Skip to main content
Security Architecture Podcast

Security Architecture Podcast

By Evgeniy Kharam & Dmitry Raidman
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
Where to listen
Apple Podcasts Logo

Apple Podcasts

Castbox Logo

Castbox

Google Podcasts Logo

Google Podcasts

Overcast Logo

Overcast

Pocket Casts Logo

Pocket Casts

RadioPublic Logo

RadioPublic

Spotify Logo

Spotify

Skyhigh Security(Browser Security) - Season 04/04 - Episode #41
Our guest for the show is Zuly Gonzalez. Zuly is Director of Product Management at Skyhigh Security where she leads Remote Browser Isolation, Firewall-as-a-Service, and Digital Experience Monitoring as part of the Skyhigh Security Service Edge (SSE) platform. Season 4  KickOff episode with Chase https://www.youtube.com/watch?v=YWB05cb7XRQ Demo: https://www.skyhighsecurity.com/en-us/forms/demo-request-form.html Whitepaper: https://www.skyhighsecurity.com/en-us/cybersecurity-defined/what-is-browser-isolation.html About Zuly: https://www.linkedin.com/in/zulygonzalez/ Zuly Gonzalez is Director of Product Management at Skyhigh Security where she leads Remote Browser Isolation, Firewall-as-a-Service, and Digital Experience Monitoring as part of the Skyhigh Security Service Edge (SSE) platform. Prior to joining Skyhigh Security, Zuly was the CEO and Co-founder of Light Point Security (acquired by McAfee in March 2020), which pioneered the concept of remote browser isolation. Before founding Light Point Security, Zuly spent over a decade at the National Security Agency (NSA) in various technical and management roles where she focused on protecting national security interests. While at the NSA, Zuly briefed the Director of the NSA and the House Permanent Select Committee on Intelligence (HPSCI) on matters of national security. Zuly holds a BS in Computer Engineering from the University of Puerto Rico – Mayaguez, and an MS in Electrical and Computer Engineering from Johns Hopkins University. About Skyhigh Security: Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. For more information, visit www.skyhighsecurity.com.
30:07
August 04, 2022
Talon(Browser Security) - Season 04/03 - Episode #40
Our guest for the show is Jack Britton. Jack is the Director of Sales Engineering for Talon Cybersecurity. Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience. He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be Demo: https://talon-sec.com/talon-learn-more/ Whitepaper: https://talon-sec.com/resources/whitepapers/white-paper-an-enterprise-browser-for-the-digital-business/ About Jack:  https://www.linkedin.com/in/jackrbritton/ Jack Britton is the Director of Sales Engineering for Talon Cybersecurity.  Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience.  He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company.  There he led Offensive Security, Digital Forensic and Incident Response, Executive Digital Protection Services, and Managed Security Evaluation Services.  He is an RSA Scholar and has earned both B.S and Masters in Science in Cybersecurity at the University of Maryland Global Campus.  Jack volunteers to support Global Humanitarian Aid needs and he is an advisor with the National Child Protection Task Force. About Talon: Talon is enabling and securing the distributed workforce by creating the first browser-based workspace that was designed with built-in security for the modern and hybrid workforce, working from anywhere and on any device.  Talon simplifies the company's security stack, with rapid end-to-end deployment which allows a robust endpoint-agnostic security posture.
24:44
June 09, 2022
Forcepoint(Browser Security) - Season 04/02 - Episode #39
Our guest for the show is Mike Schuricht , Mike is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be  Demo:  https://www.forcepoint.com/videos/forcepoint-remote-browser-isolation-rbi-demo-performance-and-security Whitepaper:  https://www.forcepoint.com/product/forcepoint-one About Mike:  Mike Schuricht is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Mike joined Bitglass from Palo Alto Networks where he was responsible for security management and user-interface strategy for both Panorama and PAN-OS. Prior to joining Palo Alto Networks, Mike held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal product line. Mike holds an MS and BS in Computer Engineering from University of California, Santa Barbara. About Forcepoint:  Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries.
24:13
May 27, 2022
Season 4 Kickoff - Browser Security - Dr. Chase Cunningham- #38
Join us for a Season 4 kickoff Episode, This season we are transitioning to a more end user-centric security topic Browser Isolation. This security concept is an old concept and goes back to 1995 when CITRIX was first introduced. However, since then many things have changed and the fact we are using browsers for almost anything at work including gaming and video consumption brings the need for defense-in-depth and zero trust We invite you to join us and watch the kickoff episode! There are about 1.7 billion websites on the internet, and 4.5 billion people interact with these websites daily. An unprecedented number of 500,000 new websites are created daily following websitesetup.org stats. This noise serves as a great disguise for the adversaries. While the bad actors adopt automation and DevOps in line with the rest of the market, they can spin up new phishing websites with high similarity to the original website. Other attack vectors that gain popularity are infecting legitimate websites with malware or utilizing formjacking and other OWASP Top 10 weaknesses. That being said, it's challenging to be reactive to protect people when we know the adversaries are always one step ahead. This is where the Isolation or air-gaping approach for the websites could be a helpful mechanism in protecting the end-user. The season will examine a few approaches and solution architectures by vendors: -Remote Browser Isolaiton -Secure Enterprise Browser -Browse Plugin based Security We believe that this topic is fascinating and has so many great solutions on the market. You will have the opportunity to familiarize yourself with many great options to protect the end-user and also a variety of attacks such as:  -Malicious documents and files download -Drive-by downloads -Redirect attacks -Zero-day exploits -Cross-site scripting -A load of malicious Java scripts -Malvertising  -Cookie stuffing and session fixation Here are some of the questions we plan to ask the participants, -What's the name of the offering/product addressing the browser isolation? -Describe your overall architecture at a high level? -What is the user experience compared to browsing, especially with SPA (Single Page Application)? -Please describe how you integrate with IAM/SSO providers? -How would your technology work with existing SWG or ZTNA vendors? Does it replace or complement it? -Is the isolation done for all URLs/APPS or only for the risky ones?  -Can I use the solution to isolate internal web-based resources and how can you support legacy web applications that run only on old versions of Internet Explorer? -Please describe how users can work and edit documents via browser? -How does your solution address BYOD Devices? How about Mobile devices? -How do your products work with browser extensions such as Lastpass, Webex, etc.? -How can the organization get visibility or a report of attacks prevented by the technology?
