Do you use Algosec NSPM to manage your perimeter firewall complexity? In a hybrid cloud data center, you may need Guardicore most of all.
About Sharon Besser
Sharon is VP of Business Development for Guardicore. Prior to this, he was VP Products, responsible for driving product strategy for the company. He is an accomplished data and network security expert with successful track record combining deep technical hands-on excellence with market vision to incubate new solutions and develop next generation technologies. Prior to Guardicore Sharon was the co-founder of Publicom (acquired by Comsec), co-founder of EyeOTee Inc., VP Technologies at Net Optics (acquired by IXIA), VP of products strategy at Imperva, Director of security solutions at Check Point, and Director of security products at Websense. Sharon holds a BSc degree in Computer Science, Mathematics and Geography from Bar Ilan University.
Entries by Sharon Besser
Heading back to school during Covid-19? Citrix VDI can help with remote learning, but only Guardicore Centra segmentation makes it secure.
As digital transformation speeds ahead, learn what minimum viable controls are required to secure IaaS and PaaS
The cloud’s “Edge” is taking a bigger role in cloud computing, creating risk.. Powerful solutions, like micro-segmentation tools to visualize and secure the Edge and their entire distributed environments, are needed more than ever. Here’s why.
Discover Sharon Besser’s, VP of Business Development at Guardicore, take on RSA 2020 and what to expect at this year’s show.
Read this article to discover how Mellanox and Guardicore deliver agentless and high-performance micro-segmentation for securing hybrid cloud environments
As we start 2020, here is the latest technology ecosystem news and announcements from Guardicore Centra for even easier use and streamlined, seamless integrations with our increasing roster of partners.
VDI with Citrix improves management, collaboration and cost. If you’re worried about securing the shared infrastructure, and staying on top of concurrent user-permissions, you’re in luck. Guardicore Centra makes it a whole lot easier.
Managing a complex IT environment includes having visibility and control over all of your accounts and credentials, often running into the tens of thousands. First, identify the high-risk assets, applications and accounts, then build out a phased approach to protect your hybrid environment.
When you’re working towards a Zero-Trust model, you can’t afford to ignore legacy systems. Here are the questions you should be asking, and the best practices for ensuring legacy technology is part of your strategy from the start.