Skip to main content
Security Architecture Podcast

Security Architecture Podcast

By Evgeniy Kharam & Dmitry Raidman

Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
Available on
Apple Podcasts Logo
Castbox Logo
Google Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

Google's (BeyondCorp) - SASE (ZTNA) - Season 2 - #28

Security Architecture PodcastApr 22, 2021

00:00
36:49
LaunchPad Glimps  Advanced Malware Detection

LaunchPad Glimps Advanced Malware Detection

The podcast features an insightful interview with Frederic from Gleams, a French startup specializing in advanced malware detection and investigation using artificial intelligence. Frederic discusses the company's role in protecting file flows, the differences between malware and viruses, common vectors of attack, challenges of static and dynamic detection, deployment options including air gap environments, and the company's focus on delivering effective threat detection and analysis. Frederic: https://www.linkedin.com/in/fr%C3%A9d%C3%A9ric-grelot-3243052a/ Frédéric Grelot began his career at CNES in Toulouse, spending three years in the Spacecraft's Embedded Computers department. There, he worked on designing a hardened computer chip for satellites and handled its validation from VHDL to integration in a satellite model and simulated space environment. In 2012, he joined the cyberdefense teams of the French Ministry of Armed Forces, specializing in reverse-engineering of computer systems and programs for seven years. In 2016-2017, Grelot initiated Artificial Intelligence work at DGA, identifying defense sectors where AI could be applied and helped establish a dedicated AI team. From 2017 to 2019, he led a team of 25 reverse-engineering analysts and continued enhancing his knowledge in Artificial Intelligence and Big Data. In 2019, Grelot co-founded GLIMPS, a company specializing in code analysis and malware detection using AI, and served as Scientist Lead. He contributed significantly to the company's outreach and communication. In 2023, he moved to Toronto, Canada, to open GLIMPS's first international office, engaging actively with the local tech and cybersecurity communities. Known for his distinctive profile, he also participated in various conferences and appeared on the national Radio Canada network. Grelot is committed to ecological sustainability, incorporating this perspective into his entrepreneurial endeavors. Glimps: GLIMPS is a cybersecurity company established in 2019 by four experts with a background in reverse-engineering. It offers innovative cybersecurity solutions leveraging a proprietary technology capable of automatically reading and understanding computer code. This technology is designed to enhance the detection and automation of binary analysis and threat identification, providing a significant boost to existing defense lines against increasingly sophisticated cyber threats. GLIMPS's solutions, which include GLIMPS Malware, are available in both SaaS and On-premise formats, catering to a broad spectrum of French and international companies and governmental bodies. The firm has achieved recognition within the cybersecurity community, evidenced by prices such as the European Cyber Week award, twice in a row. At the core of GLIMPS's offerings is its Deep Engine, a specialized AI engine based on Deep Learning. This engine excels in deep file analysis, enabling quick detection and characterization of advanced cyber threats. By conceptualizing code, GLIMPS's technology can identify all forms of malware, providing a comprehensive and scientifically validated approach to cybersecurity. This platform processes over one million files daily and serves more than a hundred customers, demonstrating its effectiveness and the trust it has garnered within the industry. GLIMPS also emphasizes collaboration within the French ecosystem, aiming to integrate its solutions where beneficial. The company's growth is underscored by its successful fundraising efforts, which include a €6 million round in 2021, and its continuous search for new talent to join its expanding team​.

Mar 07, 202429:47
Season 5 - Episode 02 - Cloud Native Application Protection Platform (CNAPP) - Uptycs

Season 5 - Episode 02 - Cloud Native Application Protection Platform (CNAPP) - Uptycs

Our guest for the show is Ganesh Pa. Ganeshi is Founder & CEO of Uptycs, He was previously Chief Architect, Carrier Products & Strategy for Akamai Technologies, a leading provider of content delivery network services. Prior to Akamai, Ganesh was Founder & VP Systems Architecture of Verivue. Prior to Verivue, he was Principal Architect for NetDevices Whitepaper: https://www.uptycs.com/resources/white-papers/cloud-security-fundamentals Demo link:

https://www.uptycs.com/request-demo About Uptycs Uptycs, the first unified CNAPP and XDR platform, reduces risk by prioritizing your responses to threats, vulnerabilities, misconfigurations, sensitive data exposure, and compliance mandates across clouds, containers, servers, and workspaces—all from a single UI and data model. Only Uptycs gives you the ability to tie together threat activity as it traverses on-prem and cloud boundaries. The result is a cloud security early warning system that identifies and stops threat actors before they can access critical data and services in the cloud. Take control of your security data, get the correlated insights you care about most, faster, and take decisive action. https://www.linkedin.com/in/ganesh-pai/ Ganesh Pai, Founder and CEO at Uptycs Ganesh Pai is Founder & CEO of Uptycs. He was previously Chief Architect, Carrier Products & Strategy for Akamai Technologies, a leading provider of content delivery network services. Prior to Akamai, Ganesh was Founder & VP Systems Architecture of Verivue. Prior to Verivue, he was Principal Architect for NetDevices. Prior to NetDevices, Ganesh served as Engineering Manager and Software Architect for Sonus Networks. He is a Boston-based entrepreneur and technologist and has been awarded multiple U.S. patents. Ganesh received a BE degree in electronics and communication engineering from Mangalore University and a MS in computer science from Temple University.

Nov 24, 202333:27
Season 5 - Kickoff -Cloud-Native Application Protection Platform (CNAPP) - Fernando Montenegro

Season 5 - Kickoff -Cloud-Native Application Protection Platform (CNAPP) - Fernando Montenegro

Join us for the kickoff episode of Season 5. This season, we are transitioning to explore the best ways to protect infrastructure as a service (IaaS) environments. We will be focusing on the Cloud-Native Application Protection Platform (CNAPP) and examining how many vendors in the industry address this important domain. We have our dear friend Fernando Montenegro joining us to kick off the season. Fernando is a Senior Principal Analyst on Omdia’s cybersecurity research team, based in Toronto, Canada. He focuses on the Infrastructure Security Intelligence Service, which provides vendors, service providers, and enterprise clients with insights and data on network security, content security, and more. Fernando’s experience in enterprise security environments includes network security, security architecture, cloud security, endpoint security, content security, and antifraud. He has a deep interest in the economic aspects of cybersecurity and is a regular speaker at industry events. Before joining Omdia in 2021, Fernando was an industry analyst with 451 Research. He previously held a variety of operations, consulting, and sales engineering roles over his 25+ years in cybersecurity, always focusing on enterprise security at organizations including vArmour, RSA, Crossbeam, Hewlett Packard, and Nutec/Terra. Fernando holds a Bachelor of Science in computer science and different industry certifications.

Aug 22, 202331:40
Mammoth (Browser Security) - Season 4/11 - Episode #48

Mammoth (Browser Security) - Season 4/11 - Episode #48

Our guest for the show is Sandro, Sandro is a cybersecurity veteran with over 20 years of experience architecting network, cloud, CASB, and remote access security. Sandro manages the technical tasks of the Mammoth Cyber Customer Engagement programs. Before Mammoth Cyber, Sandro launched cloud and network security solutions and customer success services at Valtix, Palo Alto Networks, and Fortinet. Season 4 KickOff episode with Chase    • Season 4 Kickoff ...   White Paper Link: https://d7qns16l91y68.cloudfront.net/... Demo: https://mammothcyber.com/contact About Sando: A cybersecurity veteran with over 20 years of experience architecting network, cloud, CASB and remote access security, Sandro manages the technical tasks of the Mammoth Cyber Customer Engagement programs. Before Mammoth Cyber, Sandro launched cloud and network security solutions and customer success services at Valtix, Palo Alto Networks and Fortinet. About Mammoth: Mammoth Cyber’s Enterprise Access Browser is a new approach with unsurpassed visibility, context and control to provide secure access to remote users and contractors.

Aug 01, 202333:03
SURF Security (Browser Security) - Season 04/10 - Episode #47

SURF Security (Browser Security) - Season 04/10 - Episode #47

Our guest for the show is Moty Jacob CEO of Surf, Moty is cyber security expert with more than 20 years of experience as global CISO and cyber security professional, from the military to the enterprise, Moty has led information security for major enterprises, including Telefonica, Dunnhumby (Tesco), Traiana, and CME group.

To promote our work and support the podcast, please review us here  ⁠https://www.podchaser.com/podcasts/security-architecture-podcast-1313281⁠

Season 4  KickOff episode with Chase:

⁠https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be


Season 4 KickOff episode with Chase https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be Demo: https://www.surf.security/book-a-demo Whitepaper: https://blog.surf.security/solution-brief-zero-trust


About Moty https://www.linkedin.com/in/motyacov/ A cyber security expert with more than 20 years of experience as global CISO and cyber security professional, from the military to the enterprise, Moty has led information security for major enterprises, including Telefonica, Dunnhumby (Tesco), Traiana, and CME group. He is a founder of the influential group CyberKingdom – a CISO network that includes more than 200 CISOs from a variety of industries across the UK. About Surf SURF provides users with freedom of work, letting them interact with applications, data, and each other securely. It addresses the critical business asset neglected by security experts for years: The browser. The browser is the access frontier for everything: users, data, corporate assets, applications, development activities - and cybercriminals, too. SURF Security has transformed the browser into your strongest security asset while providing complete end-user privacy – all with full compliance. Through this centralized platform, SURF insists on identity-first access to all SaaS and corporate assets to guarantee a secured and frictionless user experience. SURF enhances security, performance, and productivity for end-users and applications – faster than ever before.