16:53
May 02, 2022
Lacework CSPM - (Launchpad) #37
Cloud computing has been around for more than a decade, but only in the last eight years has it started to get real momentum while having small and large companies undergoing digital transformation. It's especially accelerated between 2019 and 2021. Also, COVID forced people to work from home and motivated companies to move their computing and services to IaaS providers and rapidly adopt SaaS solutions. We had the pleasure to have Nicolas St-Pierre with us, he is a Field CTO at Lacework walking us thru their solution. About Nick https://www.linkedin.com/in/nickstpierre/ Nicolas is Field CTO at Lacework and is responsible for providing technical leadership in Cloud Security to our customers, partners, and product groups. He has over 20 years of expertise in security products and virtual platform deployments with global Tier-1 Communication Service Providers and large enterprises worldwide in a CTO and Field CTO capacity. Author of multiple patents in the field of Telecommunications, 5G, Digital Advertising, Security, and Analytics, Nicolas continues to provide Cloud Security insights and leadership from the Greater Toronto Area where he resides. About Lacework: Lacework is a data-driven cloud security company. It’s the only company to deliver end-to-end visibility and automated insight into risk across multi-cloud environments so organizations of all shapes and sizes can innovate with speed and safety. Lacework sees security not as a blocker, but as an enabler for innovation — and automation as the path to transformative business outcomes. Link to the website  https://www.lacework.com/schedule-demo/
32:32
April 05, 2022
Cider Security (AppSec) - Season 03/08 - Episode #36
We are airing our eighth and final episode in Season 3, this season is dedicated to application security, our guest for the show is Daniel Krivelevich Co-Founder and CTO of Cider Security To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo: https://www.cidersecurity.io/demo/ WhitePaper: https://www.cidersecurity.io/top-10-cicd-security-risks/ Daniel BIO: https://www.linkedin.com/in/daniel-krivelevich/ Cyber Security expert and problem solver, 15+ years of enterprise security experience with a strong orientation to Application & Cloud Security. Held several positions in 8200, after which spent several years hopping between defensive and offensive security positions.  After having led Application Security and Cloud Security with Sygnia for four years, working with 100+ enterprises on optimizing Cyber resilience,  Daniel Co-Founded Cider Security as the company’s CTO. About Cider: Cider Security is a first-of-its-kind AppSec Operating System that provides Security and Engineering teams a single, consistent method to orchestrate and implement end-to-end CI/CD security through a single, unified platform. The company takes a holistic approach to the security of the engineering processes and systems, from code to deployment. It establishes a comprehensive Technical DNA of the engineering environment, giving Security teams the transparency and visibility needed to optimize AppSec and achieve full resilience. Founded in late 2020 by cybersecurity industry veterans, Guy Flechter and Daniel Krivelevich, Cider Security's mission is to solve the most commonly encountered challenges CISOs and security engineers face today. For more information, visit www.cidersecurity.io/.
25:03
March 22, 2022
Garantir(AppSec) - Season 03/07 - Episode #35
We are airing our sixth episode in Season 3, this season is dedicated to application security, our guest for the show is Kieran Miller is the Chief Architect at Garantir, before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo:  https://garantir.io/contact/ WhitePaper: https://garantir.io/wp-content/uploads/2021/04/Garantir-Deploying-A-Fast-Secure-Code-Signing-System.pdf Kieran: https://www.linkedin.com/in/kieran-miller-0776136/ Kieran Miller is the Chief Architect at Garantir, a cybersecurity company based in San Diego, California. Before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto, which was later acquired by Thales, followed by multiple years as a senior security consultant. With over a decade of cybersecurity experience, Kieran has expertise in multiple dimensions of enterprise security, from data security and identity access management to secure software development. Garantir overview: Garantir is a cybersecurity company that provides advanced cryptographic solutions to the enterprise. The Garantir team has worked on the security needs of businesses of all sizes, from startups to Fortune 500 companies. At the core of Garantir’s philosophy is the belief that securing business infrastructure and data should not hinder performance or interrupt day-to-day operations. With GaraSign, Garantir’s flagship product, private keys remain secured at all times, while a client-side hashing architecture ensures high performance for all cryptographic operations, including code signing, SSH, S/MIME, document signing, TLS, secure backup, and more.
28:09
December 23, 2021
Checkmarx(AppSec) - Season 03/06 - Episode #34
This Season is dedicated to Application security, our guest for the show is James Brotsos Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC:   https://checkmarx.com/product/software-security-platform/ Whitepaper:  https://checkmarx.com/resources/ebooks-and-whitepapers Checmarx: Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry’s most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software—including proprietary code, open-source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. James Brotsos | Product Manager – Developer Experience |  https://www.linkedin.com/in/jbrotsos/ Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx – a leader in Application Security Testing Solutions.  He comes with fifteen years of software engineering experience in network protocol and kernel development. In his spare time, he volunteers mentoring Computer Science high school students in the Bay Area. He is an active “maker”, and his main hobby is following IoT technology and trends.
17:44
December 09, 2021
MoneyBall(AppSec) - Season 03/05 - Episode #33
This Season is dedicated to Application security, our guests for the show are Dino Boukouris and Setu Kulkarni. They are joining us to talk about the Application Security market. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube About Dino: https://www.linkedin.com/in/konstantinosboukouris/ Dino Boukouris is a Founding & Managing Director at Momentum Cyber, the premier strategic advisor to the Cybersecurity industry.  Dino has spent over 16 years in the technology industry with expertise in cybersecurity, finance, strategy, operations, and venture capital & private equity. Dino has been a speaker at Cybersecurity conferences across the country including the RSA Conference, Cybertech Tel Aviv, Structure Security, Global Cyberspace Coop Summit, IoT Security Panel, M&A East, as well as at numerous private events and corporate gatherings.  Dino was also professional faculty at the University of California, Berkeley – Haas School of Business, where he taught a top ranked Venture Capital & Private Equity course for the MBA program. About Setu https://www.linkedin.com/in/setu-kulkarni-6552251/ Setu is a Corporate Strategy & Product Management executive with feet on the ground experience in NAM, Europe & APAC. Currently, he leads product management at Venafi, the leader in Machine Identity Management. At the time of this recording, Setu led product strategy at NTT Security. Prior to NTT Security, he established and led the corporate strategy & PM functions during critical growth years at WhiteHat Security, resulting in its acquisition by NTT Security. Earlier in his career, Setu led platform product strategy & management at TIBCO for Operation Intelligence, Cloud, SOA & BPM products. Setu is a company spokesperson, a speaker at industry & investor events, a podcast host and thought-leader in the Application Security space.
