DiscoverSecurity Architecture Podcast
Security Architecture Podcast
Claim Ownership

Security Architecture Podcast

Author: Evgeniy Kharam & Dmitry Raidman

Subscribed: 40Played: 481
Share

Description

Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
51 Episodes
Reverse
Our guest for the show is Tal Zamir, Tal was previously the Founder & CTO of Hysolate; has a 20-year software industry leader with a track record of solving urgent business challenges by reimagining how technology works. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 4  KickOff episode with Chase: https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be Demo:Book a Demo - Perception Point (perception-point.io) Whitepaper(s): https://perception-point.io/resources/white-papers/whitepaper-rise-cyber-threats-against-email-browsers-cloud-channels/ Tal Zamir Bio:  Previously the Founder & CTO of Hysolate, Tal Zamir is a 20-year software industry leader with a track record of solving urgent business challenges by reimagining how technology works. He has pioneered multiple breakthrough cybersecurity and virtualization products. Tal incubated next-gen end-user computing products while in the CTO office at VMware. Tal began his career in an elite IDF technology unit. He holds multiple US patents as well as an M.Sc in Computer Science from the Technion. Company Overview: Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation isolation, detection, and remediation of all threats across an organization’s main attack vectors - email, web browsers, and cloud collaboration apps.The solution's natively integrated and fully managed incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights; providing proven best protection for all organizations. Deployed in minutes, with no change to the enterprise’s infrastructure, the patented, cloud-native and easy-to-use service replaces cumbersome legacy systems to prevent phishing, BEC, spam, malware, zero-days, ATO, and other advanced attacks well before they reach end-users. Fortune 500 enterprises and organizations across the globe are preventing attacks across their email, web browsers and cloud collaboration channels with Perception Point.
Our guest for the show is Seth Spergel, Managing Partner of Merlin Ventures. Seth brings over 20 years of experience building, selling, and investing in software and startups. He joined us to talk about the Browser security and Browser Isolation market To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 4  KickOff episode with Chase: https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be About Seth: Seth Spergel is Managing Partner of Merlin Ventures. Seth brings over 20 years of experience building, selling, and investing in software and startups. Seth came to Merlin from In-Q-Tel, the strategic investment firm of the US Intelligence Community. Prior to In-Q-Tel, Seth was VP of Engineering at ThinkGeek. Seth is a graduate of Brandeis University, where he majored in Computer Science and Economics. About Merlin: Merlin Ventures is the strategic investment arm of Merlin Cyber, a firm with 25 years of experience helping the largest cybersecurity brands in the world tackle the US Federal market. In 2019, we established Merlin Ventures to find the next generation of cybersecurity solutions, and in 2021 stood up our office in Tel Aviv to gain insider access to the unique cybersecurity ecosystem that Israel provides. Leveraging our network of US-based security executives, as well as Merlin Cyber’s public sector go-to-market expertise, Merlin Ventures helps our portfolio companies understand and rapidly accelerate into both commercial and government markets in the US.
