A Blueprint for Designing a New Security Perimeter

  • Webcast Aired Monday, 18 Nov 2019 10:30AM EST (18 Nov 2019 15:30 UTC)
  • Speaker: Bob Gilbert

Recent research shows that more than 85% of web traffic is comprised of cloud services. The rapid adoption of cloud and mobile is fundamentally changing network traffic patterns and the movement of data, rendering existing network and security models obsolete. This shift is resulting in enterprise security teams supplementing next-gen firewalls (NGFWs), secure web gateways (SWGs), and VPNs with cloud access security brokers (CASBs).While CASBs address a key set of cloud-specific use cases tied to visibility, data security, compliance, and threat protection, your dissolving corporate perimeter is also forcing security teams to rethink their entire legacy security stack. After all, if most of your web traffic is comprised of cloud services, why does a majority of your security spend on security tools that are not effective in this new world?

Join this session to learn about:

  • New blind spots that exist with legacy security tools
  • Why simply moving legacy security tools to the cloud is not enough
  • Top cloud security use cases driving the need for a new perimeter
  • The essential requirements for a new, more effective perimeter