23:57
November 11, 2021
CloudDefense(AppSec) - Season 03/04 - Episode #32
This Season is dedicated to Application security, our guest for the show is Abhi Veldurthy from CloudDefense.  He joins us to discuss their SAST, SCA, and VA solutions. Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC: https://www.clouddefense.ai/request-demo Whitepaper: https://www.clouddefense.ai/ CloudDefense Summary CloudDefense is an Application Security company that provides a single pane of glass view into the overall security health of an organization. It provides tools to discover open source vulnerabilities, open-source licenses, static analysis (SAST), API and Web penetration testing, as well as Cloud Native, Cloud Infra, and Container Vulnerabilities with a few clicks. CloudDefense helps you in preventing accidental slippage of critical security issues in production. Abhi Veldurthy Bio https://www.linkedin.com/in/aveldurthy/ Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy, while leading the engineering efforts at the company. He has a Masters in Information Security from Carnegie Mellon and is deeply passionate about application development and is using this powerful combination to build a holistic security solution at CloudDefense. Prior to joining CloudDefense, Abhi has worked with LinkedIn, Amazon and Yahoo.
31:03
October 14, 2021
Snyk(AppSec) - Season 03/03 - Episode #31
This Season is dedicated to Application security, our guest for the show is Gareth Rushgrove from Snyk.  He joins us to discuss their SAST and SCA solutions. Gareth is VP of Product at Snyk, He is building interesting tools for people to better secure infrastructure and applications   To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC:  https://snyk.io/what-is-snyk/  Whitepaper:  https://go.snyk.io/oreilly-cnas.html Guest's Bio:  Gareth Rushgrove is VP of Product at Snyk, working remotely from Cambridge, UK, helping to build interesting tools for people to better secure infrastructure and applications. He has previously worked for the UK Government focused on infrastructure, operations and information security, as well as at Puppet and Docker. When not working he can be found curating the Devops Weekly newsletter, hiking or reading a good book.  https://www.linkedin.com/in/garethrushgrove/ Company description: Snyk is a developer-first platform for securing code, dependencies, containers, and infrastructure as code.   Snyk’s developer-first approach enables technology-driven companies to scale security in today’s fast-paced digitally transforming world.  Snyk today enables over 2.5 million developers to build securely, with a vision to empower every developer to develop fast and stay secure.
35:29
September 02, 2021
NeuraLegion(AppSec) - Season 03/02 - Episode #30
This Season is dedicated to Application security , our guest for the show is Gadi Bashvitz  from NeuraLegion   He joins us to discuss their DAST solution. Gadi Bashighly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF Season 3  KickOff episode with Tanya Janca Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube Demo/POC:  https://nexploit.app/signup Whitepaper:  https://www.neuralegion.com/whitepapers/creating-implementing-a-modern-day-dast-solution/ Guest's Bio: Gadi Bashvitz is a highly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF and since then he has founded and successfully grew multiple companies in various industries. Gadi has an exceptional ability to distill the essence from complex concepts and communicate them to customers, the team and in various speaking events. He takes a proactive and critical approach to any challenge, identify the opportunity it presents and take advantage of the opportunity. Gadi is the President & Chief Customer Officer at NeuraLegion, driving the DevSecOps revolution. Connect our guest: https://www.linkedin.com/in/bashvitz/ Company Description: NeuraLegion provides solutions for Application security from build to compliance. We offer a developer focused API & Application DAST automation platform. Enhancing DevOps & CI/CD by removing human bottlenecks with no false positives and business logic attacks. Reducing reliance on manual testing, integrated early & often to detect & fix security issues before they hit production. To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
28:56
August 12, 2021
Season 3 Kickoff Episode - Application Security - Tanya Janca - #29
Join us for a Season 3 kickoff Episode, This season we are switching gears from SASE and doing a deep dive in Application Security. We truly believe that Application security is one of the most overlooked domains in cybersecurity. Recent supply chain attacks are great examples of why we decided to bring awareness to the subject. You can learn more about how to maximize the value you get from the various solutions by listening to the kickoff episode regardless if you are a big company or a smaller one We already recorded several great vendors such as Neuralegion Snyk.io Clouddefense.ai, Garantir.io and looking to record several more great vendors We are honored to have Tanya Janca, also known as SheHacksPurple, is the best-selling author of Alice and Bob Learn Application Security. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). Video episode  Kickoff (security-architecture.org) Please subscribe to our podcast and follow our work on Linkedin: https://www.linkedin.com/company/secarchpodcast More about Tanya: https://www.linkedin.com/in/tanya-janca/ To promote our work and support the podcast, please review us here: https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
35:29
August 04, 2021
Google's (BeyondCorp) - SASE (ZTNA) - Season 2 - #28
Jian from Google's (BeyondCorp)  joins us to discuss the #SASE #ZTNA offering.  Jian is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements, or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper https://services.google.com/fh/files/misc/secure_access_to_saas_apps_with_bce.pdf Demo https://zipline.appspot.com/serve/beyond-corp-clickable-demo/beyond-corp-clickable-demo BeyondCorp is Google's implementation of the zero trust model. It builds upon a decade of experience at Google, combined with ideas and best practices from the community. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN. Jian Jian Zhen is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. He has 20 years of experience in the security industry and has worked in various areas including cloud security, EDR, and SIEM. Most recently, Jian was a co-founder of TrustPath that delivered a real-time threat prevention solution. Prior to that, Jian was the SVP of Products at Endgame, an endpoint detection and response company. Jian was also the Director of Cloud Solutions at VMware that delivered vCloud solutions for telcos and data center operators.