Our guest for the show is Alon Levin, Alon is the VP of Product Management at Seraphic, the enterprise browser security solution. With a successful track record of over 15 years in the cybersecurity industry Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be Demo:  https://www.seraphicsecurity.com/contact-us Whitepaper: https://seraphicsecurity.com/wp-content/uploads/2022/08/Final-3-ESG-Technical-Validation-Seraphic-Aug-2022.pdf About Alon: https://www.linkedin.com/in/alonlevin1/ Alon Levin is the VP of Product Management at Seraphic, the enterprise browser security solution. With a successful track record of over 15 years in the cyber security industry, Alon specializes in building and supporting the growth of new, innovative products in the areas of Product Management, Presales, and Customer Success. Prior to joining Seraphic, he fulfilled numerous leadership positions such as VP of Product Management at Infinipoint, and earlier in VDOO, and as a Global Consulting Engineer at Palo Alto Networks, as well as leading Sales Engineering roles at Cyvera and Wave. Alon holds a Bachelor of Science (B.Sc.) degree in Electrical Engineering from Tel-Aviv University. About Seraphic:  Seraphic offers a unique security solution introducing enterprise-grade browser security on any browser on any device, protecting both the employees and the enterprise assets all while providing security teams with advanced governance and policy enforcement. Seraphic’s solution is easy to deploy, has no impact on performance, leaves user experience untouched, and is fully compatible across all browsers, all operating systems, and all devices (including Android and iOS mobile devices).  With Seraphic, security teams are minutes away from closing the most significant blind spot in their organization's cyber defense, securing any browser, any device, anywhere. Learn more at seraphicsecurity.com
Our guest for the show is Nick Edwards, Nick is Vice President, Product Management for Menlo, prior to Menlo he was Nick was CEO of GradientOne.  Season 4  KickOff episode with Chase https://www.youtube.com/watch?v=YWB05cb7XRQ Demo:  https://www.menlosecurity.com/demo/ Whitepaper:  https://resources.menlosecurity.com/white-papers/parting-the-clouds-isolation-for-greater-security About Nick  https://www.linkedin.com/in/nick-edwards-99387/ Prior to joining Menlo Security as Vice President, Product Management, Nick was CEO of GradientOne. He previously served as Vice President of Marketing and Products with Silver Tail Systems where he led all aspects of product management and marketing. Nick has also held a variety of management positions with Cisco Systems. During his time at Cisco, he built a team of 35 people managing security products with an annual run rate of $500 Million. Nick holds an MBA in Finance from Harvard Business School and a BS in Control Systems Engineering from the United States Naval Academy. About Menlo Security:  Menlo distinguishes itself from competitors by challenging the traditional approach to protecting against web-based threats with its patented isolation technology, which ensures that customers can enforce the highest security irrespective of where their users are located or what device they are using to work with and access the Internet. Menlo’s unique architecture is inherently capable of meeting the dynamic elastic scale needed to support changing traffic patterns for its customers worldwide. This proven approach supports security first customers and isolates all users and traffic anywhere in the world.
Our guest for the show is  Brian Kenyon, Brian serves as the Chief Strategy Officer at Island, a hot start-up that recently emerged from stealth to deliver the industry’s first Enterprise Browser. Season 4  KickOff episode with Chase https://www.youtube.com/watch?v=YWB05cb7XRQ Demo:  https://www.island.io/contact-us Whitepaper:  https://connect.island.io/hubfs/White%20Papers/whitepaper%20013122_c.pdf About Island:  Island is the developer of the Enterprise Browser – the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders of the enterprise security and browser technology space and backed by leading venture funds – Insight Partners, Sequoia Capital, Cyberstarts and Stripes – Island is redefining the future of work for some of the largest, most respected enterprises in the world. Island is based in Dallas with research and development in Tel Aviv About Brian:  https://www.linkedin.com/in/brianmkenyon Brian comes from more than 20 years of experience driving product strategy, growth initiatives and go-to-market for organizations across all stages. Currently, Brian serves as the Chief Strategy Officer at Island, a hot start up that recently emerged from stealth to deliver the industry’s first Enterprise Browser. As a founding team member of Island, Brian was essential in driving in establishing Island’s product and go-to-market strategies,  as well as part of the leadership team that secured over $100 million in financing from leading early-stage investors including Insight Partners, Sequoia Capital, Cyberstarts and Stripes.  In addition to being a crucial member of Island’s early stage success, Brian also served as Senior Vice President and Chief Strategy Officer at Blue Coat Systems (which was acquired by Symantec in 2016 where he held the same position), as well as chief architect at Foundstone, which McAfee acquired in 2004, where he played an integral role in designing and developing the company’s cutting-edge hardware and software solutions. Upon joining McAfee, he served in a variety of roles including Chief Technology Officer as well as Chief Technical Strategist. Throughout Brian’s career he has been responsible for the strategy engagements of these major company success stories and has the right experience to help entrepreneurs navigate the challenges, successes and roadblocks of early-stage growth.
