Ir para o conteúdo principal

Spotlight On Episode 17

How to Secure Data Use on the Web

Share

Continue your learning journey across “5 Steps to Data Security Everywhere”, an exclusive series within Forcepoint’s “Spotlight On” video offerings. In this second episode, “How to Secure Data Use on the Web”, cybersecurity expert Chris Morris offers guidance on the tools and strategies that will help you to secure sensitive data on the web channel. You can watch these videos in any order, so feel free to jump in here even if you haven’t seen Part 1! 

Chris addresses the subject of what activities you need to watch out for on the web channel (uploading sensitive information, downloading malware) and what devices and users you have to reckon with (BYOD, IoT, guests using your Wi-Fi). He also breaks down the crucial role that inline proxy-based inspection plays in controlling the flow of data in and out of your organization. 

Following the explanation of inline inspection, Chris mentions additional tools that you can add to provide additional security checks. These include Remote Browser Isolation (RBI) and Content Disarm and Reconstruction (CDR), which can provide assistance protecting your users from zero-day threats.  

Watch for future installments in our "5 Steps to Data Security Everywhere” series, and visit Forcepoint.com for more information to help you strengthen your security posture. 

 

Talk to an Expert

Schedule Demo