Skip to main content
Security Architecture Podcast

Security Architecture Podcast

By Evgeniy Kharam & Dmitry Raidman
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
Listen on
Where to listen
Apple Podcasts Logo

Apple Podcasts

Breaker Logo

Breaker

Castbox Logo

Castbox

Google Podcasts Logo

Google Podcasts

Overcast Logo

Overcast

Pocket Casts Logo

Pocket Casts

RadioPublic Logo

RadioPublic

Spotify Logo

Spotify

Google's (BeyondCorp) - SASE (ZTNA) - Season 2 - #28
Jian from Google's (BeyondCorp)  joins us to discuss the #SASE #ZTNA offering.  Jian is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements, or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper https://services.google.com/fh/files/misc/secure_access_to_saas_apps_with_bce.pdf Demo https://zipline.appspot.com/serve/beyond-corp-clickable-demo/beyond-corp-clickable-demo BeyondCorp is Google's implementation of the zero trust model. It builds upon a decade of experience at Google, combined with ideas and best practices from the community. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN. Jian Jian Zhen is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. He has 20 years of experience in the security industry and has worked in various areas including cloud security, EDR, and SIEM. Most recently, Jian was a co-founder of TrustPath that delivered a real-time threat prevention solution. Prior to that, Jian was the SVP of Products at Endgame, an endpoint detection and response company. Jian was also the Director of Cloud Solutions at VMware that delivered vCloud solutions for telcos and data center operators.
36:49
April 22, 2021
Axis Security - SASE (ZTNA) - Season 2 - #27
Gil from Axis Security, joins us to discuss the #SASE #ZTNA offering. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: http://bit.ly/3s7MzA9 Demo: http://bit.ly/3bVRjmJ Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences. Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader. Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel's leading academic institutions. About Axis Axis Security’s fast, simple, and secure approach to application access is built on a zero-trust, agentless-first approach. Application Access Cloud enables more use cases, covering more apps than any other access solution, keeping users off the network and away from the apps themselves. Axis eliminates the need for VPNs, VDIs, network changes, or agents on every device. With Application Access Cloud deployment is fast, access is easy, and the organization is more secure than ever.
33:36
March 18, 2021
BeyondTrust - SASE (ZTNA) - Season 2 - #26
Trevor A. Combs from BeyondTrust joins us to discuss the SASE  ZTNA offering. Trevor is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). White paper: https://www.beyondtrust.com/resources/whitepapers/enable-and-secure-your-remote-workforce Demo: https://www.beyondtrust.com/resources/videos/demo-privileged-remote-access About Trevor: Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that, he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction, and Vendor Outsourcing industries. He has over 20 years in the Support and Security space. In Trevor’s free time, he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology, and keep their data and personal information safe. BeyondTrust: Most privileged access management solutions just focus on passwords. BeyondTrust is different. Our innovative Universal Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust's Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks. Trusted by more customers, our Universal
34:20
March 4, 2021
Fortinet - SASE (ZTNA) - Season 2 - #25
Rafi from Fortinet joins us to discuss the #SASE #ZTNA offering. Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). About Rafi: Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. Prior to joining Fortinet as a Systems Engineer, Rafi worked with Fortune 25 companies to analyze, decode, and respond to Advanced Persistent Threats from one of North America’s premier Security Operations Centres. Building on this experience, Rafi was charged with architecting and implementing advanced security and monitoring infrastructure protecting sensitive corporate and government data on a global basis. Rafi holds several industry certifications from the SANS institute. About Frotinet The Fortinet Security Fabric platform secures the largest enterprise, service provider, and government organizations around the world. More than 455,000 customers trust Fortinet to protect their organizations.
19:30
February 26, 2021
Remote Access, Moneyball with Greg Irvin from BWG Strategy #24