Our guest for the show is Zuly Gonzalez. Zuly is Director of Product Management at Skyhigh Security where she leads Remote Browser Isolation, Firewall-as-a-Service, and Digital Experience Monitoring as part of the Skyhigh Security Service Edge (SSE) platform. Season 4  KickOff episode with Chase https://www.youtube.com/watch?v=YWB05cb7XRQ Demo: https://www.skyhighsecurity.com/en-us/forms/demo-request-form.html Whitepaper: https://www.skyhighsecurity.com/en-us/cybersecurity-defined/what-is-browser-isolation.html About Zuly: https://www.linkedin.com/in/zulygonzalez/ Zuly Gonzalez is Director of Product Management at Skyhigh Security where she leads Remote Browser Isolation, Firewall-as-a-Service, and Digital Experience Monitoring as part of the Skyhigh Security Service Edge (SSE) platform. Prior to joining Skyhigh Security, Zuly was the CEO and Co-founder of Light Point Security (acquired by McAfee in March 2020), which pioneered the concept of remote browser isolation. Before founding Light Point Security, Zuly spent over a decade at the National Security Agency (NSA) in various technical and management roles where she focused on protecting national security interests. While at the NSA, Zuly briefed the Director of the NSA and the House Permanent Select Committee on Intelligence (HPSCI) on matters of national security. Zuly holds a BS in Computer Engineering from the University of Puerto Rico – Mayaguez, and an MS in Electrical and Computer Engineering from Johns Hopkins University. About Skyhigh Security: Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. For more information, visit www.skyhighsecurity.com.
Our guest for the show is Jack Britton. Jack is the Director of Sales Engineering for Talon Cybersecurity. Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience. He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be Demo: https://talon-sec.com/talon-learn-more/ Whitepaper: https://talon-sec.com/resources/whitepapers/white-paper-an-enterprise-browser-for-the-digital-business/ About Jack:  https://www.linkedin.com/in/jackrbritton/ Jack Britton is the Director of Sales Engineering for Talon Cybersecurity.  Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience.  He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company.  There he led Offensive Security, Digital Forensic and Incident Response, Executive Digital Protection Services, and Managed Security Evaluation Services.  He is an RSA Scholar and has earned both B.S and Masters in Science in Cybersecurity at the University of Maryland Global Campus.  Jack volunteers to support Global Humanitarian Aid needs and he is an advisor with the National Child Protection Task Force. About Talon: Talon is enabling and securing the distributed workforce by creating the first browser-based workspace that was designed with built-in security for the modern and hybrid workforce, working from anywhere and on any device.  Talon simplifies the company's security stack, with rapid end-to-end deployment which allows a robust endpoint-agnostic security posture.
Our guest for the show is Mike Schuricht , Mike is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be  Demo:  https://www.forcepoint.com/videos/forcepoint-remote-browser-isolation-rbi-demo-performance-and-security Whitepaper:  https://www.forcepoint.com/product/forcepoint-one About Mike:  Mike Schuricht is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Mike joined Bitglass from Palo Alto Networks where he was responsible for security management and user-interface strategy for both Panorama and PAN-OS. Prior to joining Palo Alto Networks, Mike held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal product line. Mike holds an MS and BS in Computer Engineering from University of California, Santa Barbara. About Forcepoint:  Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries.