Apr 01, 202332:03
Perception Point (Browser Security) - Season 04/09 - Episode #46

Perception Point (Browser Security) - Season 04/09 - Episode #46

Our guest for the show is Tal Zamir, Tal was previously the Founder & CTO of Hysolate; has a 20-year software industry leader with a track record of solving urgent business challenges by reimagining how technology works.

To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 4  KickOff episode with Chase:

https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be

Demo:Book a Demo - Perception Point (perception-point.io)

Whitepaper(s): https://perception-point.io/resources/white-papers/whitepaper-rise-cyber-threats-against-email-browsers-cloud-channels/

Tal Zamir Bio: 

Previously the Founder & CTO of Hysolate, Tal Zamir is a 20-year software industry leader with a track record of solving urgent business challenges by reimagining how technology works. He has pioneered multiple breakthrough cybersecurity and virtualization products. Tal incubated next-gen end-user computing products while in the CTO office at VMware. Tal began his career in an elite IDF technology unit. He holds multiple US patents as well as an M.Sc in Computer Science from the Technion.

Company Overview:

Perception Point is a Prevention-as-a-Service company for the fastest and most accurate next-generation isolation, detection, and remediation of all threats across an organization’s main attack vectors - email, web browsers, and cloud collaboration apps.The solution's natively integrated and fully managed incident response service acts as a force multiplier to the SOC team, reducing management overhead, improving user experience and delivering continuous insights; providing proven best protection for all organizations.

Deployed in minutes, with no change to the enterprise’s infrastructure, the patented, cloud-native and easy-to-use service replaces cumbersome legacy systems to prevent phishing, BEC, spam, malware, zero-days, ATO, and other advanced attacks well before they reach end-users. Fortune 500 enterprises and organizations across the globe are preventing attacks across their email, web browsers and cloud collaboration channels with Perception Point.

Dec 05, 202231:12
MoneyBall (Browser Security) - Season 04/08 - Episode #45

MoneyBall (Browser Security) - Season 04/08 - Episode #45

Our guest for the show is Seth Spergel, Managing Partner of Merlin Ventures. Seth brings over 20 years of experience

building, selling, and investing in software and startups. He joined us to talk about the Browser security and Browser Isolation market

To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 4  KickOff episode with Chase:

https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be


About Seth:

Seth Spergel is Managing Partner of Merlin Ventures. Seth brings over 20 years of experience

building, selling, and investing in software and startups. Seth came to Merlin from In-Q-Tel, the

strategic investment firm of the US Intelligence Community. Prior to In-Q-Tel, Seth was VP of

Engineering at ThinkGeek. Seth is a graduate of Brandeis University, where he majored in

Computer Science and Economics.

About Merlin:

Merlin Ventures is the strategic investment arm of Merlin Cyber, a firm with 25 years of experience helping the largest cybersecurity brands in the world tackle the US Federal market. In 2019, we established Merlin Ventures to find the next generation of cybersecurity solutions, and in 2021 stood up our office in Tel Aviv to gain insider access to the unique cybersecurity ecosystem that Israel provides. Leveraging our network of US-based security executives, as well as Merlin Cyber’s public sector go-to-market expertise, Merlin Ventures helps our portfolio companies understand and rapidly accelerate into both commercial and government markets in the US.


Nov 22, 202218:05
Seraphic (Browser Security) - Season 04/07 - Episode #44

Seraphic (Browser Security) - Season 04/07 - Episode #44

Our guest for the show is Alon Levin, Alon is the VP of Product Management at Seraphic, the enterprise browser security solution. With a successful track record of over 15 years in the cybersecurity industry

Season 4  KickOff episode with Chase 

https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be

Demo: 

https://www.seraphicsecurity.com/contact-us

Whitepaper:

https://seraphicsecurity.com/wp-content/uploads/2022/08/Final-3-ESG-Technical-Validation-Seraphic-Aug-2022.pdf

About Alon:

https://www.linkedin.com/in/alonlevin1/

Alon Levin is the VP of Product Management at Seraphic, the enterprise browser security solution. With a successful track record of over 15 years in the cyber security industry, Alon specializes in building and supporting the growth of new, innovative products in the areas of Product Management, Presales, and Customer Success. Prior to joining Seraphic, he fulfilled numerous leadership positions such as VP of Product Management at Infinipoint, and earlier in VDOO, and as a Global Consulting Engineer at Palo Alto Networks, as well as leading Sales Engineering roles at Cyvera and Wave. Alon holds a Bachelor of Science (B.Sc.) degree in Electrical Engineering from Tel-Aviv University.


About Seraphic:

 Seraphic offers a unique security solution introducing enterprise-grade browser security on any browser on any device, protecting both the employees and the enterprise assets all while providing security teams with advanced governance and policy enforcement. Seraphic’s solution is easy to deploy, has no impact on performance, leaves user experience untouched, and is fully compatible across all browsers, all operating systems, and all devices (including Android and iOS mobile devices).  With Seraphic, security teams are minutes away from closing the most significant blind spot in their organization's cyber defense, securing any browser, any device, anywhere. Learn more at seraphicsecurity.com


Oct 17, 202240:09
Menlo (Browser Security) - Season 04/06 - Episode #43

Menlo (Browser Security) - Season 04/06 - Episode #43

Our guest for the show is Nick Edwards, Nick is Vice President, Product Management for Menlo, prior to Menlo he was Nick was CEO of GradientOne. 

Season 4  KickOff episode with Chase

https://www.youtube.com/watch?v=YWB05cb7XRQ

Demo:

 https://www.menlosecurity.com/demo/

Whitepaper:

 https://resources.menlosecurity.com/white-papers/parting-the-clouds-isolation-for-greater-security

About Nick 

https://www.linkedin.com/in/nick-edwards-99387/

Prior to joining Menlo Security as Vice President, Product Management, Nick was CEO of GradientOne. He previously served as Vice President of Marketing and Products with Silver Tail Systems where he led all aspects of product management and marketing. Nick has also held a variety of management positions with Cisco Systems. During his time at Cisco, he built a team of 35 people managing security products with an annual run rate of $500 Million. Nick holds an MBA in Finance from Harvard Business School and a BS in Control Systems Engineering from the United States Naval Academy.


About Menlo Security:

 Menlo distinguishes itself from competitors by challenging the traditional approach to protecting against web-based threats with its patented isolation technology, which ensures that customers can enforce the highest security irrespective of where their users are located or what device they are using to work with and access the Internet. Menlo’s unique architecture is inherently capable of meeting the dynamic elastic scale needed to support changing traffic patterns for its customers worldwide. This proven approach supports security first customers and isolates all users and traffic anywhere in the world.

Sep 22, 202239:24
Island (Browser Security) - Season 04/05 - Episode #42

Island (Browser Security) - Season 04/05 - Episode #42

Our guest for the show is  Brian Kenyon, Brian serves as the Chief Strategy Officer at Island, a hot start-up that recently emerged from stealth to deliver the industry’s first Enterprise Browser.

Season 4  KickOff episode with Chase

https://www.youtube.com/watch?v=YWB05cb7XRQ

Demo: 

https://www.island.io/contact-us

Whitepaper: 

https://connect.island.io/hubfs/White%20Papers/whitepaper%20013122_c.pdf


About Island:

 Island is the developer of the Enterprise Browser – the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders of the enterprise security and browser technology space and backed by leading venture funds – Insight Partners, Sequoia Capital, Cyberstarts and Stripes – Island is redefining the future of work for some of the largest, most respected enterprises in the world. Island is based in Dallas with research and development in Tel Aviv

About Brian:

 https://www.linkedin.com/in/brianmkenyon

Brian comes from more than 20 years of experience driving product strategy, growth initiatives and go-to-market for organizations across all stages. Currently, Brian serves as the Chief Strategy Officer at Island, a hot start up that recently emerged from stealth to deliver the industry’s first Enterprise Browser. As a founding team member of Island, Brian was essential in driving in establishing Island’s product and go-to-market strategies,  as well as part of the leadership team that secured over $100 million in financing from leading early-stage investors including Insight Partners, Sequoia Capital, Cyberstarts and Stripes.  In addition to being a crucial member of Island’s early stage success, Brian also served as Senior Vice President and Chief Strategy Officer at Blue Coat Systems (which was acquired by Symantec in 2016 where he held the same position), as well as chief architect at Foundstone, which McAfee acquired in 2004, where he played an integral role in designing and developing the company’s cutting-edge hardware and software solutions. Upon joining McAfee, he served in a variety of roles including Chief Technology Officer as well as Chief Technical Strategist. Throughout Brian’s career he has been responsible for the strategy engagements of these major company success stories and has the right experience to help entrepreneurs navigate the challenges, successes and roadblocks of early-stage growth.

Aug 18, 202234:57
Skyhigh Security(Browser Security) - Season 04/04 - Episode #41

Skyhigh Security(Browser Security) - Season 04/04 - Episode #41

Our guest for the show is Zuly Gonzalez. Zuly is Director of Product Management at Skyhigh Security where she leads Remote Browser Isolation, Firewall-as-a-Service, and Digital Experience Monitoring as part of the Skyhigh Security Service Edge (SSE) platform.


