With the surge in remote working and widespread adoption of Software as a Service (SaaS) platforms, security needs to be re-architected to better address modern-day threats. Apps and users have shifted from on-premises appliances to the cloud, and security infrastructure needs to adapt accordingly to keep pace.
Read More
Tags:
Web Security,
SASE,
CASB,
cloud security,
secure web gateway,
SOC,
ZTNA,
SaaS security,
APAC,
Asia Pacific
Is Security an Enabler or an Inhibitor to the Future of Work?
It’s no secret that the drastic, sudden changes in the way we work over the past nine months have negatively impacted user experience and increased cybersecurity risk. Users have been forced away from the consistent application reliability and speed they enjoyed in the office to a work-from-home application experience that is overrun by hiccups, lag, and poor connectivity. In-person meetings have given way to choppy, pixelated video conferencing, during which key points and takeaways can be easily misconstrued. And threat surfaces have exploded across the edge of the network as users log in to critical on-premises business systems, Software as a Service (SaaS) platforms, and cloud apps from unsecured devices at their home office, the dining room table, and their kids’ rooms.
Read More
Tags:
cybersecurity,
user-experience,
cloud security,
network security,
edge security,
security without compromise
Isolation Provides Malware-Free Browsing Regardless of Patch Status
Imagine your life today without being able to freely browse the web. Browsers have put the entire world on our devices and in the palm of our hand—easily searchable in a powerful and seamless experience. This is where work happens, in browsers, email and shared files. Securing this this essential (yet vulnerable) entry point, ensures malicious actors wouldn’t be able to launch, much less carry out, an attack. Simply put, Chrome is critical to getting business done, as it is used by nearly two-thirds of devices worldwide.
Read More
Tags:
cybersecurity,
Google Chrome,
Internet Isolation,
cloud security,
zero-days,
CVE-2020-16017,
CVE-2020-16013,
web browser,
CVE-2020-16009,
CVE-2020-15999
Build a Security Approach that Is Integrated, Simple, and Cloud Delivered
Last month I had the absolute pleasure of chatting with Kenny Yeo, a cybersecurity analyst from Frost and Sullivan and one of the leading security experts in the Asia Pacific region. Kenny and I locked horns during a conference recently, and we started sharing notes on how SaaS security has evolved. It turned into quite an interesting conversation, so I wanted to get his take on recent network and security shifts that are impacting companies.
Read More
Tags:
cybersecurity,
security,
web isolation,
Cloud Adoption,
cloud security,
cloud-delivered security,
digital transformation and security,
Frost and Sullivan
Discover How You Can Protect Users and the Organization in Today’s New Normal
The past six months have been a whirlwind of change. Security teams across the world have scrambled to empower distributed users with the tools and information they need to keep businesses running. Now everyone is accessing everything from everywhere, with limited control and visibility into who is accessing what, where, and on what device.
Read More
Tags:
cybersecurity,
phishing,
spearphishing,
cyberattacks,
Web Security,
HTTPS,
SaaS,
cloud security,
VPN,
email security,
new normal,
cloud apps,
BYOD
Back in April 2019, the Menlo Security team learned that our Partner By Light IT Professional Services LLC and Menlo Security were one of two solution providers selected to design and implement a Cloud Based Internet Isolation (CBII) prototype capability for the Defense Information Systems Agency (DISA).
Read More
Tags:
CBII,
SWG,
cloud security,
remote browser isolation,
AirGap,
DoD
Manage Shadow IT and Stop Data Loss Through Cloud Apps
Cloud Apps Are a Point of Attack
Protecting workers is a challenging task—for example, 29 percent of all attacks leverage legitimate cloud services to launch an attack. Once an attacker is inside the network, they can use the same cloud app to siphon or exfiltrate valuable information out of the organization.
Read More
Tags:
Cloud DLP,
Application Control,
app security,
cloud app,
cloud applications,
Cloud App Isolation,
CASB,
Cloud Access Security Broker,
cloud application security,
casb isolation,
Isolation, Cloud-based Isolation,
cloud security,
DLP