36:49
April 22, 2021
Axis Security - SASE (ZTNA) - Season 2 - #27
Gil from Axis Security, joins us to discuss the #SASE #ZTNA offering. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: http://bit.ly/3s7MzA9 Demo: http://bit.ly/3bVRjmJ Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences. Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader. Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel's leading academic institutions. About Axis Axis Security’s fast, simple, and secure approach to application access is built on a zero-trust, agentless-first approach. Application Access Cloud enables more use cases, covering more apps than any other access solution, keeping users off the network and away from the apps themselves. Axis eliminates the need for VPNs, VDIs, network changes, or agents on every device. With Application Access Cloud deployment is fast, access is easy, and the organization is more secure than ever.
33:36
March 18, 2021
BeyondTrust - SASE (ZTNA) - Season 2 - #26
Trevor A. Combs from BeyondTrust joins us to discuss the SASE  ZTNA offering. Trevor is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: https://www.beyondtrust.com/resources/whitepapers/enable-and-secure-your-remote-workforce Demo: https://www.beyondtrust.com/resources/videos/demo-privileged-remote-access About Trevor: Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that, he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction, and Vendor Outsourcing industries. He has over 20 years in the Support and Security space. In Trevor’s free time, he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology, and keep their data and personal information safe. BeyondTrust: Most privileged access management solutions just focus on passwords. BeyondTrust is different. Our innovative Universal Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust's Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks. Trusted by more customers, our Universal
34:20
March 04, 2021
Fortinet - SASE (ZTNA) - Season 2 - #25
Rafi from Fortinet joins us to discuss the #SASE #ZTNA offering. Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). About Rafi: Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. Prior to joining Fortinet as a Systems Engineer, Rafi worked with Fortune 25 companies to analyze, decode, and respond to Advanced Persistent Threats from one of North America’s premier Security Operations Centres. Building on this experience, Rafi was charged with architecting and implementing advanced security and monitoring infrastructure protecting sensitive corporate and government data on a global basis. Rafi holds several industry certifications from the SANS institute. About Frotinet The Fortinet Security Fabric platform secures the largest enterprise, service provider, and government organizations around the world. More than 455,000 customers trust Fortinet to protect their organizations.
19:30
February 26, 2021
Remote Access, Moneyball with Greg Irvin from BWG Strategy #24
We are airing a special episode as part of our season one where we talk about industry leaders from many different angles. Our guest for the show is Greg Irwin, Greg is Co-Founder and Moderator at BWG    Today we are talking about one of the main aspects of any company, MONEY.    Topics on the show   Let’s discuss the Enterprise Security Market, and why it's so important to investors right now How resilient is investor interest in Enterprise Security? How does ZT compare to other major themes in enterprise security - supply chain security, data governance security, cloud security, remote workers? How do different investors (VC, PE, Public Equity) view the Enterprise Security Market? Given the crowded security vendor market, how does a vendor cause disruption and differentiate? How are the winners selected? How are the platform vendors viewed compared to the security best-of-breed vendors? What are investors expecting with regards to the impact of COVID on the market in 2021 and beyond? Greg's Bio Greg Irwin is Co-Founder and Moderator at BWG Strategy and has 20+ years of experience in the Technology market. Having spent nearly a decade at Avaya and the last seven years moderating industry forums on everything from Enterprise Software, Cyber Security, IT Infrastructure and beyond, Greg has a fantastic pulse technology trends, tech roadmaps, and which solution vendors are on the cutting edge of innovation.  From 1994-2001, Greg worked in investment banking at Salmon Smith Barney / Citigroup covering Technology/Telecom. Greg earned a Bachelor of Engineering from Dartmouth College.  He lives in Westfield, NJ with his wife Hillary and two children. BWG Description Through its virtual forums, BWG Strategy brings together skilled professionals to share experiences, learn and build valuable relationships all while providing timely primary research on real-world trends and unique insights. https://bwgstrategy.com/
25:18
February 23, 2021
Akamai - SASE (ZTNA) - Season 2 - #23
Sriram from Akamai joins us to discuss the #SASE #ZTNA offering. Sriram is a Product Line director within Akamai’s Enterprise Division He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Product Whitepaper: Product Demo: About Sriram: Sriram Balasubramanian is a Product Line director within Akamai’s Enterprise Division. He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields including Networking, Security and Internet of Things. Prior to Akamai, Sriram spent 7 years with Cisco Systems leading various emerging initiatives within the company. Sriram holds a Bachelor and Master’s degree in computer science. About Akamai: Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone – and attacks and threats far away.
31:24
February 18, 2021
Tehama- SASE (ZTNA) - Season 2 - #22
Paul Vallée from Tehama joins us to discuss the SASE  ZTNA offering. Paul is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Overall Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo: Whitepaper Paul Vallée is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet. In 1997, he founded Pythian, a data-centric services business with a focus on remote work. Under his leadership, the company developed groundbreaking tools that enable remote teams to work and interact seamlessly and securely across multiple continents. Tehama was born at Pythian, launched to the public in 2018 and, due to rapid adoption of the platform, spun out to become fully independent in 2019. Paul is active in the Council of Canadian Innovators and the CIO Strategy Council and serves on the board of the Basic Income Canada Network. In 2016 he was named Diversity Champion of the Year by Women in Technology and Communications. About Tehama Tehama’s Enterprise Desktop as a Service (DaaS) is the fastest, easiest, most secure way to deploy a virtual workforce. With our next-generation DaaS platform, enterprises can create cloud-based virtual offices, rooms, and desktops anywhere in the world. No other solution on the market today connects remote workers with mission-critical and data-sensitive systems, with the speed, agility, unparalleled security, and comprehensive audit trail via built-in SOC 2 controls, real-time activity feeds, and session recordings that Tehama offers. For more information, visit tehama.io.