Season 4  KickOff episode with Chase

https://www.youtube.com/watch?v=YWB05cb7XRQ

Demo:

https://www.skyhighsecurity.com/en-us/forms/demo-request-form.html

Whitepaper:

https://www.skyhighsecurity.com/en-us/cybersecurity-defined/what-is-browser-isolation.html

About Zuly:

https://www.linkedin.com/in/zulygonzalez/

Zuly Gonzalez is Director of Product Management at Skyhigh Security where she leads Remote Browser Isolation, Firewall-as-a-Service, and Digital Experience Monitoring as part of the Skyhigh Security Service Edge (SSE) platform.

Prior to joining Skyhigh Security, Zuly was the CEO and Co-founder of Light Point Security (acquired by McAfee in March 2020), which pioneered the concept of remote browser isolation. Before founding Light Point Security, Zuly spent over a decade at the National Security Agency (NSA) in various technical and management roles where she focused on protecting national security interests. While at the NSA, Zuly briefed the Director of the NSA and the House Permanent Select Committee on Intelligence (HPSCI) on matters of national security.

Zuly holds a BS in Computer Engineering from the University of Puerto Rico – Mayaguez, and an MS in Electrical and Computer Engineering from Johns Hopkins University.

About Skyhigh Security:

Skyhigh Security protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. For more information, visit www.skyhighsecurity.com.

Aug 04, 202230:07
Talon(Browser Security) - Season 04/03 - Episode #40

Talon(Browser Security) - Season 04/03 - Episode #40

Our guest for the show is Jack Britton. Jack is the Director of Sales Engineering for Talon Cybersecurity. Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience. He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company

Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be

Demo: https://talon-sec.com/talon-learn-more/

Whitepaper: https://talon-sec.com/resources/whitepapers/white-paper-an-enterprise-browser-for-the-digital-business/

About Jack:

 https://www.linkedin.com/in/jackrbritton/

Jack Britton is the Director of Sales Engineering for Talon Cybersecurity.  Jack is a Marine Veteran and Cybersecurity professional with over 15 years of experience.  He has led as a National Practice Director at a $1.5 Billion VAR/Consulting company.  There he led Offensive Security, Digital Forensic and Incident Response, Executive Digital Protection Services, and Managed Security Evaluation Services.  He is an RSA Scholar and has earned both B.S and Masters in Science in Cybersecurity at the University of Maryland Global Campus.  Jack volunteers to support Global Humanitarian Aid needs and he is an advisor with the National Child Protection Task Force.


About Talon:

Talon is enabling and securing the distributed workforce by creating the first browser-based workspace that was designed with built-in security for the modern and hybrid workforce, working from anywhere and on any device.  Talon simplifies the company's security stack, with rapid end-to-end deployment which allows a robust endpoint-agnostic security posture.

Jun 09, 202224:44
Forcepoint(Browser Security) - Season 04/02 - Episode #39

Forcepoint(Browser Security) - Season 04/02 - Episode #39

Our guest for the show is Mike Schuricht , Mike is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design.


Season 4  KickOff episode with Chase  https://www.youtube.com/watch?v=YWB05cb7XRQ&feature=youtu.be 

Demo:  https://www.forcepoint.com/videos/forcepoint-remote-browser-isolation-rbi-demo-performance-and-security

Whitepaper:  https://www.forcepoint.com/product/forcepoint-one


About Mike:

 Mike Schuricht is the VP of Product Management at Forcepoint. Prior to that, he was the SVP of Product Management at Bitglass. He has a background in the development of innovative enterprise security products, with expertise in configuration management and user-interface design. Mike joined Bitglass from Palo Alto Networks where he was responsible for security management and user-interface strategy for both Panorama and PAN-OS. Prior to joining Palo Alto Networks, Mike held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal product line. Mike holds an MS and BS in Computer Engineering from University of California, Santa Barbara.


About Forcepoint:

 Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries.


May 27, 202224:13
Season 4 Kickoff - Browser Security - Dr. Chase Cunningham- #38

Season 4 Kickoff - Browser Security - Dr. Chase Cunningham- #38

Join us for a Season 4 kickoff Episode, This season we are transitioning to a more end user-centric security topic Browser Isolation. This security concept is an old concept and goes back to 1995 when CITRIX was first introduced. However, since then many things have changed and the fact we are using browsers for almost anything at work including gaming and video consumption brings the need for defense-in-depth and zero trust

We invite you to join us and watch the kickoff episode!
There are about 1.7 billion websites on the internet, and 4.5 billion people interact with these websites daily. An unprecedented number of 500,000 new websites are created daily following
websitesetup.org stats. This noise serves as a great disguise for the adversaries. While the bad actors adopt automation and DevOps in line with the rest of the market, they can spin up new phishing websites with high similarity to the original website. Other attack vectors that gain popularity are infecting legitimate websites with malware or utilizing formjacking and other OWASP Top 10 weaknesses. That being said, it's challenging to be reactive to protect people when we know the adversaries are always one step ahead. This is where the Isolation or air-gaping approach for the websites could be a helpful mechanism in protecting the end-user.

The season will examine a few approaches and solution architectures by vendors:

-Remote Browser Isolaiton
-Secure Enterprise Browser
-Browse Plugin based Security

We believe that this topic is fascinating and has so many great solutions on the market. You will have the opportunity to familiarize yourself with many great options to protect the end-user and also a variety of attacks such as: 

-Malicious documents and files download
-Drive-by downloads
-Redirect attacks
-Zero-day exploits
-Cross-site scripting
-A load of malicious Java scripts
-Malvertising 
-Cookie stuffing and session fixation

Here are some of the questions we plan to ask the participants,

-What's the name of the offering/product addressing the browser isolation?
-Describe your overall architecture at a high level?
-What is the user experience compared to browsing, especially with SPA (Single Page Application)?
-Please describe how you integrate with IAM/SSO providers?
-How would your technology work with existing SWG or ZTNA vendors? Does it replace or complement it?
-Is the isolation done for all URLs/APPS or only for the risky ones? 
-Can I use the solution to isolate internal web-based resources and how can you support legacy web applications that run only on old versions of Internet Explorer?
-Please describe how users can work and edit documents via browser?
-How does your solution address BYOD Devices? How about Mobile devices?
-How do your products work with browser extensions such as Lastpass, Webex, etc.?
-How can the organization get visibility or a report of attacks prevented by the technology?


May 02, 202216:53
Lacework CSPM - (Launchpad) #37

Lacework CSPM - (Launchpad) #37

Cloud computing has been around for more than a decade, but only in the last eight years has it started to get real momentum while having small and large companies undergoing digital transformation. It's especially accelerated between 2019 and 2021. Also, COVID forced people to work from home and motivated companies to move their computing and services to IaaS providers and rapidly adopt SaaS solutions.

We had the pleasure to have Nicolas St-Pierre with us, he is a Field CTO at Lacework walking us thru their solution.

About Nick

https://www.linkedin.com/in/nickstpierre/

Nicolas is Field CTO at Lacework and is responsible for providing technical leadership in Cloud Security to our customers, partners, and product groups. He has over 20 years of expertise in security products and virtual platform deployments with global Tier-1 Communication Service Providers and large enterprises worldwide in a CTO and Field CTO capacity. Author of multiple patents in the field of Telecommunications, 5G, Digital Advertising, Security, and Analytics, Nicolas continues to provide Cloud Security insights and leadership from the Greater Toronto Area where he resides.


About Lacework: Lacework is a data-driven cloud security company. It’s the only company to deliver end-to-end visibility and automated insight into risk across multi-cloud environments so organizations of all shapes and sizes can innovate with speed and safety. Lacework sees security not as a blocker, but as an enabler for innovation — and automation as the path to transformative business outcomes.

Link to the website

 https://www.lacework.com/schedule-demo/

Apr 05, 202232:32
Cider Security (AppSec) - Season 03/08 - Episode #36

Cider Security (AppSec) - Season 03/08 - Episode #36

We are airing our eighth and final episode in Season 3, this season is dedicated to application security, our guest for the show is Daniel Krivelevich Co-Founder and CTO of Cider Security

To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 3  KickOff episode with Tanya Janca

Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube

Demo:

https://www.cidersecurity.io/demo/

WhitePaper:

https://www.cidersecurity.io/top-10-cicd-security-risks/

Daniel BIO:

https://www.linkedin.com/in/daniel-krivelevich/

Cyber Security expert and problem solver, 15+ years of enterprise security experience with a strong orientation to Application & Cloud Security. Held several positions in 8200, after which spent several years hopping between defensive and offensive security positions.  After having led Application Security and Cloud Security with Sygnia for four years, working with 100+ enterprises on optimizing Cyber resilience,  Daniel Co-Founded Cider Security as the company’s CTO.

About Cider:

Cider Security is a first-of-its-kind AppSec Operating System that provides Security and Engineering teams a single, consistent method to orchestrate and implement end-to-end CI/CD security through a single, unified platform. The company takes a holistic approach to the security of the engineering processes and systems, from code to deployment. It establishes a comprehensive Technical DNA of the engineering environment, giving Security teams the transparency and visibility needed to optimize AppSec and achieve full resilience. Founded in late 2020 by cybersecurity industry veterans, Guy Flechter and Daniel Krivelevich, Cider Security's mission is to solve the most commonly encountered challenges CISOs and security engineers face today. For more information, visit www.cidersecurity.io/.