Join us for a Season 4 kickoff Episode, This season we are transitioning to a more end user-centric security topic Browser Isolation. This security concept is an old concept and goes back to 1995 when CITRIX was first introduced. However, since then many things have changed and the fact we are using browsers for almost anything at work including gaming and video consumption brings the need for defense-in-depth and zero trust We invite you to join us and watch the kickoff episode! There are about 1.7 billion websites on the internet, and 4.5 billion people interact with these websites daily. An unprecedented number of 500,000 new websites are created daily following websitesetup.org stats. This noise serves as a great disguise for the adversaries. While the bad actors adopt automation and DevOps in line with the rest of the market, they can spin up new phishing websites with high similarity to the original website. Other attack vectors that gain popularity are infecting legitimate websites with malware or utilizing formjacking and other OWASP Top 10 weaknesses. That being said, it's challenging to be reactive to protect people when we know the adversaries are always one step ahead. This is where the Isolation or air-gaping approach for the websites could be a helpful mechanism in protecting the end-user. The season will examine a few approaches and solution architectures by vendors: -Remote Browser Isolaiton -Secure Enterprise Browser -Browse Plugin based Security We believe that this topic is fascinating and has so many great solutions on the market. You will have the opportunity to familiarize yourself with many great options to protect the end-user and also a variety of attacks such as:  -Malicious documents and files download -Drive-by downloads -Redirect attacks -Zero-day exploits -Cross-site scripting -A load of malicious Java scripts -Malvertising  -Cookie stuffing and session fixation Here are some of the questions we plan to ask the participants, -What's the name of the offering/product addressing the browser isolation? -Describe your overall architecture at a high level? -What is the user experience compared to browsing, especially with SPA (Single Page Application)? -Please describe how you integrate with IAM/SSO providers? -How would your technology work with existing SWG or ZTNA vendors? Does it replace or complement it? -Is the isolation done for all URLs/APPS or only for the risky ones?  -Can I use the solution to isolate internal web-based resources and how can you support legacy web applications that run only on old versions of Internet Explorer? -Please describe how users can work and edit documents via browser? -How does your solution address BYOD Devices? How about Mobile devices? -How do your products work with browser extensions such as Lastpass, Webex, etc.? -How can the organization get visibility or a report of attacks prevented by the technology?
We are airing our eighth and final episode in Season 3, this season is dedicated to application security, our guest for the show is Daniel Krivelevich Co-Founder and CTO of Cider Security To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo: https://www.cidersecurity.io/demo/ WhitePaper: https://www.cidersecurity.io/top-10-cicd-security-risks/ Daniel BIO: https://www.linkedin.com/in/daniel-krivelevich/ Cyber Security expert and problem solver, 15+ years of enterprise security experience with a strong orientation to Application & Cloud Security. Held several positions in 8200, after which spent several years hopping between defensive and offensive security positions.  After having led Application Security and Cloud Security with Sygnia for four years, working with 100+ enterprises on optimizing Cyber resilience,  Daniel Co-Founded Cider Security as the company’s CTO. About Cider: Cider Security is a first-of-its-kind AppSec Operating System that provides Security and Engineering teams a single, consistent method to orchestrate and implement end-to-end CI/CD security through a single, unified platform. The company takes a holistic approach to the security of the engineering processes and systems, from code to deployment. It establishes a comprehensive Technical DNA of the engineering environment, giving Security teams the transparency and visibility needed to optimize AppSec and achieve full resilience. Founded in late 2020 by cybersecurity industry veterans, Guy Flechter and Daniel Krivelevich, Cider Security's mission is to solve the most commonly encountered challenges CISOs and security engineers face today. For more information, visit www.cidersecurity.io/.
We are airing our sixth episode in Season 3, this season is dedicated to application security, our guest for the show is Kieran Miller is the Chief Architect at Garantir, before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo:  https://garantir.io/contact/ WhitePaper: https://garantir.io/wp-content/uploads/2021/04/Garantir-Deploying-A-Fast-Secure-Code-Signing-System.pdf Kieran: https://www.linkedin.com/in/kieran-miller-0776136/ Kieran Miller is the Chief Architect at Garantir, a cybersecurity company based in San Diego, California. Before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto, which was later acquired by Thales, followed by multiple years as a senior security consultant. With over a decade of cybersecurity experience, Kieran has expertise in multiple dimensions of enterprise security, from data security and identity access management to secure software development. Garantir overview: Garantir is a cybersecurity company that provides advanced cryptographic solutions to the enterprise. The Garantir team has worked on the security needs of businesses of all sizes, from startups to Fortune 500 companies. At the core of Garantir’s philosophy is the belief that securing business infrastructure and data should not hinder performance or interrupt day-to-day operations. With GaraSign, Garantir’s flagship product, private keys remain secured at all times, while a client-side hashing architecture ensures high performance for all cryptographic operations, including code signing, SSH, S/MIME, document signing, TLS, secure backup, and more.
