How to Secure Unmanaged Devices, with Palo Alto Networks | CXOTalk

  Переглядів 15,252

CXOTALK

CXOTALK

2 місяці тому

In this episode of CXOTalk, Michael Krigsman speaks with Anand Oswal from Palo Alto Networks to explore the critical issue of securing unmanaged devices by using enterprise browsers.
Oswal highlights the alarming statistic that over 50% of devices accessing corporate data are unmanaged, contributing to 90% of successful malware attacks. He emphasizes the need for robust security measures that can consistently protect both managed and unmanaged devices without compromising user experience. The discussion examines the role of enterprise browsers as a solution, with Gartner predicting their significant adoption by 2030 for secure application access on unmanaged devices.
The conversation further examines the risks associated with unmanaged devices and the strategies organizations can employ to mitigate these threats. Oswal outlines a three-step approach involving Secure Access Service Edge (SASE), securing the browser workspace, and implementing data loss prevention controls.
He also discusses Palo Alto Networks' acquisition of Talon, to enhance their security offerings with a secure enterprise browser. The integration of Talon's technology with Palo Alto's Prisma SASE architecture aims to provide a seamless and secure browsing experience, extending protection to the growing number of contractors and remote workers using personal devices for corporate tasks.
The episode concludes with Oswal stressing the importance of education in understanding the risks of unmanaged devices and the necessity of a holistic security approach that encompasses all devices within an organization.
🔗 Stay Connected:
🔷 Read the transcript and key takeaways: www.cxotalk.com/episode/how-t...
🔷 Subscribe: newsletter.cxotalk.com
🔷 LinkedIn: www.linkedin.com/company/cxotalk
🔷 Twitter: cxotalk
💡Subscribe and turn on notifications to catch the latest episodes of CXOTalk!

КОМЕНТАРІ
Kubernetes Tutorial for Beginners [FULL COURSE in 4 Hours]
3:36:55
TechWorld with Nana
Переглядів 8 млн
NO NO NO YES! (40 MLN SUBSCRIBERS CHALLENGE!) #shorts
00:27
PANDA BOI
Переглядів 91 млн
ВИРУСНЫЕ ВИДЕО / Мусорка 😂
00:34
Светлый Voiceover
Переглядів 8 млн
Повістки у Києві: «Яке право вони мають забирати всіх мужиків?» #війна #мобілізація #військові
00:41
Слідство.Інфо | Розслідування, репортажі, викриття
Переглядів 1,3 млн
Zero Day Bug Found in Popular Firewalls
8:32
Mental Outlaw
Переглядів 57 тис.
CyberSecurity vs Cloud Security - Which One Should You Learn?
12:14
Tech With Soleyman
Переглядів 11 тис.
Insilico Medicine - 10 Years of AI Drug Discovery Innovation
14:59
Insilico Medicine
Переглядів 1,6 тис.
Cybersecurity Architecture: Application Security
16:36
IBM Technology
Переглядів 43 тис.
Zero Trust Explained | Real World Example
21:46
CertBros
Переглядів 10 тис.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Такого вы точно не видели #SonyEricsson #MPF10 #K700
0:19
BenJi Mobile Channel
Переглядів 1,2 млн
Компьютерная мышь за 50 рублей
0:28
dizzi
Переглядів 1,2 млн
iPhone - телефон для нищебродов?!
0:53
ÉЖИ АКСЁНОВ
Переглядів 3,5 млн