Meghana P
  • Bangalore, Karnataka
  • India
  • CISO Platform
Share on Facebook
 

Meghana P's Page

Profile Information

Company
CISO Platform

Meghana P's Blog

A Guide to Choosing a Next-Generation Firewall

Posted on June 10, 2019 at 2:00pm 0 Comments

Now that we have examined the differences between traditional firewalls and the next generation firewalls (NGFW), let's look at five of the top NGFW solutions from Cisco, CheckPoint, Fortinet, WatchGuard and Dell (SonicWALL).

It is important to note that these five vendors were selected as they were highlighted in the most recent industry reports; they're not the only NGFW vendors on the market today and enterprises have other…

Continue

A Cautionary Tale about Next Generation Firewalls…

Posted on April 4, 2019 at 2:27pm 0 Comments

Businesses and organizations are fielding more & more next-generation Information Security technologies to reduce their risks as businesses leverage cloud capabilities and from advanced persistent threats. Unfortunately, we see our customers falling into a common Information Technology and general acquisition trap: Significantly underestimating the complexity, cost, and time to complete the Next Generation Firewall (NGFW)…

Continue

How Google Protects Its Corporate  Security Perimeter without Firewalls

Posted on May 4, 2017 at 11:00am 0 Comments

How Google Protects Its Corporate  Security Perimeter without Firewalls (RSA Conference 2017)

The increasing mobility of professional users has brought an end to the traditional corporate security perimeter. Google has reinvented its security perimeter around devices through its ground breaking "BeyondCorp" initiative. In this talk, two Google security leaders will share how this transformation took place,…

Continue

Cybersecurity vs. Tokenization

Posted on May 4, 2017 at 11:00am 0 Comments

Cybersecurity vs. Tokenization (RSA Conference 2017)

Tokenization is the latest data protection method, but does it help or hinder cybersecurity-this is the current debate. This session will look at who, what, where, when, how and why of using tokens.

Detailed Presentation:…

Continue

Comment Wall

You need to be a member of CISO Platform to join the discussion!

Join CISO Platform

  • No comments yet!
 
 
 

© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service