Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

The Power of a Comprehensive Platform to Provide Proper Cloud Security

Truth in IT
01/27/2024
38
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


You need to be able to gather all that information about where the user is coming from, every incident that they are creating throughout their day, every wire they are tripping, so to speak, in terms of, um, attempting to do things they shouldn't be doing. Um, maybe combining that data with who the user is, where their location is, um, and, and being able to do something intelligent around that, both from a security perspective as well as from an administration perspective. Because I know Steve, for instance, is on my team and he and I collaborate. But and IT team is now creating a policy for a new product marketer that has joined the company. Wouldn't it be great if the solution already knew that your organization and said, hey, for most PMM's, here are the policies that you should implement that match the other organization's policies of a light user and do that automatically, right? Um, and the only way you could do that is context, big data crunching, understanding behavior, right? Um, and having that intelligence built into the platform, um, and and that is the power of a platform. And that is why you truly and cannot do proper cloud security without a platform.

Watch this clip to understand the importance of a comprehensive security platform like Zscaler for cloud security, for the integration of user context, behavior analytics, and big data processing. The platform should intelligently assess user actions, locations, and roles to proactively enforce security policies and streamline administration. Salah Nasser envisions a solution that automatically aligns with organizational roles—like a Product Marketing Manager (PMM)—to implement appropriate security measures based on an understanding of typical user profiles and activities.

Categories:
  • » Webinar Library » Zscaler
Channels:
  • Zscaler Highlights: Reducing Risky User Behaviors
News:
Events:
Tags:
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: The Power of a Comprehensive Platform to Provide Proper Cloud Security

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version