Mar 22, 202225:03
Garantir(AppSec) - Season 03/07 - Episode #35

Garantir(AppSec) - Season 03/07 - Episode #35

We are airing our sixth episode in Season 3, this season is dedicated to application security, our guest for the show is Kieran Miller is the Chief Architect at Garantir, before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto.

To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 3  KickOff episode with Tanya Janca

Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube

Demo: 

https://garantir.io/contact/

WhitePaper:

https://garantir.io/wp-content/uploads/2021/04/Garantir-Deploying-A-Fast-Secure-Code-Signing-System.pdf

Kieran:

https://www.linkedin.com/in/kieran-miller-0776136/

Kieran Miller is the Chief Architect at Garantir, a cybersecurity company based in San Diego, California. Before joining Garantir, Kieran spent more than 10 years working in cybersecurity, including 8 years with Leidos, a major defense contractor, and several years with Gemalto, which was later acquired by Thales, followed by multiple years as a senior security consultant. With over a decade of cybersecurity experience, Kieran has expertise in multiple dimensions of enterprise security, from data security and identity access management to secure software development.


Garantir overview:

Garantir is a cybersecurity company that provides advanced cryptographic solutions to the enterprise. The Garantir team has worked on the security needs of businesses of all sizes, from startups to Fortune 500 companies. At the core of Garantir’s philosophy is the belief that securing business infrastructure and data should not hinder performance or interrupt day-to-day operations. With GaraSign, Garantir’s flagship product, private keys remain secured at all times, while a client-side hashing architecture ensures high performance for all cryptographic operations, including code signing, SSH, S/MIME, document signing, TLS, secure backup, and more.




Dec 23, 202128:09
Checkmarx(AppSec) - Season 03/06 - Episode #34

Checkmarx(AppSec) - Season 03/06 - Episode #34

This Season is dedicated to Application security, our guest for the show is James Brotsos Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx


To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 3  KickOff episode with Tanya Janca

Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube

Demo/POC:  

https://checkmarx.com/product/software-security-platform/

Whitepaper: 

https://checkmarx.com/resources/ebooks-and-whitepapers

Checmarx: Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world’s developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry’s most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software—including proprietary code, open-source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale.

James Brotsos | Product Manager – Developer Experience | 

https://www.linkedin.com/in/jbrotsos/

Developer Advocate and Product Manager, James leads all strategic and product integrations for Checkmarx – a leader in Application Security Testing Solutions.  He comes with fifteen years of software engineering experience in network protocol and kernel development. In his spare time, he volunteers mentoring Computer Science high school students in the Bay Area. He is an active “maker”, and his main hobby is following IoT technology and trends.


Dec 09, 202117:44
MoneyBall(AppSec) - Season 03/05 - Episode #33

MoneyBall(AppSec) - Season 03/05 - Episode #33

This Season is dedicated to Application security, our guests for the show are Dino Boukouris and Setu Kulkarni. They are joining us to talk about the Application Security market.

To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 3  KickOff episode with Tanya Janca

Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube


About Dino:

https://www.linkedin.com/in/konstantinosboukouris/

Dino Boukouris is a Founding & Managing Director at Momentum Cyber, the premier strategic advisor to the Cybersecurity industry.  Dino has spent over 16 years in the technology industry with expertise in cybersecurity, finance, strategy, operations, and venture capital & private equity. Dino has been a speaker at Cybersecurity conferences across the country including the RSA Conference, Cybertech Tel Aviv, Structure Security, Global Cyberspace Coop Summit, IoT Security Panel, M&A East, as well as at numerous private events and corporate gatherings.  Dino was also professional faculty at the University of California, Berkeley – Haas School of Business, where he taught a top ranked Venture Capital & Private Equity course for the MBA program.


About Setu

https://www.linkedin.com/in/setu-kulkarni-6552251/

Setu is a Corporate Strategy & Product Management executive with feet on the ground experience in NAM, Europe & APAC. Currently, he leads product management at Venafi, the leader in Machine Identity Management.

At the time of this recording, Setu led product strategy at NTT Security. Prior to NTT Security, he established and led the corporate strategy & PM functions during critical growth years at WhiteHat Security, resulting in its acquisition by NTT Security. Earlier in his career, Setu led platform product strategy & management at TIBCO for Operation Intelligence, Cloud, SOA & BPM products.

Setu is a company spokesperson, a speaker at industry & investor events, a podcast host and thought-leader in the Application Security space.

Nov 11, 202123:57
CloudDefense(AppSec) - Season 03/04 - Episode #32

CloudDefense(AppSec) - Season 03/04 - Episode #32

This Season is dedicated to Application security, our guest for the show is Abhi Veldurthy from CloudDefense.  He joins us to discuss their SAST, SCA, and VA solutions. Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy.


To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 3  KickOff episode with Tanya Janca

Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube

Demo/POC:

https://www.clouddefense.ai/request-demo

Whitepaper:

https://www.clouddefense.ai/


CloudDefense Summary

CloudDefense is an Application Security company that provides a single pane of glass view into the overall security health of an organization. It provides tools to discover open source vulnerabilities, open-source licenses, static analysis (SAST), API and Web penetration testing, as well as Cloud Native, Cloud Infra, and Container Vulnerabilities with a few clicks. CloudDefense helps you in preventing accidental slippage of critical security issues in production.

Abhi Veldurthy Bio

https://www.linkedin.com/in/aveldurthy/

Abhi Veldurthy is VP of Engineering at CloudDefense responsible for the technical direction and strategy, while leading the engineering efforts at the company. He has a Masters in Information Security from Carnegie Mellon and is deeply passionate about application development and is using this powerful combination to build a holistic security solution at CloudDefense. Prior to joining CloudDefense, Abhi has worked with LinkedIn, Amazon and Yahoo.

Oct 14, 202131:03
Snyk(AppSec) - Season 03/03 - Episode #31

Snyk(AppSec) - Season 03/03 - Episode #31

This Season is dedicated to Application security, our guest for the show is Gareth Rushgrove from Snyk.  He joins us to discuss their SAST and SCA solutions. Gareth is VP of Product at Snyk, He is building interesting tools for people to better secure infrastructure and applications  

To promote our work and support the podcast, please review us here  https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Season 3  KickOff episode with Tanya Janca

Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube

Demo/POC:  https://snyk.io/what-is-snyk/ 

Whitepaper:  https://go.snyk.io/oreilly-cnas.html

Guest's Bio

Gareth Rushgrove is VP of Product at Snyk, working remotely from Cambridge, UK, helping to build interesting tools for people to better secure infrastructure and applications. He has previously worked for the UK Government focused on infrastructure, operations and information security, as well as at Puppet and Docker. When not working he can be found curating the Devops Weekly newsletter, hiking or reading a good book. 

https://www.linkedin.com/in/garethrushgrove/

Company description:

Snyk is a developer-first platform for securing code, dependencies, containers, and infrastructure as code.   Snyk’s developer-first approach enables technology-driven companies to scale security in today’s fast-paced digitally transforming world.  Snyk today enables over 2.5 million developers to build securely, with a vision to empower every developer to develop fast and stay secure.



Sep 02, 202135:29
NeuraLegion(AppSec) - Season 03/02 - Episode #30

NeuraLegion(AppSec) - Season 03/02 - Episode #30

This Season is dedicated to Application security , our guest for the show is Gadi Bashvitz  from NeuraLegion   He joins us to discuss their DAST solution. Gadi Bashighly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF

Season 3  KickOff episode with Tanya Janca

Season 3 kickoff Episode - Application Security - Tanya Janca - YouTube


Demo/POC:  https://nexploit.app/signup

Whitepaper:  https://www.neuralegion.com/whitepapers/creating-implementing-a-modern-day-dast-solution/


Guest's Bio:

Gadi Bashvitz is a highly effective sales and customer success executive with 20+ years experience holding product, marketing, customer success and sales positions. Gadi started his Cyber career in the 8200 unit of the IDF and since then he has founded and successfully grew multiple companies in various industries.

Gadi has an exceptional ability to distill the essence from complex concepts and communicate them to customers, the team and in various speaking events.

He takes a proactive and critical approach to any challenge, identify the opportunity it presents and take advantage of the opportunity.

Gadi is the President & Chief Customer Officer at NeuraLegion, driving the DevSecOps revolution.

Connect our guest:

https://www.linkedin.com/in/bashvitz/

Company Description:

NeuraLegion provides solutions for Application security from build to compliance. We offer a developer focused API & Application DAST automation platform. Enhancing DevOps & CI/CD by removing human bottlenecks with no false positives and business logic attacks. Reducing reliance on manual testing, integrated early & often to detect & fix security issues before they hit production.

To promote our work and support the podcast, please review us here

https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Aug 12, 202128:56
Season 3 Kickoff Episode - Application Security - Tanya Janca - #29

Season 3 Kickoff Episode - Application Security - Tanya Janca - #29

Join us for a Season 3 kickoff Episode, This season we are switching gears from SASE and doing a deep dive in Application Security. We truly believe that Application security is one of the most overlooked domains in cybersecurity. Recent supply chain attacks are great examples of why we decided to bring awareness to the subject.

You can learn more about how to maximize the value you get from the various solutions by listening to the kickoff episode regardless if you are a big company or a smaller one

We already recorded several great vendors such as Neuralegion Snyk.io Clouddefense.ai, Garantir.io and looking to record several more great vendors

We are honored to have Tanya Janca, also known as SheHacksPurple, is the best-selling author of Alice and Bob Learn Application Security. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia).