We are airing a special episode as part of our season one where we talk about industry leaders from many different angles. Our guest for the show is Greg Irwin, Greg is Co-Founder and Moderator at BWG    Today we are talking about one of the main aspects of any company, MONEY.    Topics on the show   Let’s discuss the Enterprise Security Market, and why it's so important to investors right now How resilient is investor interest in Enterprise Security? How does ZT compare to other major themes in enterprise security - supply chain security, data governance security, cloud security, remote workers? How do different investors (VC, PE, Public Equity) view the Enterprise Security Market? Given the crowded security vendor market, how does a vendor cause disruption and differentiate? How are the winners selected? How are the platform vendors viewed compared to the security best-of-breed vendors? What are investors expecting with regards to the impact of COVID on the market in 2021 and beyond? Greg's Bio Greg Irwin is Co-Founder and Moderator at BWG Strategy and has 20+ years of experience in the Technology market. Having spent nearly a decade at Avaya and the last seven years moderating industry forums on everything from Enterprise Software, Cyber Security, IT Infrastructure and beyond, Greg has a fantastic pulse technology trends, tech roadmaps, and which solution vendors are on the cutting edge of innovation.  From 1994-2001, Greg worked in investment banking at Salmon Smith Barney / Citigroup covering Technology/Telecom. Greg earned a Bachelor of Engineering from Dartmouth College.  He lives in Westfield, NJ with his wife Hillary and two children. BWG Description Through its virtual forums, BWG Strategy brings together skilled professionals to share experiences, learn and build valuable relationships all while providing timely primary research on real-world trends and unique insights. https://bwgstrategy.com/
25:18
February 23, 2021
Akamai - SASE (ZTNA) - Season 2 - #23
Sriram from Akamai joins us to discuss the #SASE #ZTNA offering. Sriram is a Product Line director within Akamai’s Enterprise Division He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Product Whitepaper: Product Demo: About Sriram: Sriram Balasubramanian is a Product Line director within Akamai’s Enterprise Division. He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields including Networking, Security and Internet of Things. Prior to Akamai, Sriram spent 7 years with Cisco Systems leading various emerging initiatives within the company. Sriram holds a Bachelor and Master’s degree in computer science. About Akamai: Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone – and attacks and threats far away.
31:24
February 18, 2021
Tehama- SASE (ZTNA) - Season 2 - #22
Paul Vallée from Tehama joins us to discuss the SASE  ZTNA offering. Paul is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Overall Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo: Whitepaper Paul Vallée is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet. In 1997, he founded Pythian, a data-centric services business with a focus on remote work. Under his leadership, the company developed groundbreaking tools that enable remote teams to work and interact seamlessly and securely across multiple continents. Tehama was born at Pythian, launched to the public in 2018 and, due to rapid adoption of the platform, spun out to become fully independent in 2019. Paul is active in the Council of Canadian Innovators and the CIO Strategy Council and serves on the board of the Basic Income Canada Network. In 2016 he was named Diversity Champion of the Year by Women in Technology and Communications. About Tehama Tehama’s Enterprise Desktop as a Service (DaaS) is the fastest, easiest, most secure way to deploy a virtual workforce. With our next-generation DaaS platform, enterprises can create cloud-based virtual offices, rooms, and desktops anywhere in the world. No other solution on the market today connects remote workers with mission-critical and data-sensitive systems, with the speed, agility, unparalleled security, and comprehensive audit trail via built-in SOC 2 controls, real-time activity feeds, and session recordings that Tehama offers. For more information, visit tehama.io.
38:10
February 4, 2021
Palo Alto Networks - SASE (ZTNA) - Season 2 - #21
Jason Georgi from Palo Alto Networks joins us to discuss the SASE  ZTNA offering. Jason is an accomplished technology executive with 25 years of experience. He is currently the Field Chief Technology Officer for Prisma Access and SaaS In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo Whitepaper About Palo Alto Networks Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. PaloAlto mission is to be the cybersecurity partner of choice, protecting our digital way of life. PaloAlto help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, PaloAlto is  at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. RI24qJv6dtliBXj0kHCr
34:19
January 28, 2021
Twingate- SASE (ZTNA) - Season 2 - #20