This Season is dedicated to Application security, our guest for the show is James Brotsos Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC:   https://checkmarx.com/product/software-security-platform/ Whitepaper:  https://checkmarx.com/resources/ebooks-and-whitepapers Checmarx: Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry’s most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software—including proprietary code, open-source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. James Brotsos | Product Manager – Developer Experience |  https://www.linkedin.com/in/jbrotsos/ Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx – a leader in Application Security Testing Solutions.  He comes with fifteen years of software engineering experience in network protocol and kernel development. In his spare time, he volunteers mentoring Computer Science high school students in the Bay Area. He is an active “maker”, and his main hobby is following IoT technology and trends.
This Season is dedicated to Application security, our guest for the show is Abhi Veldurthy from CloudDefense.  He joins us to discuss their SAST, SCA, and VA solutions. Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC: https://www.clouddefense.ai/request-demo Whitepaper: https://www.clouddefense.ai/ CloudDefense Summary CloudDefense is an Application Security company that provides a single pane of glass view into the overall security health of an organization. It provides tools to discover open source vulnerabilities, open-source licenses, static analysis (SAST), API and Web penetration testing, as well as Cloud Native, Cloud Infra, and Container Vulnerabilities with a few clicks. CloudDefense helps you in preventing accidental slippage of critical security issues in production. Abhi Veldurthy Bio https://www.linkedin.com/in/aveldurthy/ Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy, while leading the engineering efforts at the company. He has a Masters in Information Security from Carnegie Mellon and is deeply passionate about application development and is using this powerful combination to build a holistic security solution at CloudDefense. Prior to joining CloudDefense, Abhi has worked with LinkedIn, Amazon and Yahoo.
This Season is dedicated to Application security , our guest for the show is Gadi Bashvitz  from NeuraLegion   He joins us to discuss their DAST solution. Gadi Bashighly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC:  https://nexploit.app/signup Whitepaper:  https://www.neuralegion.com/whitepapers/creating-implementing-a-modern-day-dast-solution/ Guest's Bio: Gadi Bashvitz is a highly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF and since then he has founded and successfully grew multiple companies in various industries. Gadi has an exceptional ability to distill the essence from complex concepts and communicate them to customers, the team and in various speaking events. He takes a proactive and critical approach to any challenge, identify the opportunity it presents and take advantage of the opportunity. Gadi is the President & Chief Customer Officer at NeuraLegion, driving the DevSecOps revolution. Connect our guest: https://www.linkedin.com/in/bashvitz/ Company Description: NeuraLegion provides solutions for Application security from build to compliance. We offer a developer focused API & Application DAST automation platform. Enhancing DevOps & CI/CD by removing human bottlenecks with no false positives and business logic attacks. Reducing reliance on manual testing, integrated early & often to detect & fix security issues before they hit production. To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
Join us for a Season 3 kickoff Episode, This season we are switching gears from SASE and doing a deep dive in Application Security. We truly believe that Application security is one of the most overlooked domains in cybersecurity. Recent supply chain attacks are great examples of why we decided to bring awareness to the subject. You can learn more about how to maximize the value you get from the various solutions by listening to the kickoff episode regardless if you are a big company or a smaller one We already recorded several great vendors such as Neuralegion Snyk.io Clouddefense.ai, Garantir.io and looking to record several more great vendors We are honored to have Tanya Janca, also known as SheHacksPurple, is the best-selling author of Alice and Bob Learn Application Security. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). Video episode  Kickoff (security-architecture.org) Please subscribe to our podcast and follow our work on Linkedin: https://www.linkedin.com/company/secarchpodcast More about Tanya: https://www.linkedin.com/in/tanya-janca/ To promote our work and support the podcast, please review us here: https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
Jian from Google's (BeyondCorp)  joins us to discuss the #SASE #ZTNA offering.  Jian is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements, or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper https://services.google.com/fh/files/misc/secure_access_to_saas_apps_with_bce.pdf Demo https://zipline.appspot.com/serve/beyond-corp-clickable-demo/beyond-corp-clickable-demo BeyondCorp is Google's implementation of the zero trust model. It builds upon a decade of experience at Google, combined with ideas and best practices from the community. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN. Jian Jian Zhen is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. He has 20 years of experience in the security industry and has worked in various areas including cloud security, EDR, and SIEM. Most recently, Jian was a co-founder of TrustPath that delivered a real-time threat prevention solution. Prior to that, Jian was the SVP of Products at Endgame, an endpoint detection and response company. Jian was also the Director of Cloud Solutions at VMware that delivered vCloud solutions for telcos and data center operators.