38:10
February 04, 2021
Palo Alto Networks - SASE (ZTNA) - Season 2 - #21
Jason Georgi from Palo Alto Networks joins us to discuss the SASE  ZTNA offering. Jason is an accomplished technology executive with 25 years of experience. He is currently the Field Chief Technology Officer for Prisma Access and SaaS In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo Whitepaper About Palo Alto Networks Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. PaloAlto mission is to be the cybersecurity partner of choice, protecting our digital way of life. PaloAlto help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, PaloAlto is  at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. RI24qJv6dtliBXj0kHCr
34:19
January 28, 2021
Twingate- SASE (ZTNA) - Season 2 - #20
Alex Marshall from Twingate joins us to discuss the SASE  ZTNA offering. Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper: Demo/POC: About Alex : Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years, including at Dropbox, where he was the first enterprise hire in the company's transformation from consumer to enterprise business. A focus of his product career has been using the power of design thinking to make technically complex products intuitive and easy to use. Alex graduated from Stanford University with a degree in Electrical Engineering. https://www.linkedin.com/in/awmars/ About Twingate: Twingate provides a simple, modern approach to securing online work. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud. RI24qJv6dtliBXj0kHCr
36:42
January 21, 2021
CheckPoint- SASE (ZTNA) - Season 2 - #19
Noa Zilberman from Checkpoint joins us to discuss the SASE  ZTNA offering. Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo: https://pages.checkpoint.com/corporate-access-demo.html Whitepaper https://www.checkpoint.com/products/remote-user-secure-access/ About Noa Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point. Odo is a clientless, cloud-hosted platform for easy and secure access to corporate resources without VPNs. Before Odo, Noa served in unit 8200 as a network researcher, leading an independent project resulting in new capabilities for the Israeli army. https://www.linkedin.com/in/noa-zilberman/ About Checkpoint Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive, consolidated and effective security solutions in the marketplace. Check Point protects over 100,000 organizations of all sizes.
24:49
January 14, 2021
Iboss- SASE (ZTNA) - Season 2 - #18
Paul Martini from IBOSS  joins us to discuss the SASE  ZTNA offering. Paul is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was a key architect for a wide variety of complex security and technology solutions. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). DEMO https://www.iboss.com/request-demo/ White paper https://www.iboss.com/sase/ More about Paul Paul Martini is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide variety of complex security and technology solutions for clients such as Phogenix, the U.S. Navy, and Hewlett Packard. He was also a key contributor at Copper Mountain Networks which was a pioneer in introducing broadband networks used by Telcos to build the cloud. Paul has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of The Year award and being named one of Goldman Sachs’ 100 Most Intriguing Entrepreneurs. About IBOSS The iboss cloud platform delivers all network security capabilities in the cloud via a SaaS offering. This eliminates the need for traditional network security appliances allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity. The future of network security is in the cloud and iboss can make that a reality today as a robust implementation of the Gartner SASE model.
34:30
December 17, 2020
Appgate- SASE (ZTNA) - Season 2 - #17
Jason Garbis from Appgate joins us to discuss the SASE  ZTNA offering. Jason is Senior Vice President of Products for Appgate, responsible for the company's security product strategy and product management. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper : https://d3aafpijpsak2t.cloudfront.net/docs/Whitepapers/WP_Definitive_Guide_SDP_092020.pdf?mtime=20200921102233&focal=none&utm_source=website&utm_campaign=rebranded_website2020 Demo https://ww3.appgate.com/cp/sdp_test-drive About Jason Jason Garbis Jason Garbis is Senior Vice President of Products for Appgate, responsible for the company's security product strategy and product management, and held a similar leadership role at Cryptzone prior to its acquisition by Appgate/Cyxtera. Garbis is also co-chair of the SDP Zero Trust Working Group at the Cloud Security Alliance, where he helps lead research and publication initiatives. Garbis has over 30 years of product management, engineering, and consulting experience at security and technology firms, including RSA, where he focused on identity management and governance products. Garbis hold a CISSP certification, has a Bachelor’s degree in Computer Science from Cornell University, a High-Technology MBA from Northeastern University, and is a published author. He is also co-chair of the Boston chapter of the Cloud Security Alliance. https://www.linkedin.com/in/jasongarbis/ About AppGate: Appgate is a secure access company that provides cybersecurity solutions for people, devices and systems based on the principles of Zero Trust security.  Through a set of differentiated cloud and hybrid security products, Appgate enables enterprises to easily and effectively shield against cyber threats. Appgate serves 3,960 customers across more than 30 countries
36:25
December 10, 2020
Zscaler - SASE (ZTNA) - Season 2 - #16
Nathan Howe from Zscaler joins us to discuss their SASE ZTNA solution. Nathan is a Director for Transformation Strategy, Nathan leverages this experience as an Architect, Pen Tester, Manager, and Security Assessor to help guide companies through their transformation challenges. In the Season 2 Kick-off episode, we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper : https://info.zscaler.com/resources-white-papers-zpa-definitive-guide-to-secure-remote-access Demo  https://www.zscaler.com/products/secure-access-service-edge About Nathan Nathan Howe has 20+ years in security experience across a multitude of organisations including governments enterprises and telco service providers. As a Director for Transformation Strategy, Nathan leverages this experience as an Architect, Pen Tester, Manager and Security Assessor to help guide companies through their transformation challenges. Prior to joining the Zscaler team in 2016 Nathan ended his 12 years at Nestle by successfully delivering Nestle´s Global Cyber Security Compliance. Connect our guest: https://www.linkedin.com/in/nbhowe/ About Zscaler: Zscaler accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
44:12
December 03, 2020
Netskope- SASE (ZTNA) - Season 2 #15