Alex Marshall from Twingate joins us to discuss the SASE  ZTNA offering. Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper: Demo/POC: About Alex : Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years, including at Dropbox, where he was the first enterprise hire in the company's transformation from consumer to enterprise business. A focus of his product career has been using the power of design thinking to make technically complex products intuitive and easy to use. Alex graduated from Stanford University with a degree in Electrical Engineering. https://www.linkedin.com/in/awmars/ About Twingate: Twingate provides a simple, modern approach to securing online work. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud. RI24qJv6dtliBXj0kHCr
36:42
January 21, 2021
CheckPoint- SASE (ZTNA) - Season 2 - #19
Noa Zilberman from Checkpoint joins us to discuss the SASE  ZTNA offering. Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo: https://pages.checkpoint.com/corporate-access-demo.html Whitepaper https://www.checkpoint.com/products/remote-user-secure-access/ About Noa Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point. Odo is a clientless, cloud-hosted platform for easy and secure access to corporate resources without VPNs. Before Odo, Noa served in unit 8200 as a network researcher, leading an independent project resulting in new capabilities for the Israeli army. https://www.linkedin.com/in/noa-zilberman/ About Checkpoint Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive, consolidated and effective security solutions in the marketplace. Check Point protects over 100,000 organizations of all sizes.
24:49
January 14, 2021
Iboss- SASE (ZTNA) - Season 2 - #18
Paul Martini from IBOSS  joins us to discuss the SASE  ZTNA offering. Paul is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was a key architect for a wide variety of complex security and technology solutions. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). DEMO https://www.iboss.com/request-demo/ White paper https://www.iboss.com/sase/ More about Paul Paul Martini is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide variety of complex security and technology solutions for clients such as Phogenix, the U.S. Navy, and Hewlett Packard. He was also a key contributor at Copper Mountain Networks which was a pioneer in introducing broadband networks used by Telcos to build the cloud. Paul has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of The Year award and being named one of Goldman Sachs’ 100 Most Intriguing Entrepreneurs. About IBOSS The iboss cloud platform delivers all network security capabilities in the cloud via a SaaS offering. This eliminates the need for traditional network security appliances allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity. The future of network security is in the cloud and iboss can make that a reality today as a robust implementation of the Gartner SASE model.
34:30
December 17, 2020
Appgate- SASE (ZTNA) - Season 2 - #17
Jason Garbis from Appgate joins us to discuss the SASE  ZTNA offering. Jason is Senior Vice President of Products for Appgate, responsible for the company's security product strategy and product management. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper : https://d3aafpijpsak2t.cloudfront.net/docs/Whitepapers/WP_Definitive_Guide_SDP_092020.pdf?mtime=20200921102233&focal=none&utm_source=website&utm_campaign=rebranded_website2020 Demo https://ww3.appgate.com/cp/sdp_test-drive About Jason Jason Garbis Jason Garbis is Senior Vice President of Products for Appgate, responsible for the company's security product strategy and product management, and held a similar leadership role at Cryptzone prior to its acquisition by Appgate/Cyxtera. Garbis is also co-chair of the SDP Zero Trust Working Group at the Cloud Security Alliance, where he helps lead research and publication initiatives. Garbis has over 30 years of product management, engineering, and consulting experience at security and technology firms, including RSA, where he focused on identity management and governance products. Garbis hold a CISSP certification, has a Bachelor’s degree in Computer Science from Cornell University, a High-Technology MBA from Northeastern University, and is a published author. He is also co-chair of the Boston chapter of the Cloud Security Alliance. https://www.linkedin.com/in/jasongarbis/ About AppGate: Appgate is a secure access company that provides cybersecurity solutions for people, devices and systems based on the principles of Zero Trust security.  Through a set of differentiated cloud and hybrid security products, Appgate enables enterprises to easily and effectively shield against cyber threats. Appgate serves 3,960 customers across more than 30 countries
36:25
December 10, 2020
Zscaler - SASE (ZTNA) - Season 2 - #16
