banner-blog.jpg

BLOG

James Locus

Recent Posts

Introducing Cloud App Isolation

Posted by James Locus on May 19, 2020

Manage Shadow IT and Stop Data Loss Through Cloud Apps

Cloud Apps Are a Point of Attack

Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud services to launch an attack. Once an attacker is inside the network, they can use the same cloud app to siphon or exfiltrate valuable information out of the organization.

 

Read More

Tags: Cloud DLP, Application Control, app security, cloud app, cloud applications, Cloud App Isolation, CASB, Cloud Access Security Broker, cloud application security, casb isolation, Isolation, Cloud-based Isolation, cloud security, DLP

Provide Secure Access for Everyone

Posted by James Locus on Mar 12, 2020

Introducing cloud-based data loss prevention with Menlo Security

 

Safeguarding Internet access is a significant problem for most businesses. In a recent Verizon Study, 6.2 percent of all data breaches result from browser-based attacks. These attacks, including watering-hole and drive-by downloads, can be costly and might lead to massive damage to an organization’s reputation.

Read More

Tags: web isolation, Cloud Proxy, SaaS Cloud Security, Endpoint Access

Secure O365 and Secure G Suite for Your Enterprise

Posted by James Locus on Mar 9, 2020

Bad actors never rest

Creating legitimate-looking fake communications from Google or Microsoft is easy and inexpensive. Novice attackers with little or no coding experience can purchase phishing packs on the dark web that they can customize and then send emails to specific targets based on social engineering intelligence. Free and compromised accounts can also be used as an attack vector , hosting documents that contain malware or links to fake web forms or other malicious sites.

Read More

Tags: email attachments, email threats, malicious links, Isolation Core

Stop Data Exfiltration with Cloud DLP

Posted by James Locus on Mar 5, 2020

Introducing cloud-based data loss prevention with Menlo Security

Sensitive data leaving a company via the web is a major concern for many networks. Bad actors perpetrate 69 percent of external data breach attacks and represent the largest threat to organizations that are not using cloud isolation. For our customers, however, we prevent these attacks.

Because external actors frequently rely on phishing and malware insertion, Menlo Security customers are largely protected through our browser and email isolation. The remaining threat vector then moves to the company’s own employees.

Read More

Tags: Isolation Core, Cloud Proxy, Cloud DLP

Browsers Protected by Menlo Security will now Prioritize the Active Browser Window and Deprioritize the Inactive Ones

Posted by James Locus on Dec 3, 2019

As any office worker knows, browser tabs have a way of multiplying during the work day. Sure - it begins innocently enough flipping back between two news articles. 

 

However, after a while, the tabs will have increased six-fold as the user inevitably gets distracted between YouTube, Spotify, and Salesforce. When done on a large scale, all those inactive tabs can eat up valuable network resources. 

Read More

Tags: Web Security, Secure Web Access, Bandwidth

Connect with us

Lists by Topic

see all

Recent Posts