This Season is dedicated to SASE  ZTNA, our guest for the show is Michael. Michael is a Principal Global Solution Architect with Netskope.  In his role, he advises Netskope customers on best practices around Netskope deployments and integrating Netskope solutions within customer environments by leveraging integration with the customer technology ecosystem. We are focusing on one part of SASE related to ZTNA/Remote Access  In the Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.  Episode #11 For slides and please refer to our website  and watch the video episode  The question we ask the vendors: 1. What's the name of the offering/product addressing the remote access. 2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. 3. How do you license your product? (seats, devices, concurrent connections, bandwidth). 4. How do you tie back to the User Identity and MFA? 5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). 6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.  7. How would your solution work on slow networks or when the user is roaming between networks? 8. Educate us more about your product’s reporting and alerting options (including UBA). Demo/POC:  https://resources.netskope.com/product-demos/demo-netskope-private-access Link to Whitepaper:  https://resources.netskope.com/cloud-security-solution-white-papers/zero-trust-leading-practice Our site: www.security-architecture.org Michael Bio  https://www.linkedin.com/in/michael-koyfman-0a3662/ Michael Koyfman is a Principal Global Solution Architect with Netskope.  In his role, he advises Netskope customers on best practices around Netskope deployments and integrating Netskope solutions within customer environments by leveraging integration with the customer technology ecosystem.  He also actively participates in driving and adopting new Netskope product, such as  Netskope for IaaS and Netskope For Web within the Netskope customer base.  Prior to Netskope, Michael spent almost 13 years at F5 Networks as Senior Global Solution Architect, where he was focused on the entire portfolio of F5 security products, and has been a key contributor to implementation, strategy, and evolution of F5 security solutions and portfolio.   Michael helped architect, develop, and demonstrate various unique solutions and integration with various technology and players such as Microsoft, Citrix, Vmware, Okta, Ping, IBM, CrowdStrike, AWS, Azure. Company Description: The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
36:21
November 26, 2020
Bitglass- SASE (ZTNA) - Season 2 - #14
This Season is dedicated to SASE  ZTNA, our guest for the show is Mike. Mike Schuricht has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products,  Bitglass private access is a surgical way of allowing particular access for a particular user to the particular application as opposed to exposing the entire network. We are focusing on one part of SASE related to ZTNA/Remote Access  In the Season 2 Kick-off episode, we introduced the topic with Dr. Chase Cunningham(Episode #11)  For slides and please refer to our website  and watch the video episode  The question we ask the vendors: 1. What's the name of the offering/product addressing the remote access. 2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. 3. How do you license your product? (seats, devices, concurrent connections, bandwidth). 4. How do you tie back to the User Identity and MFA? 5. Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). 6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.  7. How would your solution work on slow networks or when the user is roaming between networks? 8. Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper:  https://www.bitglass.com/zero-trust-network-access Demo/POC: https://pages.bitglass.com/Bitglass_CASB_Demo.html Mike Bio https://www.linkedin.com/in/mschuricht/ Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products, with expertise in configuration management, user-interface design, networking, and enterprise software. Prior to joining Bitglass, Mike was a PM at Palo Alto Networks leading management software and user-interface strategy for both Panorama and PAN-OS. Before that, he held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal business unit. Mike earned an MS in Electrical and Computer Engineering and BS in Computer Engineering from the University of California, Santa Barbara. Company Description "Bitglass, the Next-Gen Cloud Security company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
29:36
November 19, 2020
Perimeter 81 - SASE (ZTNA) - Season 2 - #13
This Season is dedicated to SASE  ZTNA, our guest for the show is Amit. Amit Bareket, CEO and Co-Founder of Perimeter 81, is a cybersecurity expert with extensive experience in system architecture and software development. We are focusing on one part of SASE related to ZTNA/Remote Access Amit, CEO of Perimeter 81, strongly believes we can't compete with physics while adopting the superpower of WireGuard, the hottest thing in the P2P VPN protocols. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham https://youtu.be/lDSTnC_7jww For the video version(slides) and please refer to our website  and watch the video episode  The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo/POC: https://www.perimeter81.com/demo Link to Whitepaper: https://www.perimeter81.com/solutions/sase Our site: www.security-architecture.org Amit Bio Amit Bareket, CEO and Co-Founder of Perimeter 81, is a cybersecurity expert with extensive experience in system architecture and software development. He is the author of 8 patents issued by the USPTO for storage, mobile applications and user interface. Prior to Perimeter 81, Amit founded SaferVPN, sold in 2019 to J2 Global, and worked as a Software Engineer for major enterprises including IBM XIV Storage and BigBand Networks. He served in the Israel Defense Force’s elite cyber intelligence unit and graduated Cum Laude with a B.Sc. in Computer Science and Economics from Tel Aviv University. https://www.linkedin.com/in/amit-bareket-638a8b18/ Perimeter 81 Description Perimeter 81 is a leading SASE provider that has transformed the outdated, hardware-based security appliances into a cloud-based SaaS solution — simplifying secure access for the modern and distributed workforce. Perimeter 81 is trusted by thousands of companies, of all sizes and sectors, and our partners are among the world's foremost managed service providers and channel resellers.
33:35
November 12, 2020
Season 2 Kickoff Episode - SASE (ZTNA) #11
Join us for a Season 2 kickoff discussion, we continue our journey exploring SASE the season is about ZTNA and Remote Access. We were honored to have Dr. Chase Cunningham to join us for the kickoff episode. Dr. Cunningham is a retired Navy Chief Cryptologist with more than 19 years of experience in Cyber Forensic and Analytic Operations currently he is a Principal Analyst and VP covering the ZTNA space. We are thrilled to bring to this season the key players providing ZTNA Remote Access solutions. We were able to get both very established market leaders and disrupting and innovative new companies as well as companies in a process of a merge.  We have more than a dozen companies who agreed to take part in our project and share with us their architectures and answer our questions. Please subscribe to our podcast and follow our work on Linkedin  More about Dr. Chase Cunningham  To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
16:04
November 09, 2020
McAfee, SASE Outbound inspection and protection #10