Nathan Howe from Zscaler joins us to discuss their SASE ZTNA solution. Nathan is a Director for Transformation Strategy, Nathan leverages this experience as an Architect, Pen Tester, Manager, and Security Assessor to help guide companies through their transformation challenges. In the Season 2 Kick-off episode, we introduced the topic with Dr. Chase Cunningham. Episode #11 For slides and please refer to our website  and watch the video episode The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper : https://info.zscaler.com/resources-white-papers-zpa-definitive-guide-to-secure-remote-access Demo  https://www.zscaler.com/products/secure-access-service-edge About Nathan Nathan Howe has 20+ years in security experience across a multitude of organisations including governments enterprises and telco service providers. As a Director for Transformation Strategy, Nathan leverages this experience as an Architect, Pen Tester, Manager and Security Assessor to help guide companies through their transformation challenges. Prior to joining the Zscaler team in 2016 Nathan ended his 12 years at Nestle by successfully delivering Nestle´s Global Cyber Security Compliance. Connect our guest: https://www.linkedin.com/in/nbhowe/ About Zscaler: Zscaler accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
44:12
December 3, 2020
Netskope- SASE (ZTNA) - Season 2 #15
This Season is dedicated to SASE  ZTNA, our guest for the show is Michael. Michael is a Principal Global Solution Architect with Netskope.  In his role, he advises Netskope customers on best practices around Netskope deployments and integrating Netskope solutions within customer environments by leveraging integration with the customer technology ecosystem. We are focusing on one part of SASE related to ZTNA/Remote Access  In the Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.  Episode #11 For slides and please refer to our website  and watch the video episode  The question we ask the vendors: 1. What's the name of the offering/product addressing the remote access. 2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. 3. How do you license your product? (seats, devices, concurrent connections, bandwidth). 4. How do you tie back to the User Identity and MFA? 5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). 6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.  7. How would your solution work on slow networks or when the user is roaming between networks? 8. Educate us more about your product’s reporting and alerting options (including UBA). Demo/POC:  https://resources.netskope.com/product-demos/demo-netskope-private-access Link to Whitepaper:  https://resources.netskope.com/cloud-security-solution-white-papers/zero-trust-leading-practice Our site: www.security-architecture.org Michael Bio  https://www.linkedin.com/in/michael-koyfman-0a3662/ Michael Koyfman is a Principal Global Solution Architect with Netskope.  In his role, he advises Netskope customers on best practices around Netskope deployments and integrating Netskope solutions within customer environments by leveraging integration with the customer technology ecosystem.  He also actively participates in driving and adopting new Netskope product, such as  Netskope for IaaS and Netskope For Web within the Netskope customer base.  Prior to Netskope, Michael spent almost 13 years at F5 Networks as Senior Global Solution Architect, where he was focused on the entire portfolio of F5 security products, and has been a key contributor to implementation, strategy, and evolution of F5 security solutions and portfolio.   Michael helped architect, develop, and demonstrate various unique solutions and integration with various technology and players such as Microsoft, Citrix, Vmware, Okta, Ping, IBM, CrowdStrike, AWS, Azure. Company Description: The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope. To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
36:21
November 26, 2020
Bitglass- SASE (ZTNA) - Season 2 - #14
This Season is dedicated to SASE  ZTNA, our guest for the show is Mike. Mike Schuricht has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products,  Bitglass private access is a surgical way of allowing particular access for a particular user to the particular application as opposed to exposing the entire network. We are focusing on one part of SASE related to ZTNA/Remote Access  In the Season 2 Kick-off episode, we introduced the topic with Dr. Chase Cunningham(Episode #11)  For slides and please refer to our website  and watch the video episode  The question we ask the vendors: 1. What's the name of the offering/product addressing the remote access. 2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. 3. How do you license your product? (seats, devices, concurrent connections, bandwidth). 4. How do you tie back to the User Identity and MFA? 5. Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). 6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.  7. How would your solution work on slow networks or when the user is roaming between networks? 