As the quote says “all good things are worth waiting for”. And now that you are considering your journey to SASE – or maybe you’ve already started – then you are on the right path to better security combined with enhanced productivity for your workforce.

Just make sure that you define your journey and set your goals before you start. The true outcomes of a successful SASE implementation include:
Stopping all threats
Protecting all users regardless of location or device
Securing all content, applications and web traffic
Invisible to end users
Extending a platform to include multiple elements of the security stack

Learn the key considerations as you carry out your journey to cloud based security – SASE.


Watch On-Demand

Now in it’s eighth year, the Cyberthreat Defense Report has become a staple among security leaders and practioners, helping them gauge their internal practices and security investments against those of their peers across different countries and industries.
Gain key insights to security concerns, projects and priorities of security leaders globally to help define your internal strategy and investment plan


To protect productivity and enable modern businesses, today’s mobile workforce needs fast, secure, and reliable Internet access. Much of the currently deployed security technology is not equipped to secure today’s volume of Internet traffic, SaaS applications, or offer the security capabilities needed to overcome the challenges presented by today’s expanded attack surface. So, how should security teams secure work and keep up with the demands of the business and workforce?

During this discussion, Jack Miller, Head of Global Professional Services at Menlo Security and a former CISO, will answer that question and dive deep into how organizations are moving away from legacy security solutions to overcome the challenges that remote work presents today.


With the continued migration of people, data and applications to the cloud, it has become clear that the traditional ways of implementing policy and security are gone. To fully realize the promise of digital transformation projects, security must be the final piece of the puzzle to make the journey to the cloud, putting it back in proximity to what it is designed to protect – people, data and applications.
Learn how the key elements of a SASE architecture can reap benefits for organizations large and small and how to get started on that journey.


Recent waves of security breaches tied to phishing emails, ransomware attacks, and other threat campaigns are causing cybersecurity professionals to revisit their approaches to securing their organizations.

Fueled by rapid cloud adoption to cater to distributed workforces, many organizations have found their legacy security measures fail to identify threats and protect modern networks. Legacy detect-and-remediate approaches have long been the cybersecurity standard, but savvy threat actors easily poke holes in that strategy.

Organizations are looking to isolation-powered security solutions to provide an alternative method to current, failing architectures to overcome challenges presented by complex networks and expanded attack surfaces. These modern and effective techniques separate the network from the Internet, assuming all traffic is inherently bad–hence the moniker, “Zero Trust.”

During this upcoming discussion, Marlese Lessing, from SDxCentral, dives deep on the topic with industry expert and Senior Director of Cybersecurity Strategy at Menlo Security, Mark Guntrip, to discuss the paradigm shift. Attendees can expect to learn about:

• The rising threats of online attacks and security breaches.
• How traditional detection-based solutions work and why they aren’t effective.
• Why isolation-powered security solutions drastically reduce online security threats.


Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.


Web proxies were invented in the early 1990s for people to access the Internet from behind a firewall. To enhance security, different capabilities were added to scan for malicious content, decrypt encrypted web traffic, and inspect for data loss. This came at a tremendous cost of hardware and operational overhead. That was BEFORE 75% of the workforce became remote workers.

Today, enabling web access and protecting productivity requires a new approach centered on isolation technologies powered by the cloud. A new architectural approach to web proxies designed to cater to knowledge workers — as well as modern-day threats — enhances protection and simplifies day-to-day load on security operations.


If you’re a growing modern business, you likely have an appetite for the secure access service edge (SASE). We hate to break it to you, but there’s no “secret sauce” when it comes to successfully implementing the SASE framework. Every organization is different, with variying priorities for protecting their employees, customers, data, devices, and applications. It’s best to look at SASE as a themed menu of converged technologies that allows you to choose ones that will deliver the maximum business impact. During this discussion featuring Menlo Security’s Senior Director of Cybersecurity Strategy, Mark Guntrip, he invites you to take a seat at the SASE table to learn about the deployment menu you can build for your organization. Attendees can expect to learn:

• Why Zero Trust and SASE are the perfect pairings
• How SASE enables organizations to taste productivity gains
• How organizations can create a mix of satisfying integrated controls


Today’s modern business requires greater agility, and to achieve that, they’re laser-focused on the shift to the cloud. At the same time, the workforce has shifted from mobile to fully remote, with more location flexibility anticipated to be a lasting impact of the pandemic. This emphasis on digital transformation initiatives requires organizations to reimagine their network and security strategies. That’s why many are looking to secure access service edge (SASE) to align security and networking architectures in a cloud-delivery model. However, moving to SASE requires a phased approach that aligns with an organization’s specific business objectives. > Join ESG Senior Analyst John Grady and Menlo Security Director of Cybersecurity Strategy Eric Schwake as they discuss how security leaders today can take a pragmatic path to SASE. Expect to learn more about topics that include: – The criticality of protecting browser-based traffic – Leveraging SASE as a business enabler – How to take a Zero Trust-oriented path towards SASE

Featured speakers.


Mark Guntrip
Sr Dir, Cybersecurity Strategy
Menlo Security

Steve Piper
CEO
CyberEdge Group

Nick Edwards
VP of Product Management
Menlo Security

Jack Miller
Head of Professional Services
Menlo Security