Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

The Power of a Comprehensive Platform to Provide Proper Cloud Security

Truth in IT
01/27/2024
38
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


You need to be able to gather all that information about where the user is coming from, every incident that they are creating throughout their day, every wire they are tripping, so to speak, in terms of, um, attempting to do things they shouldn't be doing. Um, maybe combining that data with who the user is, where their location is, um, and, and being able to do something intelligent around that, both from a security perspective as well as from an administration perspective. Because I know Steve, for instance, is on my team and he and I collaborate. But and IT team is now creating a policy for a new product marketer that has joined the company. Wouldn't it be great if the solution already knew that your organization and said, hey, for most PMM's, here are the policies that you should implement that match the other organization's policies of a light user and do that automatically, right? Um, and the only way you could do that is context, big data crunching, understanding behavior, right? Um, and having that intelligence built into the platform, um, and and that is the power of a platform. And that is why you truly and cannot do proper cloud security without a platform.

Watch this clip to understand the importance of a comprehensive security platform like Zscaler for cloud security, for the integration of user context, behavior analytics, and big data processing. The platform should intelligently assess user actions, locations, and roles to proactively enforce security policies and streamline administration. Salah Nasser envisions a solution that automatically aligns with organizational roles—like a Product Marketing Manager (PMM)—to implement appropriate security measures based on an understanding of typical user profiles and activities.

Categories:
  • » Webinar Library » Zscaler
Channels:
  • Zscaler Highlights: Reducing Risky User Behaviors
News:
Events:
Tags:
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: The Power of a Comprehensive Platform to Provide Proper Cloud Security

              Upcoming Webinar Calendar

              • 05/06/2026
                02:00 AM
                05/06/2026
                Harnessing AI to Identify Attacks Before They Escalate into Breaches
                https://www.truthinit.com/index.php/channel/1886/harnessing-ai-to-identify-attacks-before-they-escalate-into-breaches/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Existing Passwords
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-existing-passwords/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Next Steps for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-next-steps-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Spring of Satori: A Deep Dive into 2026's Threat Landscape and Insights
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-insights/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Across All Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-across-all-phases/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/28/2026
                10:00 AM
                05/28/2026
                Harnessing AI: Transforming Illusion into Purposeful Mastery
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-illusion-into-purposeful-mastery/

              Upcoming Events

              • May
                06

                Harnessing AI to Identify Attacks Before They Escalate into Breaches

                05/06/202602:00 AM ET
                • May
                  06

                  World Password Day: Strategies for Managing Your Existing Passwords

                  05/06/202610:00 PM ET
                  • May
                    07

                    World Password Day: Strategies for Managing Your Passwords Effectively

                    05/07/202605:00 AM ET
                    • May
                      07

                      World Password Day: Next Steps for Managing Your Passwords Effectively

                      05/07/202601:00 PM ET
                      • May
                        12

                        Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                        05/12/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version