8. Educate us more about your product’s reporting and alerting options (including UBA). Whitepaper:  https://www.bitglass.com/zero-trust-network-access Demo/POC: https://pages.bitglass.com/Bitglass_CASB_Demo.html Mike Bio https://www.linkedin.com/in/mschuricht/ Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products, with expertise in configuration management, user-interface design, networking, and enterprise software. Prior to joining Bitglass, Mike was a PM at Palo Alto Networks leading management software and user-interface strategy for both Panorama and PAN-OS. Before that, he held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal business unit. Mike earned an MS in Electrical and Computer Engineering and BS in Computer Engineering from the University of California, Santa Barbara. Company Description "Bitglass, the Next-Gen Cloud Security company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
29:36
November 19, 2020
Perimeter 81 - SASE (ZTNA) - Season 2 - #13
This Season is dedicated to SASE  ZTNA, our guest for the show is Amit. Amit Bareket, CEO and Co-Founder of Perimeter 81, is a cybersecurity expert with extensive experience in system architecture and software development. We are focusing on one part of SASE related to ZTNA/Remote Access Amit, CEO of Perimeter 81, strongly believes we can't compete with physics while adopting the superpower of WireGuard, the hottest thing in the P2P VPN protocols. In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham https://youtu.be/lDSTnC_7jww For the video version(slides) and please refer to our website  and watch the video episode  The question we ask the vendors: What's the name of the offering/product addressing the remote access. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions. How do you license your product? (seats, devices, concurrent connections, bandwidth). How do you tie back to the User Identity and MFA? Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users). What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. How would your solution work on slow networks or when the user is roaming between networks? Educate us more about your product’s reporting and alerting options (including UBA). Demo/POC: https://www.perimeter81.com/demo Link to Whitepaper: https://www.perimeter81.com/solutions/sase Our site: www.security-architecture.org Amit Bio Amit Bareket, CEO and Co-Founder of Perimeter 81, is a cybersecurity expert with extensive experience in system architecture and software development. He is the author of 8 patents issued by the USPTO for storage, mobile applications and user interface. Prior to Perimeter 81, Amit founded SaferVPN, sold in 2019 to J2 Global, and worked as a Software Engineer for major enterprises including IBM XIV Storage and BigBand Networks. He served in the Israel Defense Force’s elite cyber intelligence unit and graduated Cum Laude with a B.Sc. in Computer Science and Economics from Tel Aviv University. https://www.linkedin.com/in/amit-bareket-638a8b18/ Perimeter 81 Description Perimeter 81 is a leading SASE provider that has transformed the outdated, hardware-based security appliances into a cloud-based SaaS solution — simplifying secure access for the modern and distributed workforce. Perimeter 81 is trusted by thousands of companies, of all sizes and sectors, and our partners are among the world's foremost managed service providers and channel resellers.
33:35
November 12, 2020
Season 2 Kickoff Episode - SASE (ZTNA) #11
Join us for a Season 2 kickoff discussion, we continue our journey exploring SASE the season is about ZTNA and Remote Access. We were honored to have Dr. Chase Cunningham to join us for the kickoff episode. Dr. Cunningham is a retired Navy Chief Cryptologist with more than 19 years of experience in Cyber Forensic and Analytic Operations currently he is a Principal Analyst and VP covering the ZTNA space. We are thrilled to bring to this season the key players providing ZTNA Remote Access solutions. We were able to get both very established market leaders and disrupting and innovative new companies as well as companies in a process of a merge.  We have more than a dozen companies who agreed to take part in our project and share with us their architectures and answer our questions. Please subscribe to our podcast and follow our work on Linkedin  More about Dr. Chase Cunningham  To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
16:04
November 9, 2020
McAfee, SASE Outbound inspection and protection #10
