Cloud Access Security Brokers (CASB) , Cloud Security , COVID-19

Predictive Technology's Role in Cloud Security

Forcepoint's Brandon Tan on Analyzing Behavior
Brandon Tan, director of Sales Engineering-APAC, Forcepoint

Because many attacks against enterprises’ cloud implementations are automated, a good defense involves using predictive technology that can analyze behaviors, says Brandon Tan, director of Sales Engineering, APAC, Forcepoint.

See Also: Top 50 Security Threats

Enterprises need to gain greater visibility and control of security in the cloud by not relying on single-point solutions, Tan says in a video interview with Information Security Media Group.

In this video interview previewing an upcoming virtual roundtable discussion, Tan offers insights on:

  • Redefining user access control policy in the cloud using multifactor authentication;
  • Building an architecture that uses predictive technology to identify risks;
  • Implementing compliance standards to gain better improve visibility and control of data in the cloud.

Tan, director of sales engineering-APAC at Forcepoint has more than 10 years of IT security consulting experience specializing in data, network, and content security. He has been involved in some of the largest deployments of security solutions in the APAC region and has investigated high-profile data breaches and thefts.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Nandikotkur is an award-winning journalist with over 20 years' experience in newspapers, audio-visual media, magazines and research. She has an understanding of technology and business journalism, and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a Group Editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.