banner-blog.jpg

BLOG

Safeguarding Our Health Information in a Global Pandemic

Posted by Mehul Patel on Oct 20, 2020

HHS Can Use Cloud Web Isolation to Stop Cybersecurity Threats without Impacting Productivity.

The U.S. Department of Health and Human Services (HHS) has been on the front lines of the Covid-19 pandemic, working with other federal departments to coordinate national policy and responses to address the public health crisis. However, just as in enterprises around the world, HHS has had to deal with shelter-in-place orders and work-from-home policies that have scattered users out from behind the data security perimeter to home offices. The ability of employees to log in to critical systems in the middle of a global pandemic is mission critical and a national security priority, but the department’s systems and the data that powers them need to continue to be secured without impacting business continuity or the native user experience.

Read More

Tags: cybersecurity, phishing, web isolation, secure web gateway, NIST, Data Privacy, Health IT, HHS, Office for Civil Rights

Providing 100 Percent Malware-free Email and Web Browsing

Posted by Kowsik Guruswamy on Aug 11, 2020

How a Fortune 500 Customer Embraced Menlo’s Isolation as Their Primary Defense Against Phishing and Email Threats.

I had the opportunity to chat with one of our largest customers the other day. I can’t mention the company name, but they are a big, well-known brand. Menlo works with eight of the ten largest banks and four of the five biggest credit card companies in the world. Let’s just say it was one of them.

 

Read More

Tags: malware, cybersecurity, phishing, isolation, secure web gateway, financial services security, email security, global cloud proxy

Security and Visibility When Users Are Not in the Office

Posted by Mehul Patel on Jul 14, 2020

Secure Remote Worker Use Case 2: Security and Visibility of Data and Traffic

As we now accept the new norm, combating malicious cyberthreats comes down to two things: visibility and control. If you can monitor traffic flowing to and from users’ devices and control how that traffic behaves and is secured, a malicious actor would be hard pressed to infiltrate your network and do harm.

Read More

Tags: phishing, security, HTTS, HTTPS, SSL Inspection, DLP, cloud-delivered security, visibility and control, security policies, URL filtering, VPN, secure web gateway

Connect with us

Lists by Topic

see all

Recent Posts