This Season is dedicated to SASE Our guest for the show is Brian Brown, Brian has been an IT professional for 25 years. As a Regional Solution Architect, he is involved with large Enterprise customers in Canada and the US, and is engaged to architect large scale deployments both for customers and MSP partners. A member of ISACA and IASA Global, Brian often speaks at both industry and McAfee events about how to address business objectives with advanced security architecture in Security Operations and Cloud. We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides/video lease refer to our website  and watch the video episode  https://www.security-architecture.org/episodes/s01e10_Mcafee You can check the questions we ask our vendors. whitepaper: https://www.mcafee.com/enterprise/en-us/solutions/unified-cloud-edge.html POC: https://www.mcafee.com/enterprise/en-us/forms/demo-request-uce.html?eid=3JDXUM9C Our site: www.security-architecture.org About McAfee: McAfee believes that no one person, product, or organization can fight cybercrime alone. It’s why McAfee rebuilt the idea of working together. People working together. Products working together. Organizations and industries working together.  McAfee's goal is to spread this collaborative attitude to our customers, partners, even competitors. All uniting to overcome the greatest challenge of the digital age—cybercrime—and making the connected world more secure. More about Brian: https://www.linkedin.com/in/brian-brown-b20256159/
01:03:05
October 26, 2020
Cato Networks, SASE Outbound inspection and protection #9
This Season is dedicated to SASE Our guest for the show is Dave Greenfield is a veteran of IT industry. He’s spent more than 20 years as an award-winning journalist and independent technology consultant. Today, he serves as a secure networking evangelist for Cato Networks. We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website  and watch the video episode  You can check the questions we ask our vendors. Whitepaper: https://www.catonetworks.com/sase/ POC: https://www.catonetworks.com/try Our site: www.security-architecture.org About Cato: Cato is the world’s first SASE platform, converging SD-WAN and network security into a global, cloud-native service. Cato optimizes and secures application access for all users and locations. Using Cato, customers easily migrate from MPLS to SD-WAN, optimize connectivity to on-premises and cloud applications, enable secure branch Internet access everywhere, and seamlessly integrate cloud datacenters and mobile users into the network with a zero-trust architecture. With Cato, the network, and your business, are ready for whatever’s next. More about Dave https://www.linkedin.com/in/davidgreenfield/ #sase #cybersecurity #infosec #cybersec #cyber #infosecurity #secarch #sasecybersummit #cyberawareness #securityarchitecture #workfromanywhere #cybersecuritynews
01:07:52
September 17, 2020
SASE Moneyball Dino Momentum cyber #8
We are airing a special episode as part of our season one where we talk about SASE with industry leaders from many different angles. Today we are talking about one of the main aspects of any company, MONEY. And who is the right person to talk about funds is people that help companies raise money and buy other companies, we have Dino from Momentum cyber. Dino Boukouris is a Founding Director at Momentum Cyber, the premier strategic advisor to the Cybersecurity industry. If the company doesn’t have funds, it will not be able to develop new features and support its infrastructure and customers. Funds are especially important in the SASE market since the company assumes to have cloud presence and cloud presence means that companies need to maintain big cloud infrastructure or pay 3rd party vendors for such infrastructure. What is the total addressable market of SASE ? What so special about Israel and cybersecurity Would it be bigger than the firewall market? Where is the best food in Tel-Aviv Would EDR/EPP vendors take part in such a market. How crowded is the space? Would Google, AWS or Microsoft be part of the space? Recent notable transactions in this space Join and listen to get answers on some of the questions and much more Don’t forget to share and subscribe Dino full bio Dino has been a speaker at Cybersecurity conferences across the country including the RSA Conference, Cybertech Tel Aviv, Structure Security, Global Cyberspace Coop Summit, IoT Security Panel, M&A East 2017, as well as at numerous private events and corporate gatherings.  Dino is also professional faculty at the University of California, Berkeley – Haas School of Business, where he teaches a top ranked Venture Capital & Private Equity course for the MBA program. Momentum cyber: Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem. We advise on a broad range of strategic activities, including mergers and acquisitions, board & special situations, corporate strategy & development, corporate finance, and operational excellence. Mailing list and past industry reports https://momentumcyber.com/intel/ #cybersecurity #investment #infosec #acquisition #secarch #SASE
33:27
September 9, 2020
IBOSS, SASE Outbound inspection and protection #7