Video episode 

Kickoff (security-architecture.org)

Please subscribe to our podcast and follow our work on Linkedin:

https://www.linkedin.com/company/secarchpodcast

More about Tanya:

https://www.linkedin.com/in/tanya-janca/

To promote our work and support the podcast, please review us here:

https://www.podchaser.com/podcasts/security-architecture-podcast-1313281




Aug 04, 202135:29
Google's (BeyondCorp)   - SASE (ZTNA) - Season 2 - #28

Google's (BeyondCorp) - SASE (ZTNA) - Season 2 - #28

Jian from Google's (BeyondCorp)  joins us to discuss the #SASE #ZTNA offering.  Jian is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements, or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

White paper

https://services.google.com/fh/files/misc/secure_access_to_saas_apps_with_bce.pdf

Demo

https://zipline.appspot.com/serve/beyond-corp-clickable-demo/beyond-corp-clickable-demo

BeyondCorp is Google's implementation of the zero trust model. It builds upon a decade of experience at Google, combined with ideas and best practices from the community. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN.

Jian

Jian Zhen is a Product Manager for Google Cloud Security’s BeyondCorp Enterprise solution. He has 20 years of experience in the security industry and has worked in various areas including cloud security, EDR, and SIEM. Most recently, Jian was a co-founder of TrustPath that delivered a real-time threat prevention solution. Prior to that, Jian was the SVP of Products at Endgame, an endpoint detection and response company. Jian was also the Director of Cloud Solutions at VMware that delivered vCloud solutions for telcos and data center operators.

Apr 22, 202136:49
Axis Security - SASE (ZTNA) - Season 2 - #27

Axis Security - SASE (ZTNA) - Season 2 - #27

Gil from Axis Security, joins us to discuss the #SASE #ZTNA offering. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

White paper:

http://bit.ly/3s7MzA9

Demo:

http://bit.ly/3bVRjmJ

Gil Azrielant is co-founder and CTO of Axis Security. Gil is responsible for technology strategy and the development of the company’s cloud-based zero-trust application access platform. Prior to joining Axis Security, Gil was co-founder & CTO of Cool Cousin, a cloud-based platform for travelers looking to unlock outstanding travel experiences.

Gil’s cybersecurity career began in the elite Unit 8200 of the Israeli Army Intelligence Corps, where he worked on advanced cyber security and code decryption. He served five years inside this elite unit, working as a researcher and team leader.

Gil holds a Bachelor of Science degree in Computer Science and graduated magna cum laude from IDC Herzliya, one of Israel's leading academic institutions.

About Axis

Axis Security’s fast, simple, and secure approach to application access is built on a zero-trust, agentless-first approach. Application Access Cloud enables more use cases, covering more apps than any other access solution, keeping users off the network and away from the apps themselves. Axis eliminates the need for VPNs, VDIs, network changes, or agents on every device. With Application Access Cloud deployment is fast, access is easy, and the organization is more secure than ever.

Mar 18, 202133:36
BeyondTrust - SASE (ZTNA) - Season 2 - #26

BeyondTrust - SASE (ZTNA) - Season 2 - #26

Trevor A. Combs from BeyondTrust joins us to discuss the SASE  ZTNA offering. Trevor is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

White paper:

https://www.beyondtrust.com/resources/whitepapers/enable-and-secure-your-remote-workforce

Demo:

https://www.beyondtrust.com/resources/videos/demo-privileged-remote-access

About Trevor:

Trevor A. Combs is a proven expert when it comes to Secure Remote Support tools and the processes around them. He is currently a Senior Solutions Engineer at BeyondTrust. Prior to that, he spent most of his career in IT Process and Program Management for various global companies in the IT Support, Finance, Construction, and Vendor Outsourcing industries. He has over 20 years in the Support and Security space. In Trevor’s free time, he enjoys teaching seminars and classes to seniors on how to enrich their lives with technology, and keep their data and personal information safe.

BeyondTrust:

Most privileged access management solutions just focus on passwords. BeyondTrust is different. Our innovative Universal Privilege Management approach to cyber security secures every user, asset, and session across your enterprise. Deployed as SaaS or on-premises, BeyondTrust's Universal Privilege Management approach simplifies deployments, reduces costs, improves usability, and reduces privilege risks. Trusted by more customers, our Universal

Mar 04, 202134:20
Fortinet - SASE (ZTNA) - Season 2 - #25

Fortinet - SASE (ZTNA) - Season 2 - #25

Rafi from Fortinet joins us to discuss the #SASE #ZTNA offering. Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

About Rafi:

Rafi is an accomplished information security professional with over fifteen years of experience helping Canadian companies secure and monitor their networks. Prior to joining Fortinet as a Systems Engineer, Rafi worked with Fortune 25 companies to analyze, decode, and respond to Advanced Persistent Threats from one of North America’s premier Security Operations Centres. Building on this experience, Rafi was charged with architecting and implementing advanced security and monitoring infrastructure protecting sensitive corporate and government data on a global basis. Rafi holds several industry certifications from the SANS institute.

About Frotinet

The Fortinet Security Fabric platform secures the largest enterprise, service provider, and government organizations around the world. More than 455,000 customers trust Fortinet to protect their organizations.

Feb 26, 202119:30
Remote Access, Moneyball with Greg Irvin from BWG Strategy #24

Remote Access, Moneyball with Greg Irvin from BWG Strategy #24

We are airing a special episode as part of our season one where we talk about industry leaders from many different angles.

Our guest for the show is Greg Irwin, Greg is Co-Founder and Moderator at BWG   


Today we are talking about one of the main aspects of any company, MONEY.   

Topics on the show 

 Let’s discuss the Enterprise Security Market, and why it's so important to investors right now

  • How resilient is investor interest in Enterprise Security?
  • How does ZT compare to other major themes in enterprise security - supply chain security, data governance security, cloud security, remote workers?
  • How do different investors (VC, PE, Public Equity) view the Enterprise Security Market?
  • Given the crowded security vendor market, how does a vendor cause disruption and differentiate?
  • How are the winners selected?
  • How are the platform vendors viewed compared to the security best-of-breed vendors?
  • What are investors expecting with regards to the impact of COVID on the market in 2021 and beyond?

Greg's Bio

Greg Irwin is Co-Founder and Moderator at BWG Strategy and has 20+ years of experience in the Technology market. Having spent nearly a decade at Avaya and the last seven years moderating industry forums on everything from Enterprise Software, Cyber Security, IT Infrastructure and beyond, Greg has a fantastic pulse technology trends, tech roadmaps, and which solution vendors are on the cutting edge of innovation.  From 1994-2001, Greg worked in investment banking at Salmon Smith Barney / Citigroup covering Technology/Telecom. Greg earned a Bachelor of Engineering from Dartmouth College.  He lives in Westfield, NJ with his wife Hillary and two children.

BWG Description

Through its virtual forums, BWG Strategy brings together skilled professionals to share experiences, learn and build valuable relationships all while providing timely primary research on real-world trends and unique insights.

https://bwgstrategy.com/

Feb 23, 202125:18
Akamai - SASE (ZTNA) - Season 2 - #23

Akamai - SASE (ZTNA) - Season 2 - #23

Sriram from Akamai joins us to discuss the #SASE #ZTNA offering. Sriram is a Product Line director within Akamai’s Enterprise Division He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).


Product Whitepaper:

Product Demo:


About Sriram:

Sriram Balasubramanian is a Product Line director within Akamai’s Enterprise Division. He is responsible for Akamai’s SASE initiatives around Zero Trust Access. Sriram has more than a decade of experience in product management across varied fields including Networking, Security and Internet of Things. Prior to Akamai, Sriram spent 7 years with Cisco Systems leading various emerging initiatives within the company. Sriram holds a Bachelor and Master’s degree in computer science.

About Akamai:

Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything, from the enterprise to the cloud, so customers and their businesses can be fast, smart and secure. Top brands globally rely on Akamai to help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps decisions, apps and experiences closer to users than anyone – and attacks and threats far away.

Feb 18, 202131:24
Tehama- SASE (ZTNA) - Season 2 - #22

Tehama- SASE (ZTNA) - Season 2 - #22

Paul Vallée from Tehama joins us to discuss the SASE  ZTNA offering. Paul is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Overall Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

Demo:

Whitepaper

Paul Vallée is a CIGI senior fellow and the founder and CEO of Tehama. Paul is a serial entrepreneur who has spent his career at the forefront of cutting-edge technologies that enable the exchange of work over the internet. In 1997, he founded Pythian, a data-centric services business with a focus on remote work. Under his leadership, the company developed groundbreaking tools that enable remote teams to work and interact seamlessly and securely across multiple continents. Tehama was born at Pythian, launched to the public in 2018 and, due to rapid adoption of the platform, spun out to become fully independent in 2019.

Paul is active in the Council of Canadian Innovators and the CIO Strategy Council and serves on the board of the Basic Income Canada Network. In 2016 he was named Diversity Champion of the Year by Women in Technology and Communications.

About Tehama

Tehama’s Enterprise Desktop as a Service (DaaS) is the fastest, easiest, most secure way to deploy a virtual workforce. With our next-generation DaaS platform, enterprises can create cloud-based virtual offices, rooms, and desktops anywhere in the world. No other solution on the market today connects remote workers with mission-critical and data-sensitive systems, with the speed, agility, unparalleled security, and comprehensive audit trail via built-in SOC 2 controls, real-time activity feeds, and session recordings that Tehama offers. For more information, visit tehama.io.

