Boon Peng brings 17 years of IT experience to Menlo Security in his role as a Director, Solutions Architect for Asia Pacific. This includes providing analysis study of client's business and technical requirements and recommending security design using Menlo Security threat isolation in devising strategies to mitigate customer’s security risk. Prior to joining Menlo Security, Boon Peng was the Solutions Architect for FireEye, Client Services Manager for Symantec.cloud, Senior Regional SE at Zscaler Inc and Cisco/IronPort Systems respectively, responsible for the technical presales consultation of the product line. Boon Peng holds a Bachelor degree in Information Technology from Queensland University of Technology in Australia.
Today's anywhere workforce needs everywhere protection. And when 80% of CISO's say they've experienced a breach, we've reached a turning point. Enabling and protecting productivity in this future of Work requires a new approach. But it means thinking differently.
Many security organizations have adopted a Zero Trust approach to security. While this has traditionally been aligned with trusting identities, it extends into overall threat protection, meaning security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click–resulting in a truly preventative approach to securing the anywhere, anytime workforce.
By now, you've also heard the acronym SASE (Secure Access Service Edge), a secure networking architecture that many security leaders are looking to deploy within their organizations. But what is the tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other?
During this session, Mark Guntrip, Senior Director of Cybersecurity Strategy at Menlo Security, will tackle these questions and dive deep on:
The world has reached a security inflexion point and a unique opportunity to reconsider how networks, IP assets, and end-users are protected from an expanding array of cyber threats. Those who choose the right path could emerge more secure than ever before with the capabilities to deliver security without compromise to the new workforce.
Watch the on demand session here