This Season is dedicated to SASE Our guest for the show is  Paul Martini. Paul is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide-variety of complex security and technology solutions for clients such as Phoenix, the U.S. Navy, and Hewlett Packard. We are focusing on a small part of SASE related to user browsing and access resources on the internet.  To promote our work and support the podcast , please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website and watch the video episode ( need link to episode) You can check the questions we ask our vendors. About Vendor: The iboss cloud platform delivers all network security capabilities in the cloud via a SaaS offering. This eliminates the need for traditional network security appliances allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity. The future of network security is in the cloud and iboss can make that a reality today as a robust implementation of the Gartner SASE model. Links to more information about Vendor: Whitepaper https://www.iboss.com/the-platform/secure-cloud-gateway-network-security-as-a-service/ POC https://www.iboss.com/request-demo/ More about Paul Paul Martini is the CEO, Co-founder and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide-variety of complex security and technology solutions for clients such as Phogenix, the U.S. Navy, and Hewlett Packard. He was also a key contributor at Copper Mountain Networks which was a pioneer in introducing broadband networks used by Telcos to build the cloud. Paul has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of The Year award and being named one of Goldman Sachs’ 100 Most Intriguing Entrepreneurs. https://www.linkedin.com/in/martinipaul/
01:04:31
August 20, 2020
Forcepoint, SASE Outbound inspection and protection #6
This Season is dedicated to SASE Our guest for the show is Jim Fulton, Jim is Forcepoint’s director of Cloud and Edge Protection solutions.We are focusing on a small part of SASE related to user browsing and access resources on the internet.  In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website   and watch the video episode  To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Vendor: Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries. Links to more information about Vendor: Whitepaper https://www.forcepoint.com/blog/tags/sase: POC: https://www.forcepoint.com/product/dynamic-edge-protection More about Jim Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries. https://www.linkedin.com/in/fultonjim/
01:26:49
August 13, 2020
Checkpoint, SASE Outbound inspection and protection #5
This Season is dedicated to SASE Our guest for the show is Gregory Paper, Greg is a Security Architect and Evangelist with over 13 years at Check Point Software Technologies We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website and watch the video episode To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Vendor: Whitepaper: https://www.checkpoint.com/products/branch-cloud-security/ POC: https://portal.checkpoint.com/signin Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive, consolidated and effective security solutions in the marketplace. Check Point protects over 100,000 organizations of all sizes More about Greg Greg Pepper is a Security Architect and Evangelist with over 13 years at Check Point Software Technologies. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. Prior to Check Point, Greg has worked at well-known companies like Cisco, Sony Online Entertainment, Price Waterhouse Coopers and Organic. https://www.linkedin.com/in/gregorypepper/
51:52
August 6, 2020
Netskope, SASE Outbound inspection and protection #4
This Season is dedicated to SASE Our guest for the show is Bob Gilbert, Bob is a product marketing leader with a proven track record in Silicon Valley We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website  and watch the video episode To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Vendor: The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope. Link to demo or trial registration: https://www.netskope.com/why-netskope https://resources.netskope.com/product-demos More about Bob Gilbert:  https://www.linkedin.com/in/bobegilbert/ Bob is a product marketing leader with a proven track record in Silicon Valley. Bob enjoys working in fast-paced start-up environments where and leverages his skills and experience to launch products and showcase innovative technology. He is a prolific speaker, evangelist, motivator, and hands-on product demonstrator. Bob loves to build world-class teams that are wicked smart, work hard, but also know how to have fun on their path towards success.
01:09:43
July 30, 2020
Zscaler, SASE Outbound inspection and protection #3