Feb 04, 202138:10
Palo Alto Networks - SASE (ZTNA) - Season 2 - #21

Palo Alto Networks - SASE (ZTNA) - Season 2 - #21

Jason Georgi from Palo Alto Networks joins us to discuss the SASE  ZTNA offering. Jason is an accomplished technology executive with 25 years of experience. He is currently the Field Chief Technology Officer for Prisma Access and SaaS

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

Demo

Whitepaper

About Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. PaloAlto mission is to be the cybersecurity partner of choice, protecting our digital way of life. PaloAlto help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, PaloAlto is  at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices.


RI24qJv6dtliBXj0kHCr

Jan 28, 202134:19
Twingate- SASE (ZTNA) - Season 2 - #20

Twingate- SASE (ZTNA) - Season 2 - #20

Alex Marshall from Twingate joins us to discuss the SASE  ZTNA offering. Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode


The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SCCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

Whitepaper:

Demo/POC:

About Alex :

Alex is the Chief Product Officer of Twingate, which he co-founded in 2019. Alex has held a range of product leadership roles in the enterprise software market over the last 16 years, including at Dropbox, where he was the first enterprise hire in the company's transformation from consumer to enterprise business. A focus of his product career has been using the power of design thinking to make technically complex products intuitive and easy to use. Alex graduated from Stanford University with a degree in Electrical Engineering.

https://www.linkedin.com/in/awmars/

About Twingate:

Twingate provides a simple, modern approach to securing online work. Delivered as a cloud-based service, Twingate empowers IT teams to easily configure a software-defined perimeter without changing infrastructure, and centrally manage user access to internal apps, whether they are on-prem or in the cloud.


RI24qJv6dtliBXj0kHCr

Jan 21, 202136:42
CheckPoint- SASE (ZTNA) - Season 2 - #19

CheckPoint- SASE (ZTNA) - Season 2 - #19

Noa Zilberman from Checkpoint joins us to discuss the SASE  ZTNA offering. Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

Demo:

https://pages.checkpoint.com/corporate-access-demo.html

Whitepaper

https://www.checkpoint.com/products/remote-user-secure-access/


About Noa

Noa Zilberman is the co-founder and Chief Product at Odo Security, a Zero-Trust Network Access (ZTNA) startup recently acquired by Check Point. Odo is a clientless, cloud-hosted platform for easy and secure access to corporate resources without VPNs. Before Odo, Noa served in unit 8200 as a network researcher, leading an independent project resulting in new capabilities for the Israeli army.

https://www.linkedin.com/in/noa-zilberman/


About Checkpoint

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive, consolidated and effective security solutions in the marketplace. Check Point protects over 100,000 organizations of all sizes.

Jan 14, 202124:49
Iboss- SASE (ZTNA) - Season 2  - #18

Iboss- SASE (ZTNA) - Season 2 - #18

Paul Martini from IBOSS  joins us to discuss the SASE  ZTNA offering. Paul is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was a key architect for a wide variety of complex security and technology solutions.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode


The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

DEMO

https://www.iboss.com/request-demo/

White paper

https://www.iboss.com/sase/

More about Paul

Paul Martini is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide variety of complex security and technology solutions for clients such as Phogenix, the U.S. Navy, and Hewlett Packard. He was also a key contributor at Copper Mountain Networks which was a pioneer in introducing broadband networks used by Telcos to build the cloud. Paul has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of The Year award and being named one of Goldman Sachs’ 100 Most Intriguing Entrepreneurs.

About IBOSS

The iboss cloud platform delivers all network security capabilities in the cloud via a SaaS offering. This eliminates the need for traditional network security appliances allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity. The future of network security is in the cloud and iboss can make that a reality today as a robust implementation of the Gartner SASE model.

Dec 17, 202034:30
Appgate- SASE (ZTNA) - Season 2 - #17

Appgate- SASE (ZTNA) - Season 2 - #17

Jason Garbis from Appgate joins us to discuss the SASE  ZTNA offering. Jason is Senior Vice President of Products for Appgate, responsible for the company's security product strategy and product management.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

Whitepaper :

https://d3aafpijpsak2t.cloudfront.net/docs/Whitepapers/WP_Definitive_Guide_SDP_092020.pdf?mtime=20200921102233&focal=none&utm_source=website&utm_campaign=rebranded_website2020

Demo

https://ww3.appgate.com/cp/sdp_test-drive

About Jason

Jason Garbis

Jason Garbis is Senior Vice President of Products for Appgate, responsible for the company's security product strategy and product management, and held a similar leadership role at Cryptzone prior to its acquisition by Appgate/Cyxtera. Garbis is also co-chair of the SDP Zero Trust Working Group at the Cloud Security Alliance, where he helps lead research and publication initiatives.

Garbis has over 30 years of product management, engineering, and consulting experience at security and technology firms, including RSA, where he focused on identity management and governance products. Garbis hold a CISSP certification, has a Bachelor’s degree in Computer Science from Cornell University, a High-Technology MBA from Northeastern University, and is a published author. He is also co-chair of the Boston chapter of the Cloud Security Alliance.

https://www.linkedin.com/in/jasongarbis/

About AppGate:

Appgate is a secure access company that provides cybersecurity solutions for people, devices and systems based on the principles of Zero Trust security.  Through a set of differentiated cloud and hybrid security products, Appgate enables enterprises to easily and effectively shield against cyber threats. Appgate serves 3,960 customers across more than 30 countries

Dec 10, 202036:25
Zscaler - SASE (ZTNA) - Season 2 - #16

Zscaler - SASE (ZTNA) - Season 2 - #16

Nathan Howe from Zscaler joins us to discuss their SASE ZTNA solution. Nathan is a Director for Transformation Strategy, Nathan leverages this experience as an Architect, Pen Tester, Manager, and Security Assessor to help guide companies through their transformation challenges.

In the Season 2 Kick-off episode, we introduced the topic with Dr. Chase Cunningham.

Episode #11

For slides and please refer to our website  and watch the video episode

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

Whitepaper :

https://info.zscaler.com/resources-white-papers-zpa-definitive-guide-to-secure-remote-access

Demo

 https://www.zscaler.com/products/secure-access-service-edge

About Nathan

Nathan Howe has 20+ years in security experience across a multitude of organisations including governments enterprises and telco service providers. As a Director for Transformation Strategy, Nathan leverages this experience as an Architect, Pen Tester, Manager and Security Assessor to help guide companies through their transformation challenges. Prior to joining the Zscaler team in 2016 Nathan ended his 12 years at Nestle by successfully delivering Nestle´s Global Cyber Security Compliance.

Connect our guest:

https://www.linkedin.com/in/nbhowe/

About Zscaler:

Zscaler accelerates digital transformation so customers can be more agile, efficient, resilient, and secure. The Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Distributed across more than 150 data centers globally, the SASE-based Zero Trust Exchange is the world’s largest in-line cloud security platform


To promote our work and support the podcast, please review us here

https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Dec 03, 202044:12
Netskope- SASE (ZTNA) - Season 2 #15

Netskope- SASE (ZTNA) - Season 2 #15

This Season is dedicated to SASE  ZTNA, our guest for the show is Michael. Michael is a Principal Global Solution Architect with Netskope.  In his role, he advises Netskope customers on best practices around Netskope deployments and integrating Netskope solutions within customer environments by leveraging integration with the customer technology ecosystem.

We are focusing on one part of SASE related to ZTNA/Remote Access 

In the Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham. 

Episode #11

For slides and please refer to our website  and watch the video episode 

The question we ask the vendors:

1. What's the name of the offering/product addressing the remote access.

2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.

3. How do you license your product? (seats, devices, concurrent connections, bandwidth).

4. How do you tie back to the User Identity and MFA?

5. Describe end user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).

6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. 

7. How would your solution work on slow networks or when the user is roaming between networks?

8. Educate us more about your product’s reporting and alerting options (including UBA).


Demo/POC: 

https://resources.netskope.com/product-demos/demo-netskope-private-access

Link to Whitepaper: 

https://resources.netskope.com/cloud-security-solution-white-papers/zero-trust-leading-practice

Our site: www.security-architecture.org

Michael Bio 

https://www.linkedin.com/in/michael-koyfman-0a3662/

Michael Koyfman is a Principal Global Solution Architect with Netskope.  In his role, he advises Netskope customers on best practices around Netskope deployments and integrating Netskope solutions within customer environments by leveraging integration with the customer technology ecosystem.  He also actively participates in driving and adopting new Netskope product, such as 

Netskope for IaaS and Netskope For Web within the Netskope customer base.  Prior to Netskope, Michael spent almost 13 years at F5 Networks as Senior Global Solution Architect, where he was focused on the entire portfolio of F5 security products, and has been a key contributor to implementation, strategy, and evolution of F5 security solutions and portfolio.   Michael helped architect, develop, and demonstrate various unique solutions and integration with various technology and players such as Microsoft, Citrix, Vmware, Okta, Ping, IBM, CrowdStrike, AWS, Azure.


Company Description:

The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope.


To promote our work and support the podcast, please review us here 

https://www.podchaser.com/podcasts/security-architecture-podcast-1313281


Nov 26, 202036:21
Bitglass- SASE (ZTNA) - Season 2 - #14

Bitglass- SASE (ZTNA) - Season 2 - #14

This Season is dedicated to SASE  ZTNA, our guest for the show is Mike. Mike Schuricht has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products, 

Bitglass private access is a surgical way of allowing particular access for a particular user to the particular application as opposed to exposing the entire network.

