All episodes
-
How To: Improve Data Governance with DSPM Classification
Daniel Feller, Principal Technical Marketing Manager
Organizations are trying to discover and protect data spread across numerous SaaS, private, Web, and infrastructure containers. Many of these data containers hold sensitive information. To help with this, users are trained to apply classifications tags to help the organization identify classified data, to better enforce access controls, and to meet compliance requirements.
But manual classification is error prone. Every user must learn, understand and apply the same logic when selecting the most appropriate classification tag. Learn how the Lookout Cloud Security Platform empowers you to maintain a strong data security posture. -
How To: Enforce Encryption for Data at Rest
Daniel Feller, Principal Technical Marketing Manager
Data breaches are a constant concern for organizations. Sensitive information, including personally identifiable information (PII), intellectual property, and financial records, is a prime target for cyberattacks.
Learn how the Lookout Cloud Security Platform can help improve your overall data security compliance. -
How To: Provide Continuous, Zero Trust Access
Daniel Feller, Principal Technical Marketing Manager, Lookout
Transitioning from a perimeter-based security model to a continuous, zero trust access approach begins with redefining how users gain initial access to applications.
Learn how the Lookout Cloud Security Platform, enable organizations to implement a continuous, zero trust access model without the complexity. -
How To: Secure Sharing Controls with DSPM
Daniel Feller, Principal Technical Marketing Manager, Lookout
Cloud storage solutions have become a cornerstone of modern data management. Their scalability, affordability, and ease of use make them incredibly attractive. However, misconfigured access controls can lead to accidental data exposure.
Learn how the Lookout Cloud Security Platform ensures that your collaboration doesn't compromise your data security.
-
How To: Continuously Monitor and Enforce Access Control Based on User Behavior
Daniel Feller, Principal Technical Marketing Manager, Lookout
With a zero trust model, every resource requires dynamic authentication. A user’s context must be validated before granting access.
Learn how the Lookout Cloud Security Platform enables you to easily apply zero trust principles to your application resources.
-
How To: Consolidate Existing Vendor Solutions
Daniel Feller, Principal Technical Marketing Manager, Lookout
For many organizations, the security topology leveraged multiple solutions, which were spliced together. By utilizing the Lookout Cloud Security Platform, you can define a set of security policies that get seamlessly applied to SaaS, private enterprise apps, mail, and web sites. This approach not only simplifies the security architecture but also helps seal gaps within the security framework.
-
How To: Detect and Prevent Accidental Exfiltration by an Employee
Daniel Feller, Principal Technical Marketing Manager, Lookout
Not all cyber threats have malicious intent. Employees simply trying to get work done, often accidentally put data at risk. By leveraging the Lookout Cloud Security Platform, you can automatically remediate security issues caused by user mistakes, without preventing users from getting work done.
-
How To: Discover and Control of Corporate Data Wherever It Is Stored
Daniel Feller, Principal Technical Marketing Manager, Lookout
Every day, your employees upload, download and share corporate data from your approved SaaS applications. While this is great for productivity, it often creates ongoing risk like data leakage, unauthorized sharing, regulatory violations or malware incursions.
Learn how the Lookout Cloud Security Platform enables you to pinpoint areas within your cloud apps that expose you to data risk while automatically taking corrective action.
-
How To: Detect Early Events in Ransomware Attacks
Daniel Feller, Principal Technical Marketing Manager, Lookout
Credential theft, password spray, and dark web credential purchases are often the favored approaches to gain access to your environment for a ransomware attack. With legitimate credentials, the attacker is able to access your environment and prepare to launch an attack.
Learn how these actions leave clues that you can detect with the Lookout Cloud Security Platform.
-
How To: Enable Cloud Computing While Preserving On-Prem Investments
Daniel Feller, Principal Technical Marketing Manager, Lookout
Many organizations leverage on-prem systems that are not cloud ready. Granting remote access often involves the deployment of additional on-prem VPN components. With the Lookout Cloud Security Platform, you can leverage zero trust network access to provide secure access and data protection to your private enterprise apps.
-
How To: Ensure Secure Data Sharing Between Employees, Partners, and Contractors
Daniel Feller, Principal Technical Marketing Manager, Lookout
Many organizations work with a trusted group of partners and contractors. Appropriate security measures are required to protect the sharing of confidential information. With the Lookout Cloud Security Platform, you can enable data protection for external communication while helping to promote collaboration.
-
How To: Integrate With Your Existing Infrastructure
Dan Feller, Principal Technical Marketing Manager, Lookout
It often takes years to fully integrate the IT infrastructure after a merger and acquisition. During that time, you need to provide user access to private enterprise apps while aligning security policies across both organizations. The Lookout Cloud Security Platform allows you to quickly provide access to private enterprise apps by following a zero trust network access architecture.
-
How To: Protect Against Sensitive Data Loss on Generative AI Platforms
Dan Feller, Principal Technical Marketing Manager, Lookout
Generative AI sites are the latest Internet resource that is changing how users approach their tasks. These platforms leverage AI to create and improve content based on user submissions.
Learn how to protect confidential information from being shared to the collective by identifying personally identifiable information, compliance violations, or even source code.
-
How To: Gain Real Time Guidance on the Proper Usage of Corporate Apps and Data
Daniel Feller, Principal Technical Marketing Manager, Lookout
Security training for users is often the first step towards improving your organization’s security posture. With the Lookout Cloud Security Platform, you can provide your users with real-time coaching to provide guidance immediately when security violations occur.