This Season is dedicated to SASE Our guest for the show is Brian Brown, Brian has been an IT professional for 25 years. As a Regional Solution Architect, he is involved with large Enterprise customers in Canada and the US, and is engaged to architect large scale deployments both for customers and MSP partners. A member of ISACA and IASA Global, Brian often speaks at both industry and McAfee events about how to address business objectives with advanced security architecture in Security Operations and Cloud. We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides/video lease refer to our website  and watch the video episode  https://www.security-architecture.org/episodes/s01e10_Mcafee You can check the questions we ask our vendors. whitepaper: https://www.mcafee.com/enterprise/en-us/solutions/unified-cloud-edge.html POC: https://www.mcafee.com/enterprise/en-us/forms/demo-request-uce.html?eid=3JDXUM9C Our site: www.security-architecture.org About McAfee: McAfee believes that no one person, product, or organization can fight cybercrime alone. It’s why McAfee rebuilt the idea of working together. People working together. Products working together. Organizations and industries working together.  McAfee's goal is to spread this collaborative attitude to our customers, partners, even competitors. All uniting to overcome the greatest challenge of the digital age—cybercrime—and making the connected world more secure. More about Brian: https://www.linkedin.com/in/brian-brown-b20256159/
01:03:05
October 26, 2020
Cato Networks, SASE Outbound inspection and protection #9
This Season is dedicated to SASE Our guest for the show is Dave Greenfield is a veteran of IT industry. He’s spent more than 20 years as an award-winning journalist and independent technology consultant. Today, he serves as a secure networking evangelist for Cato Networks. We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website  and watch the video episode  You can check the questions we ask our vendors. Whitepaper: https://www.catonetworks.com/sase/ POC: https://www.catonetworks.com/try Our site: www.security-architecture.org About Cato: Cato is the world’s first SASE platform, converging SD-WAN and network security into a global, cloud-native service. Cato optimizes and secures application access for all users and locations. Using Cato, customers easily migrate from MPLS to SD-WAN, optimize connectivity to on-premises and cloud applications, enable secure branch Internet access everywhere, and seamlessly integrate cloud datacenters and mobile users into the network with a zero-trust architecture. With Cato, the network, and your business, are ready for whatever’s next. More about Dave https://www.linkedin.com/in/davidgreenfield/ #sase #cybersecurity #infosec #cybersec #cyber #infosecurity #secarch #sasecybersummit #cyberawareness #securityarchitecture #workfromanywhere #cybersecuritynews
01:07:52
September 17, 2020
SASE Moneyball Dino Momentum cyber #8
We are airing a special episode as part of our season one where we talk about SASE with industry leaders from many different angles. Today we are talking about one of the main aspects of any company, MONEY. And who is the right person to talk about funds is people that help companies raise money and buy other companies, we have Dino from Momentum cyber. Dino Boukouris is a Founding Director at Momentum Cyber, the premier strategic advisor to the Cybersecurity industry. If the company doesn’t have funds, it will not be able to develop new features and support its infrastructure and customers. Funds are especially important in the SASE market since the company assumes to have cloud presence and cloud presence means that companies need to maintain big cloud infrastructure or pay 3rd party vendors for such infrastructure. What is the total addressable market of SASE ? What so special about Israel and cybersecurity Would it be bigger than the firewall market? Where is the best food in Tel-Aviv Would EDR/EPP vendors take part in such a market. How crowded is the space? Would Google, AWS or Microsoft be part of the space? Recent notable transactions in this space Join and listen to get answers on some of the questions and much more Don’t forget to share and subscribe Dino full bio Dino has been a speaker at Cybersecurity conferences across the country including the RSA Conference, Cybertech Tel Aviv, Structure Security, Global Cyberspace Coop Summit, IoT Security Panel, M&A East 2017, as well as at numerous private events and corporate gatherings.  Dino is also professional faculty at the University of California, Berkeley – Haas School of Business, where he teaches a top ranked Venture Capital & Private Equity course for the MBA program. Momentum cyber: Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem. We advise on a broad range of strategic activities, including mergers and acquisitions, board & special situations, corporate strategy & development, corporate finance, and operational excellence. Mailing list and past industry reports https://momentumcyber.com/intel/ #cybersecurity #investment #infosec #acquisition #secarch #SASE
33:27
September 09, 2020
IBOSS, SASE Outbound inspection and protection #7
This Season is dedicated to SASE Our guest for the show is  Paul Martini. Paul is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide-variety of complex security and technology solutions for clients such as Phoenix, the U.S. Navy, and Hewlett Packard. We are focusing on a small part of SASE related to user browsing and access resources on the internet.  To promote our work and support the podcast , please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website and watch the video episode ( need link to episode) You can check the questions we ask our vendors. About Vendor: The iboss cloud platform delivers all network security capabilities in the cloud via a SaaS offering. This eliminates the need for traditional network security appliances allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity. The future of network security is in the cloud and iboss can make that a reality today as a robust implementation of the Gartner SASE model. Links to more information about Vendor: Whitepaper https://www.iboss.com/the-platform/secure-cloud-gateway-network-security-as-a-service/ POC https://www.iboss.com/request-demo/ More about Paul Paul Martini is the CEO, Co-founder and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide-variety of complex security and technology solutions for clients such as Phogenix, the U.S. Navy, and Hewlett Packard. He was also a key contributor at Copper Mountain Networks which was a pioneer in introducing broadband networks used by Telcos to build the cloud. Paul has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of The Year award and being named one of Goldman Sachs’ 100 Most Intriguing Entrepreneurs. https://www.linkedin.com/in/martinipaul/
01:04:31
August 20, 2020
Forcepoint, SASE Outbound inspection and protection #6
This Season is dedicated to SASE Our guest for the show is Jim Fulton, Jim is Forcepoint’s director of Cloud and Edge Protection solutions.We are focusing on a small part of SASE related to user browsing and access resources on the internet.  In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website   and watch the video episode  To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Vendor: Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries. Links to more information about Vendor: Whitepaper https://www.forcepoint.com/blog/tags/sase: POC: https://www.forcepoint.com/product/dynamic-edge-protection More about Jim Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries. https://www.linkedin.com/in/fultonjim/
