Cloudlock Webinars

This Stream includes all Videos from our Cloudlock Webinars Youtube playlist

  • Cisco Cloudlock Webinar - 201854:33

    Cisco Cloudlock Webinar - 2018

    View this webinar session with security experts to find out how Cisco can help you use SaaS applications safely. Users are no longer protected by the traditional security stack and as there is more da

    Watch Video
  • ×

    Get Instant Access to All Security Content

    First Name
    Last Name
    Job Title
    Company
    Country
    I want to receive Cloudlock newsletters, updates, and promotions. Withdraw your consent at any time.
    I do not want to receive email communications about products & offerings from Cloudlock & affiliates
    Thank You!
    Error - something went wrong!
  • Agency Responsibilities When Adopting Cloud Services in the Current Threat Environment34:24

    Agency Responsibilities When Adopting Cloud Services in the Current Threat Environment

    We will explain how Cisco Cloudlock (with FedRAMP ATO) can enable secure cloud service adoption by protecting user accounts and data.

    Watch Video
  • Cisco Cloudlock Webinar - Defend your cloud territory34:24

    Cisco Cloudlock Webinar - Defend your cloud territory

    Secure your cloud users, data, and applications Dan Silverston - Cybersecurity Specialist (EMEAR)

    Watch Video
  • Cloud Security: It's Tuesday, Carl3:03

    Cloud Security: It's Tuesday, Carl

    Cisco Cloudlock is the Cloud Access Security Broker (CASB) solution that protects your cloud users, secures your cloud data, and defends your cloud apps.

    Watch Video
  • Risky Connected Apps Uncovered: Cisco Cloudlock2:56

    Risky Connected Apps Uncovered: Cisco Cloudlock

    Watch our video on the Shadow IT that matters more than others: OAuth connected apps.

    Watch Video
  • Aplicaciones Riesgo Conectadas Descubiertas (Risky Connected Apps Uncovered - Spanish)3:48

    Aplicaciones Riesgo Conectadas Descubiertas (Risky Connected Apps Uncovered - Spanish)

    Vea nuestro video destacando el Shadow IT que importa más que otros: OAuth apps conectadas

    Watch Video
  • Aplicativos desconectados com riscos descobertos (Risky Connected Apps Uncovered - Portuguese)3:31

    Aplicativos desconectados com riscos descobertos (Risky Connected Apps Uncovered - Portuguese)

    Assista ao nosso vídeo destacando o Shadow IT que importa mais do que outros: aplicativos conectados OAuth

    Watch Video
  • Es Martes, Carl (It's Tuesday, Carl - Spanish)3:03

    Es Martes, Carl (It's Tuesday, Carl - Spanish)

    Vea nuestro video destacando los desafíos que enfrentan las organizaciones cuando se trata de la seguridad en la nube. Watch our video highlighting the challenges that organizations face when it come

    Watch Video
  • É terça-feira, Carl (It's Tuesday, Carl - Portuguese)3:03

    É terça-feira, Carl (It's Tuesday, Carl - Portuguese)

    Assista ao nosso vídeo destacando os desafios que as organizações enfrentam quando se trata de segurança na nuvem.

    Watch Video
  • The Risk of a Single Privileged Cloud User48:53

    The Risk of a Single Privileged Cloud User

    Watch this webinar, hosted by our cyber-intelligence experts, to understand where the risk may lie and to learn how you can monitor for any suspicious activity.

    Watch Video
  • Combat Cloud Security Threats with CloudLock CASB45:25

    Combat Cloud Security Threats with CloudLock CASB

    Watch this webinar to learn how you can combat cloud security threats with Cisco Cloudlock.

    Watch Video
  • Combat Cloud Security Threats with CloudLock CASB41:07

    Combat Cloud Security Threats with CloudLock CASB

    Watch this webinar to learn how you can combat cloud security threats with Cisco Cloudlock.

    Watch Video
  • [Webinar] Secure Your Company from the SaaS Tsunami1:05:01

    [Webinar] Secure Your Company from the SaaS Tsunami

    Watch our interactive webinar with OneLogin to learn how to bring unmanaged SaaS apps out of the shadows, plus reduce security and compliance risks.

    Watch Video
  • Dropbox y CloudLock  Seguridad Empresarial en la Nube44:13

    Dropbox y CloudLock Seguridad Empresarial en la Nube

    Dropbox y Cisco Cloudlock se juntan para ofrecer una seguridad comprensiva centrada sobre el usuario que protege la información más delicada y las cuentas de los usuarios.

    Watch Video
  • On-Demand Webinar: The Explosion of Apps: 27% Are Risky51:00

    On-Demand Webinar: The Explosion of Apps: 27% Are Risky

    This webinar walks through our cybersecurity report insights to help you understand the implications of the new Shadow IT risk vectors that arise with cloud adoption.

    Watch Video
  • [Webinar] BYOQuestions : Gearing Up for EU GDPR Compliance in the Cloud50:49

    [Webinar] BYOQuestions : Gearing Up for EU GDPR Compliance in the Cloud

    What will GDPR mean for companies in the EU and globally? Learn what you need to know in this webinar.

    Watch Video
  • CloudLock Webinar: The Cloud Threat Funnel52:37

    CloudLock Webinar: The Cloud Threat Funnel

    This webinar walks through our CyberLab's Cloud Threat Funnel, used to narrow focus onto user activities that are the most indicative of true threat.

    Watch Video
  • [Webinar] Stop Hackers with Integrated CASB and IDaaS Security | CloudLock and OneLogin59:18

    [Webinar] Stop Hackers with Integrated CASB and IDaaS Security | CloudLock and OneLogin

    Watch this webinar to learn how you can stop hackers with integrated CASB and IDaaS security provided by the Cisco Cloudlock and OneLogin joint solution.

    Watch Video
  • CloudLock Webinar: The Riskiest Industries In The Cloud58:28

    CloudLock Webinar: The Riskiest Industries In The Cloud

    This webinar walks through our cybersecurity report, extrapolating meaningful cloud cybersecurity insights to help you evaluate where you stand in your industry. Our CyberLab data scie

    Watch Video
  • Forrester Webinar: Cyber-Wolf In Sheep's Clothing56:25

    Forrester Webinar: Cyber-Wolf In Sheep's Clothing

    Learn why cloud users are the new threat vector for cyber-attacks, what account compromises look like and why they are so scary, and some concrete user behavior analytics recommendations.

    Watch Video
  • loading
    Loading More...