We are focusing on one part of SASE related to ZTNA/Remote Access 

In the Season 2 Kick-off episode, we introduced the topic with Dr. Chase Cunningham(Episode #11) 

For slides and please refer to our website  and watch the video episode 


The question we ask the vendors:

1. What's the name of the offering/product addressing the remote access.

2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.

3. How do you license your product? (seats, devices, concurrent connections, bandwidth).

4. How do you tie back to the User Identity and MFA?

5. Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).

6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes. 

7. How would your solution work on slow networks or when the user is roaming between networks?

8. Educate us more about your product’s reporting and alerting options (including UBA).

Whitepaper:  https://www.bitglass.com/zero-trust-network-access

Demo/POC: https://pages.bitglass.com/Bitglass_CASB_Demo.html

Mike Bio

https://www.linkedin.com/in/mschuricht/

Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products, with expertise in configuration management, user-interface design, networking, and enterprise software. Prior to joining Bitglass, Mike was a PM at Palo Alto Networks leading management software and user-interface strategy for both Panorama and PAN-OS. Before that, he held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal business unit. Mike earned an MS in Electrical and Computer Engineering and BS in Computer Engineering from the University of California, Santa Barbara.

Company Description

"Bitglass, the Next-Gen Cloud Security company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution


To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281



Nov 19, 202029:36
Perimeter 81 - SASE (ZTNA) - Season 2 - #13

Perimeter 81 - SASE (ZTNA) - Season 2 - #13

This Season is dedicated to SASE  ZTNA, our guest for the show is Amit. Amit Bareket, CEO and Co-Founder of Perimeter 81, is a cybersecurity expert with extensive experience in system architecture and software development.

We are focusing on one part of SASE related to ZTNA/Remote Access

Amit, CEO of Perimeter 81, strongly believes we can't compete with physics while adopting the superpower of WireGuard, the hottest thing in the P2P VPN protocols.

In Season 2 Kick-off episode we introduced the topic with Dr. Chase Cunningham

https://youtu.be/lDSTnC_7jww

For the video version(slides) and please refer to our website  and watch the video episode 

The question we ask the vendors:

  1. What's the name of the offering/product addressing the remote access.
  2. Describe your overall architecture at a high level (ideally with a picture) - POPs, HA, bandwidth requirements or restrictions.
  3. How do you license your product? (seats, devices, concurrent connections, bandwidth).
  4. How do you tie back to the User Identity and MFA?
  5. Describe end-user access options, clientless/client (People relying these days on their browser for performing their day to day job activities, what are the options you provide to such users).
  6. What kind of protocols your remote solution supports; VOIP, FileShare, Printing, SSCM, Password changes.
  7. How would your solution work on slow networks or when the user is roaming between networks?
  8. Educate us more about your product’s reporting and alerting options (including UBA).

Demo/POC: https://www.perimeter81.com/demo

Link to Whitepaper: https://www.perimeter81.com/solutions/sase

Our site: www.security-architecture.org

Amit Bio

Amit Bareket, CEO and Co-Founder of Perimeter 81, is a cybersecurity expert with extensive experience in system architecture and software development. He is the author of 8 patents issued by the USPTO for storage, mobile applications and user interface. Prior to Perimeter 81, Amit founded SaferVPN, sold in 2019 to J2 Global, and worked as a Software Engineer for major enterprises including IBM XIV Storage and BigBand Networks. He served in the Israel Defense Force’s elite cyber intelligence unit and graduated Cum Laude with a B.Sc. in Computer Science and Economics from Tel Aviv University.

https://www.linkedin.com/in/amit-bareket-638a8b18/

Perimeter 81 Description

Perimeter 81 is a leading SASE provider that has transformed the outdated, hardware-based security appliances into a cloud-based SaaS solution — simplifying secure access for the modern and distributed workforce. Perimeter 81 is trusted by thousands of companies, of all sizes and sectors, and our partners are among the world's foremost managed service providers and channel resellers.

Nov 12, 202033:35
Season 2 Kickoff Episode - SASE (ZTNA) #11

Season 2 Kickoff Episode - SASE (ZTNA) #11

Join us for a Season 2 kickoff discussion, we continue our journey exploring SASE the season is about ZTNA and Remote Access. We were honored to have Dr. Chase Cunningham to join us for the kickoff episode. Dr. Cunningham is a retired Navy Chief Cryptologist with more than 19 years of experience in Cyber Forensic and Analytic Operations currently he is a Principal Analyst and VP covering the ZTNA space.

We are thrilled to bring to this season the key players providing ZTNA Remote Access solutions. We were able to get both very established market leaders and disrupting and innovative new companies as well as companies in a process of a merge. 

We have more than a dozen companies who agreed to take part in our project and share with us their architectures and answer our questions.

Please subscribe to our podcast and follow our work on Linkedin 

More about Dr. Chase Cunningham 

To promote our work and support the podcast, please review us here 

https://www.podchaser.com/podcasts/security-architecture-podcast-1313281





Nov 09, 202016:04
McAfee, SASE Outbound inspection and protection #10

McAfee, SASE Outbound inspection and protection #10

This Season is dedicated to SASE Our guest for the show is Brian Brown, Brian has been an IT professional for 25 years. As a Regional Solution Architect, he is involved with large Enterprise customers in Canada and the US, and is engaged to architect large scale deployments both for customers and MSP partners. A member of ISACA and IASA Global, Brian often speaks at both industry and McAfee events about how to address business objectives with advanced security architecture in Security Operations and Cloud.

We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin

For slides/video lease refer to our website  and watch the video episode 

https://www.security-architecture.org/episodes/s01e10_Mcafee

You can check the questions we ask our vendors.

whitepaper:

https://www.mcafee.com/enterprise/en-us/solutions/unified-cloud-edge.html

POC:

https://www.mcafee.com/enterprise/en-us/forms/demo-request-uce.html?eid=3JDXUM9C


Our site: www.security-architecture.org

About McAfee:

McAfee believes that no one person, product, or organization can fight cybercrime alone. It’s why McAfee rebuilt the idea of working together. People working together. Products working together. Organizations and industries working together.  McAfee's goal is to spread this collaborative attitude to our customers, partners, even competitors. All uniting to overcome the greatest challenge of the digital age—cybercrime—and making the connected world more secure.

More about Brian:

https://www.linkedin.com/in/brian-brown-b20256159/

Oct 26, 202001:03:05
Cato Networks, SASE Outbound inspection and protection #9

Cato Networks, SASE Outbound inspection and protection #9

This Season is dedicated to SASE Our guest for the show is Dave Greenfield is a veteran of IT industry. He’s spent more than 20 years as an award-winning journalist and independent technology consultant. Today, he serves as a secure networking evangelist for Cato Networks.

We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin

For slides and please refer to our website  and watch the video episode 

You can check the questions we ask our vendors.

Whitepaper:

https://www.catonetworks.com/sase/

POC:

https://www.catonetworks.com/try

Our site: www.security-architecture.org

About Cato:

Cato is the world’s first SASE platform, converging SD-WAN and network security into a global, cloud-native service. Cato optimizes and secures application access for all users and locations. Using Cato, customers easily migrate from MPLS to SD-WAN, optimize connectivity to on-premises and cloud applications, enable secure branch Internet access everywhere, and seamlessly integrate cloud datacenters and mobile users into the network with a zero-trust architecture. With Cato, the network, and your business, are ready for whatever’s next.

More about Dave

https://www.linkedin.com/in/davidgreenfield/


#sase #cybersecurity #infosec #cybersec #cyber #infosecurity #secarch #sasecybersummit #cyberawareness #securityarchitecture #workfromanywhere #cybersecuritynews

Sep 17, 202001:07:52
SASE Moneyball Dino Momentum cyber #8

SASE Moneyball Dino Momentum cyber #8

We are airing a special episode as part of our season one where we talk about SASE with industry leaders from many different angles.

Today we are talking about one of the main aspects of any company, MONEY. And who is the right person to talk about funds is people that help companies raise money and buy other companies, we have Dino from Momentum cyber.

Dino Boukouris is a Founding Director at Momentum Cyber, the premier strategic advisor to the Cybersecurity industry.

If the company doesn’t have funds, it will not be able to develop new features and support its infrastructure and customers. Funds are especially important in the SASE market since the company assumes to have cloud presence and cloud presence means that companies need to maintain big cloud infrastructure or pay 3rd party vendors for such infrastructure.

  • What is the total addressable market of SASE ?
  • What so special about Israel and cybersecurity
  • Would it be bigger than the firewall market?
  • Where is the best food in Tel-Aviv
  • Would EDR/EPP vendors take part in such a market.
  • How crowded is the space?
  • Would Google, AWS or Microsoft be part of the space?
  • Recent notable transactions in this space

Join and listen to get answers on some of the questions and much more

Don’t forget to share and subscribe

Dino full bio

Dino has been a speaker at Cybersecurity conferences across the country including the RSA Conference, Cybertech Tel Aviv, Structure Security, Global Cyberspace Coop Summit, IoT Security Panel, M&A East 2017, as well as at numerous private events and corporate gatherings.  Dino is also professional faculty at the University of California, Berkeley – Haas School of Business, where he teaches a top ranked Venture Capital & Private Equity course for the MBA program.

