With the surge in remote working and widespread adoption of Software as a Service (SaaS) platforms, security needs to be re-architected to better address modern-day threats. Apps and users have shifted from on-premises appliances to the cloud, and security infrastructure needs to adapt accordingly to keep pace.
Read More
Tags:
Web Security,
SASE,
CASB,
cloud security,
secure web gateway,
SOC,
ZTNA,
SaaS security,
APAC,
Asia Pacific
We believe the report validates customer migration from on-premises to the cloud and security functions’ convergence into a SWG platform architecture.
Gartner’s 2020 Magic Quadrant for Secure Web Gateways (SWG) is now live, and Menlo Security has been named a Visionary for the third year in a row. In fact, Menlo Security moved further right in completeness of vision and upwards in ability to execute the and we believe is now on the cusp of the Leaders’ quadrant.
Read More
Tags:
isolation,
web isolation,
SWG,
SASE,
CASB,
secure web gateway,
Menlo Security,
Gartner MQ,
ZTPA,
Gartner Magic Quadrant,
Menlo
Is Security an Enabler or an Inhibitor to the Future of Work?
It’s no secret that the drastic, sudden changes in the way we work over the past nine months have negatively impacted user experience and increased cybersecurity risk. Users have been forced away from the consistent application reliability and speed they enjoyed in the office to a work-from-home application experience that is overrun by hiccups, lag, and poor connectivity. In-person meetings have given way to choppy, pixelated video conferencing, during which key points and takeaways can be easily misconstrued. And threat surfaces have exploded across the edge of the network as users log in to critical on-premises business systems, Software as a Service (SaaS) platforms, and cloud apps from unsecured devices at their home office, the dining room table, and their kids’ rooms.
Read More
Tags:
cybersecurity,
user-experience,
cloud security,
network security,
edge security,
security without compromise
Internet Isolation Enables a Zero Trust Approach That Protects Remote Users from Cybersecurity Threats without Impacting the User Experience.
Federal agencies are being forced to rethink the way they empower public servants with the tools and information they need to make government work. Even before the Covid-19 global pandemic, agencies were undergoing digital transformation in an effort to create efficiencies and be more responsive to citizens. Then, as government employees and contractors moved from their office cubicle to their dining room table—literally overnight—federal IT organizations had to scramble to enable application access to a nearly 100 percent remote workforce.
Read More
Tags:
isolation,
Internet Isolation,
zero trust,
new normal,
federal cybersecurity,
government digital transformation,
next-gen secure web gateway
Isolation Provides Malware-Free Browsing Regardless of Patch Status
Imagine your life today without being able to freely browse the web. Browsers have put the entire world on our devices and in the palm of our hand—easily searchable in a powerful and seamless experience. This is where work happens, in browsers, email and shared files. Securing this this essential (yet vulnerable) entry point, ensures malicious actors wouldn’t be able to launch, much less carry out, an attack. Simply put, Chrome is critical to getting business done, as it is used by nearly two-thirds of devices worldwide.
Read More
Tags:
cybersecurity,
Google Chrome,
Internet Isolation,
cloud security,
zero-days,
CVE-2020-16017,
CVE-2020-16013,
web browser,
CVE-2020-16009,
CVE-2020-15999
Improve Productivity of Your SOC Personnel Through Menlo iSOC
I get it—it’s been a hard year for the cybersecurity industry. Covid-19 pushed users from a safe, central, hardened data center out to the edge of the network—literally overnight. We’ve been forced to scramble to enable secure application access to these newly remote users who are logging in to critical business systems from unsecured residential Internet connections and personal devices. We all knew this day was coming, but no one thought that 2020 would be the year we embraced the New Normal.
Read More
Tags:
cybersecurity,
threat intelligence,
security operations center,
SOC,
false positives,
cybersecurity alerts
Two FSI Experts Talk About What Keeps Them Up at Night
The thing about anxieties is that everyone has them. There’s not a person alive who isn’t afraid or worried. Whether it’s spiders or public speaking or nuclear war, something likely keeps us up at night. Cybersecurity is the same way. A CISO for a major hospital network is going to be concerned about different threats and challenges than a manufacturer or a nonprofit. These organizations have different intellectual property, interactions with customers, and business models—and are therefore targeted in different ways.
Read More
Tags:
cybersecurity,
FSI,
secure financial information,
PII,
FSI security,
secure personal information,
remote user security
The VA Has an Opportunity to Rethink Its Cybersecurity Posture in the New Normal with Cloud Web Isolation.
Covid-19 and its impact have pushed federal workers out from behind the firewall to the edge of the network in home offices. Fortunately, the Department of Veterans Affairs had already embarked on an aggressive IT modernization initiative—providing the framework for making sure remote workers have fast and consistent access to the tools and information they need, wherever the mission takes them.
Read More
Tags:
malware,
cybersecurity,
phishing,
ransomware,
web isolation,
COVID-19,
Menlo Security,
federal security,
IT modernization,
drive-by attacks,
expanding attack surface,
digital transformation,
Veterans Affairs,
VA
Menlo Imposter Threat Detection Flags Payloadless Attacks that Impersonate Senior Executives and Other VIPs
Cyberattacks aren’t always delivered via a payload such as a link to a malicious URL or an infected file attachment. Rather than trick users into downloading malicious content, attacks without payloads—otherwise known as imposter threats—use fake communications to get victims to carry out risky behavior, often offline. These fakes include emails such as phony government requests for a Social Security number, a relative’s plea for a wire transfer, a request from the boss to release proprietary business information or, more recently, give up personal information in exchange for health information and remedies about Covid-19.
Read More
Tags:
email security,
payloadless attacks,
CEO wire fraud,
scams,
business email compromise,
imposter threats,
threat detection,
email scam,
mail spoofing,
payroll diversion
HHS Can Use Cloud Web Isolation to Stop Cybersecurity Threats without Impacting Productivity.
The U.S. Department of Health and Human Services (HHS) has been on the front lines of the Covid-19 pandemic, working with other federal departments to coordinate national policy and responses to address the public health crisis. However, just as in enterprises around the world, HHS has had to deal with shelter-in-place orders and work-from-home policies that have scattered users out from behind the data security perimeter to home offices. The ability of employees to log in to critical systems in the middle of a global pandemic is mission critical and a national security priority, but the department’s systems and the data that powers them need to continue to be secured without impacting business continuity or the native user experience.
Read More
Tags:
cybersecurity,
phishing,
web isolation,
secure web gateway,
NIST,
Data Privacy,
Health IT,
HHS,
Office for Civil Rights