01:26:49
August 13, 2020
Checkpoint, SASE Outbound inspection and protection #5
This Season is dedicated to SASE Our guest for the show is Gregory Paper, Greg is a Security Architect and Evangelist with over 13 years at Check Point Software Technologies We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website and watch the video episode To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Vendor: Whitepaper: https://www.checkpoint.com/products/branch-cloud-security/ POC: https://portal.checkpoint.com/signin Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive, consolidated and effective security solutions in the marketplace. Check Point protects over 100,000 organizations of all sizes More about Greg Greg Pepper is a Security Architect and Evangelist with over 13 years at Check Point Software Technologies. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. Prior to Check Point, Greg has worked at well-known companies like Cisco, Sony Online Entertainment, Price Waterhouse Coopers and Organic. https://www.linkedin.com/in/gregorypepper/
51:52
August 06, 2020
Netskope, SASE Outbound inspection and protection #4
This Season is dedicated to SASE Our guest for the show is Bob Gilbert, Bob is a product marketing leader with a proven track record in Silicon Valley We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website  and watch the video episode To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Vendor: The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope. Link to demo or trial registration: https://www.netskope.com/why-netskope https://resources.netskope.com/product-demos More about Bob Gilbert:  https://www.linkedin.com/in/bobegilbert/ Bob is a product marketing leader with a proven track record in Silicon Valley. Bob enjoys working in fast-paced start-up environments where and leverages his skills and experience to launch products and showcase innovative technology. He is a prolific speaker, evangelist, motivator, and hands-on product demonstrator. Bob loves to build world-class teams that are wicked smart, work hard, but also know how to have fun on their path towards success.
01:09:43
July 30, 2020
Zscaler, SASE Outbound inspection and protection #3
This Season is dedicated to SASE Our guest for the show is Patrick Foxhoven is the CIO and Vice President of Emerging Technologies at Zscaler. We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website and watch the video episode. To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Zscaler: "Zscaler is a global cloud-based security company that enables organizations to securely transform their networks and applications for a mobile and cloud-first world, and protects against cyberattacks and data loss. Zscaler is a secure access service edge (SASE) service built from the ground up for performance and scalability. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances are unable to match. Links to more information about Zsclaer Link to demo or trial registration: www.zscaler.com/products/secure-access-service-edge More about Patrick:  https://www.linkedin.com/in/pfoxhoven/ Patrick Foxhoven is the CIO and Vice President of Emerging Technologies at Zscaler. He is an experienced and innovative managed security entrepreneur and technologist, having spent 20 years building secure and scalable internet-enabled networks while co-authoring three books on information security and receiving multiple patents. He is currently Chief Information Officer & Vice President of Emerging Technologies at Zscaler
01:16:54
July 23, 2020
Bitglass, SASE Outbound inspection and protection #2
This Season is dedicated to SASE. Our guest for the show is Mike Schuricht (VP Product Management), Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013.  We are focusing on s small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin You can check the questions we ask our vendors.  To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 For slides and please refer to our website  and watch the video episode About Bitglass:  "Bitglass, the Next-Gen Cloud Security company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution". AS part of Bitglass innovation, they announced their support and availability of Smart Edge Secure Webgate earlier in 2020.  Links to more information about Bitglass Whitepaper: Bitglass SASE architecture Request a Demo -Bitglass Technical Brief: SmartEdge Secure Web Gateway More about Mike:  Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products, with expertise in configuration management, user-interface design, networking, and enterprise software. Prior to joining Bitglass, Mike was a PM at Palo Alto Networks leading management software and user-interface strategy for both Panorama and PAN-OS. Before that, he held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal business unit. Mike earned an MS in Electrical and Computer Engineering and BS in Computer Engineering from the University of California, Santa Barbara.
56:58
July 09, 2020
Kickoff Episode - SASE (Secure Access Service Edge) #1
Join us for a kickoff discussion with security expert Dr. Anton Chuvakin, one of the known Gartner veterans and author of many security books and publications. We invited Dr. Chuvakin to discuss and introduce the topic of our first Season - SASE. Gartner defines SASE (pronounced as "sassy") as a package of technologies including SD-WAN, SWG, CASB, ZTNA, DLP, IDP, FWaaS, and others as core abilities.  We identified multiple vendors on the market; some of them are SWG who are trying to break into CASB, and some of them are CASB who are trying to break into SWG as well as FW and SDWAN vendors who are looking their way into SASE. Since the topic is so wide, we decided to keep our focus at the user accessing the internet capabilities of SASE and cover other parts of SASE such as remote-access in the future Seasons. Please subscribe to our mailing list  and podcast  To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
29:31
June 29, 2020
Welcome To Security Architecture Podcast
Meet Evgeniy and Dmitry the co-host of the Security Architecture Podcast. Our cybersecurity focused podcast will promote the best architectural practices and gather important information from vendors while translating it into a format that can be easily consumed by the podcast audience. It will answer the main questions about a specific product, it's features and ways to use it in different environments. Manifesto Our manifesto based on six basic principles: Solution providers are allowed to share only publicly available information. Our experienced co-host team will be preparing the questions while combining your feedback with our domain knowledge. All the companies will have to address the same questions during the podcast with slight modifications around the same context. The vendors are allowed to show live how their products answer the questions while keeping the answers around 2 - 3 minutes by screen sharing. Companies are not allowed to compare their solutions to their competitors in slides or verbally, we as podcast hosts always will stay neutral and not going to favor one vendor over another. To provide the vendors with equal starting conditions, we will be publishing the podcasts in batches of 5 - 8 vendors at a time.
03:21
June 12, 2020