This Season is dedicated to SASE Our guest for the show is Patrick Foxhoven is the CIO and Vice President of Emerging Technologies at Zscaler. We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin For slides and please refer to our website and watch the video episode. To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 You can check the questions we ask our vendors. About Zscaler: "Zscaler is a global cloud-based security company that enables organizations to securely transform their networks and applications for a mobile and cloud-first world, and protects against cyberattacks and data loss. Zscaler is a secure access service edge (SASE) service built from the ground up for performance and scalability. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances are unable to match. Links to more information about Zsclaer Link to demo or trial registration: www.zscaler.com/products/secure-access-service-edge More about Patrick:  https://www.linkedin.com/in/pfoxhoven/ Patrick Foxhoven is the CIO and Vice President of Emerging Technologies at Zscaler. He is an experienced and innovative managed security entrepreneur and technologist, having spent 20 years building secure and scalable internet-enabled networks while co-authoring three books on information security and receiving multiple patents. He is currently Chief Information Officer & Vice President of Emerging Technologies at Zscaler
01:16:54
July 23, 2020
Bitglass, SASE Outbound inspection and protection #2
This Season is dedicated to SASE. Our guest for the show is Mike Schuricht (VP Product Management), Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013.  We are focusing on s small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin You can check the questions we ask our vendors.  To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281 For slides and please refer to our website  and watch the video episode About Bitglass:  "Bitglass, the Next-Gen Cloud Security company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution". AS part of Bitglass innovation, they announced their support and availability of Smart Edge Secure Webgate earlier in 2020.  Links to more information about Bitglass Whitepaper: Bitglass SASE architecture Request a Demo -Bitglass Technical Brief: SmartEdge Secure Web Gateway More about Mike:  Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products, with expertise in configuration management, user-interface design, networking, and enterprise software. Prior to joining Bitglass, Mike was a PM at Palo Alto Networks leading management software and user-interface strategy for both Panorama and PAN-OS. Before that, he held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal business unit. Mike earned an MS in Electrical and Computer Engineering and BS in Computer Engineering from the University of California, Santa Barbara.
56:58
July 9, 2020
Kickoff Episode - SASE (Secure Access Service Edge) #1
Join us for a kickoff discussion with security expert Dr. Anton Chuvakin, one of the known Gartner veterans and author of many security books and publications. We invited Dr. Chuvakin to discuss and introduce the topic of our first Season - SASE. Gartner defines SASE (pronounced as "sassy") as a package of technologies including SD-WAN, SWG, CASB, ZTNA, DLP, IDP, FWaaS, and others as core abilities.  We identified multiple vendors on the market; some of them are SWG who are trying to break into CASB, and some of them are CASB who are trying to break into SWG as well as FW and SDWAN vendors who are looking their way into SASE. Since the topic is so wide, we decided to keep our focus at the user accessing the internet capabilities of SASE and cover other parts of SASE such as remote-access in the future Seasons. Please subscribe to our mailing list  and podcast  To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281
29:31
June 29, 2020
Welcome To Security Architecture Podcast
Meet Evgeniy and Dmitry the co-host of the Security Architecture Podcast. Our cybersecurity focused podcast will promote the best architectural practices and gather important information from vendors while translating it into a format that can be easily consumed by the podcast audience. It will answer the main questions about a specific product, it's features and ways to use it in different environments. Manifesto Our manifesto based on six basic principles: Solution providers are allowed to share only publicly available information. Our experienced co-host team will be preparing the questions while combining your feedback with our domain knowledge. All the companies will have to address the same questions during the podcast with slight modifications around the same context. The vendors are allowed to show live how their products answer the questions while keeping the answers around 2 - 3 minutes by screen sharing. Companies are not allowed to compare their solutions to their competitors in slides or verbally, we as podcast hosts always will stay neutral and not going to favor one vendor over another. To provide the vendors with equal starting conditions, we will be publishing the podcasts in batches of 5 - 8 vendors at a time.
03:21
June 12, 2020