Momentum cyber:

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem. We advise on a broad range of strategic activities, including mergers and acquisitions, board & special situations, corporate strategy & development, corporate finance, and operational excellence.

Mailing list and past industry reports

https://momentumcyber.com/intel/


#cybersecurity #investment #infosec #acquisition #secarch #SASE




Sep 09, 202033:27
IBOSS, SASE Outbound inspection and protection #7

IBOSS, SASE Outbound inspection and protection #7

This Season is dedicated to SASE Our guest for the show is  Paul Martini. Paul is the CEO, Co-founder, and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide-variety of complex security and technology solutions for clients such as Phoenix, the U.S. Navy, and Hewlett Packard.

We are focusing on a small part of SASE related to user browsing and access resources on the internet. 

To promote our work and support the podcast , please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

In Kick off the episode, we introduce the topic with Anton Chuvakin

For slides and please refer to our website and watch the video episode ( need link to episode)

You can check the questions we ask our vendors.

About Vendor:

The iboss cloud platform delivers all network security capabilities in the cloud via a SaaS offering. This eliminates the need for traditional network security appliances allowing organizations to secure network traffic from anywhere, at any scale, while reducing costs and complexity. The future of network security is in the cloud and iboss can make that a reality today as a robust implementation of the Gartner SASE model.

Links to more information about Vendor:

Whitepaper

https://www.iboss.com/the-platform/secure-cloud-gateway-network-security-as-a-service/

POC

https://www.iboss.com/request-demo/

More about Paul

Paul Martini is the CEO, Co-founder and chief architect of iboss. Prior to founding iboss, Paul was key architect for a wide-variety of complex security and technology solutions for clients such as Phogenix, the U.S. Navy, and Hewlett Packard. He was also a key contributor at Copper Mountain Networks which was a pioneer in introducing broadband networks used by Telcos to build the cloud. Paul has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of The Year award and being named one of Goldman Sachs’ 100 Most Intriguing Entrepreneurs.

https://www.linkedin.com/in/martinipaul/

Aug 20, 202001:04:31
Forcepoint, SASE Outbound inspection and protection #6

Forcepoint, SASE Outbound inspection and protection #6

This Season is dedicated to SASE Our guest for the show is Jim Fulton, Jim is Forcepoint’s director of Cloud and Edge Protection solutions.We are focusing on a small part of SASE related to user browsing and access resources on the internet. 

In Kick off the episode, we introduce the topic with Anton Chuvakin

For slides and please refer to our website   and watch the video episode 

To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

You can check the questions we ask our vendors.

About Vendor:

Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries.

Links to more information about Vendor:

Whitepaper

https://www.forcepoint.com/blog/tags/sase:

POC:

https://www.forcepoint.com/product/dynamic-edge-protection

More about Jim

Forcepoint is the global cybersecurity leader for user and data protection. Forcepoint’s behavior-based solutions adapt to risk in real-time and are delivered through a converged security platform that protects network users and cloud access, prevents confidential data from leaving the corporate network, and eliminates breaches caused by insiders. Based in Austin, Texas, Forcepoint creates safe, trusted environments for thousands of enterprise and government customers and their employees in more than 150 countries.

https://www.linkedin.com/in/fultonjim/

Aug 13, 202001:26:49
Checkpoint, SASE Outbound inspection and protection #5

Checkpoint, SASE Outbound inspection and protection #5

This Season is dedicated to SASE Our guest for the show is Gregory Paper, Greg is a Security Architect and Evangelist with over 13 years at Check Point Software Technologies

We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin

For slides and please refer to our website and watch the video episode

To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

You can check the questions we ask our vendors.

About Vendor:

Whitepaper:

https://www.checkpoint.com/products/branch-cloud-security/

POC:

https://portal.checkpoint.com/signin

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive, consolidated and effective security solutions in the marketplace. Check Point protects over 100,000 organizations of all sizes

More about Greg

Greg Pepper is a Security Architect and Evangelist with over 13 years at Check Point Software Technologies. Greg has been an IT professional for 20+ years with expertise in Security, Networking & Cloud Computing. Prior to Check Point, Greg has worked at well-known companies like Cisco, Sony Online Entertainment, Price Waterhouse Coopers and Organic.

https://www.linkedin.com/in/gregorypepper/



Aug 06, 202051:52
Netskope, SASE Outbound inspection and protection #4

Netskope, SASE Outbound inspection and protection #4

This Season is dedicated to SASE Our guest for the show is Bob Gilbert, Bob is a product marketing leader with a proven track record in Silicon Valley

We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin

For slides and please refer to our website  and watch the video episode

To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

You can check the questions we ask our vendors.

About Vendor:

The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks, empowering the largest organizations in the world with the right balance of protection and speed they need to enable business velocity and secure their digital transformation journey. Reimagine your perimeter with Netskope.

Link to demo or trial registration:
https://www.netskope.com/why-netskope

https://resources.netskope.com/product-demos


More about Bob Gilbert:

 https://www.linkedin.com/in/bobegilbert/

Bob is a product marketing leader with a proven track record in Silicon Valley. Bob enjoys working in fast-paced start-up environments where and leverages his skills and experience to launch products and showcase innovative technology. He is a prolific speaker, evangelist, motivator, and hands-on product demonstrator. Bob loves to build world-class teams that are wicked smart, work hard, but also know how to have fun on their path towards success.

Jul 30, 202001:09:43
Zscaler, SASE Outbound inspection and protection #3

Zscaler, SASE Outbound inspection and protection #3

This Season is dedicated to SASE Our guest for the show is Patrick Foxhoven is the CIO and Vice President of Emerging Technologies at Zscaler.

We are focusing on a small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin

For slides and please refer to our website and watch the video episode.

To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

You can check the questions we ask our vendors.

About Zscaler: "Zscaler is a global cloud-based security company that enables organizations to securely transform their networks and applications for a mobile and cloud-first world, and protects against cyberattacks and data loss. Zscaler is a secure access service edge (SASE) service built from the ground up for performance and scalability. Its flagship services, Zscaler Internet Access and Zscaler Private Access, create fast, secure connections between users and applications, regardless of device, location, or network. Zscaler services are 100 percent cloud-delivered and offer the simplicity, enhanced security, and improved user experience that traditional appliances are unable to match.

Links to more information about Zsclaer

Link to demo or trial registration:

www.zscaler.com/products/secure-access-service-edge

More about Patrick:

 https://www.linkedin.com/in/pfoxhoven/

Patrick Foxhoven is the CIO and Vice President of Emerging Technologies at Zscaler. He is an experienced and innovative managed security entrepreneur and technologist, having spent 20 years building secure and scalable internet-enabled networks while co-authoring three books on information security and receiving multiple patents. He is currently Chief Information Officer & Vice President of Emerging Technologies at Zscaler

Jul 23, 202001:16:54
Bitglass, SASE Outbound inspection and protection #2

Bitglass, SASE Outbound inspection and protection #2

This Season is dedicated to SASE.

Our guest for the show is Mike Schuricht (VP Product Management), Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. 

We are focusing on s small part of SASE related to user browsing and access resources on the internet. In Kick off the episode, we introduce the topic with Anton Chuvakin

You can check the questions we ask our vendors. 

To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

For slides and please refer to our website  and watch the video episode

About Bitglass:

 "Bitglass, the Next-Gen Cloud Security company, is based in Silicon Valley with offices worldwide. The company's cloud security solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution". AS part of Bitglass innovation, they announced their support and availability of Smart Edge Secure Webgate earlier in 2020. 

Links to more information about Bitglass

Whitepaper: Bitglass SASE architecture

Request a Demo -Bitglass

Technical Brief: SmartEdge Secure Web Gateway

More about Mike:  Mike has been leading the product management and techpubs teams since he joined Bitglass in Nov 2013. He has a background in the development of innovative enterprise security products, with expertise in configuration management, user-interface design, networking, and enterprise software. Prior to joining Bitglass, Mike was a PM at Palo Alto Networks leading management software and user-interface strategy for both Panorama and PAN-OS. Before that, he held technical marketing and engineering roles at Mentor Graphics for the Advanced Mixed-Signal business unit. Mike earned an MS in Electrical and Computer Engineering and BS in Computer Engineering from the University of California, Santa Barbara.

Jul 09, 202056:58
Kickoff Episode - SASE (Secure Access Service Edge) #1

Kickoff Episode - SASE (Secure Access Service Edge) #1

Join us for a kickoff discussion with security expert Dr. Anton Chuvakin, one of the known Gartner veterans and author of many security books and publications. We invited Dr. Chuvakin to discuss and introduce the topic of our first Season - SASE. Gartner defines SASE (pronounced as "sassy") as a package of technologies including SD-WAN, SWG, CASB, ZTNA, DLP, IDP, FWaaS, and others as core abilities.  We identified multiple vendors on the market; some of them are SWG who are trying to break into CASB, and some of them are CASB who are trying to break into SWG as well as FW and SDWAN vendors who are looking their way into SASE. Since the topic is so wide, we decided to keep our focus at the user accessing the internet capabilities of SASE and cover other parts of SASE such as remote-access in the future Seasons.

Please subscribe to our mailing list  and podcast 

To promote our work and support the podcast, please review us here https://www.podchaser.com/podcasts/security-architecture-podcast-1313281

Jun 29, 202029:31