offering. Paul is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Overall Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo: Whitepaper Paul Vallée is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet. In 1997, he founded Pythian, a data-centric services business with a focus on remote work. Under his leadership, the company developed groundbreaking tools that enable remote teams to work and interact seamlessly and securely across multiple continents. Tehama was born at Pythian, launched to the public in 2018 and, due to rapid adoption of the platform, spun out to become fully independent in 2019. Paul is active in the Council of Canadian Innovators and the CIO Strategy Council and serves on the board of the Basic Income Canada Network. In 2016 he was named Diversity Champion of the Year by Women in Technology and Communications. About Tehama Tehama’s Enterprise Desktop as a Service (DaaS) is the fastest, easiest, most secure way to deploy a virtual workforce. With our next-generation DaaS platform, enterprises can create cloud-based virtual offices, rooms, and desktops anywhere in the world. No other solution on the market today connects remote workers with mission-critical and data-sensitive systems, with the speed, agility, unparalleled security, and comprehensive audit trail via built-in SOC 2 controls, real-time activity feeds, and session recordings that Tehama offers. For more information, visit tehama.io.
Jason Georgi from Palo Alto Networks joins us to discuss the SASE  ZTNA offering. Jason is an accomplished technology executive with 25 years of experience. He is currently the Field Chief Technology Officer for Prisma Access and SaaS In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo Whitepaper About Palo Alto Networks Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. PaloAlto mission is to be the cybersecurity partner of choice, protecting our digital way of life. PaloAlto help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, PaloAlto is  at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. RI24qJv6dtliBXj0kHCr
Alex Marshall from Twingate joins us to discuss the SASE  ZTNA offering. Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper: Demo/POC: About Alex : Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years, including at Dropbox, where he was the first enterprise hire in the company's transformation from consumer to enterprise business. A focus of his product career has been using the power of design thinking to make technically complex products intuitive and easy to use. Alex graduated from Stanford University with a degree in Electrical Engineering. https://www.linkedin.com/in/awmars/ About Twingate: Twingate provides a simple, modern approach to securing online work. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud. RI24qJv6dtliBXj0kHCr
Noa Zilberman from Checkpoint joins us to discuss the SASE  ZTNA offering. Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo: https://pages.checkpoint.com/corporate-access-demo.html Whitepaper https://www.checkpoint.com/products/remote-user-secure-access/ About Noa Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point. Odo is a clientless, cloud-hosted platform for easy and secure access to corporate resources without VPNs. Before Odo, Noa served in unit 8200 as a network researcher, leading an independent project resulting in new capabilities for the Israeli army. https://www.linkedin.com/in/noa-zilberman/ About Checkpoint Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive, consolidated and effective security solutions in the marketplace. Check Point protects over 100,000 organizations of all sizes.
Paul Martini from IBOSS  joins us to discuss the SASE  ZTNA offering. Paul is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was a key architect for a wide variety of complex security and technology solutions. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). DEMO https://www.iboss.com/request-demo/ White paper https://www.iboss.com/sase/ More about Paul Paul Martini is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide variety of complex security and technology solutions for clients such as Phogenix, the U.S. Navy, and Hewlett Packard. He was also a key contributor at Copper Mountain Networks which was a pioneer in introducing broadband networks used by Telcos to build the cloud. Paul has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of The Year award and being named one of Goldman Sachs’ 100 Most Intriguing Entrepreneurs. About IBOSS The iboss cloud platform delivers all network security capabilities in the cloud via a SaaS offering. This eliminates the need for traditional network security appliances allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity. The future of network security is in the cloud and iboss can make that a reality today as a robust implementation of the Gartner SASE model.
Comments 
Download from Google Play
Download from App Store