Gil from Axis Security, joins us to discuss the #SASE #ZTNA offering. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: http://bit.ly/3s7MzA9 Demo: http://bit.ly/3bVRjmJ Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences. Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader. Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel's leading academic institutions. About Axis Axis Security’s fast, simple, and secure approach to application access is built on a zero-trust, agentless-first approach. Application Access Cloud enables more use cases, covering more apps than any other access solution, keeping users off the network and away from the apps themselves. Axis eliminates the need for VPNs, VDIs, network changes, or agents on every device. With Application Access Cloud deployment is fast, access is easy, and the organization is more secure than ever.
Trevor A. Combs from BeyondTrust joins us to discuss the SASE  ZTNA offering. Trevor is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: https://www.beyondtrust.com/resources/whitepapers/enable-and-secure-your-remote-workforce Demo: https://www.beyondtrust.com/resources/videos/demo-privileged-remote-access About Trevor: Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that, he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction, and Vendor Outsourcing industries. He has over 20 years in the Support and Security space. In Trevor’s free time, he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology, and keep their data and personal information safe. BeyondTrust: Most privileged access management solutions just focus on passwords. BeyondTrust is different. Our innovative Universal Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust's Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks. Trusted by more customers, our Universal
Rafi from Fortinet joins us to discuss the #SASE #ZTNA offering. Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). About Rafi: Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. Prior to joining Fortinet as a Systems Engineer, Rafi worked with Fortune 25 companies to analyze, decode, and respond to Advanced Persistent Threats from one of North America’s premier Security Operations Centres. Building on this experience, Rafi was charged with architecting and implementing advanced security and monitoring infrastructure protecting sensitive corporate and government data on a global basis. Rafi holds several industry certifications from the SANS institute. About Frotinet The Fortinet Security Fabric platform secures the largest enterprise, service provider, and government organizations around the world. More than 455,000 customers trust Fortinet to protect their organizations.
We are airing a special episode as part of our season one where we talk about industry leaders from many different angles. Our guest for the show is Greg Irwin, Greg is Co-Founder and Moderator at BWG    Today we are talking about one of the main aspects of any company, MONEY.    Topics on the show   Let’s discuss the Enterprise Security Market, and why it's so important to investors right now How resilient is investor interest in Enterprise Security? How does ZT compare to other major themes in enterprise security - supply chain security, data governance security, cloud security, remote workers? How do different investors (VC, PE, Public Equity) view the Enterprise Security Market? Given the crowded security vendor market, how does a vendor cause disruption and differentiate? How are the winners selected? How are the platform vendors viewed compared to the security best-of-breed vendors? What are investors expecting with regards to the impact of COVID on the market in 2021 and beyond? Greg's Bio Greg Irwin is Co-Founder and Moderator at BWG Strategy and has 20+ years of experience in the Technology market. Having spent nearly a decade at Avaya and the last seven years moderating industry forums on everything from Enterprise Software, Cyber Security, IT Infrastructure and beyond, Greg has a fantastic pulse technology trends, tech roadmaps, and which solution vendors are on the cutting edge of innovation.  From 1994-2001, Greg worked in investment banking at Salmon Smith Barney / Citigroup covering Technology/Telecom. Greg earned a Bachelor of Engineering from Dartmouth College.  He lives in Westfield, NJ with his wife Hillary and two children. BWG Description Through its virtual forums, BWG Strategy brings together skilled professionals to share experiences, learn and build valuable relationships all while providing timely primary research on real-world trends and unique insights. https://bwgstrategy.com/
loading
Comments 
Download from Google Play
Download from App Store