<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">
Michael Landewe

Michael Landewe


WEBINAR: Why Avanan Catches What Others Miss

Why does conventional email security fail to catch some sophisticated impersonation, spear phishing, credential harvesting, and malware? Avanan consistently catches attacks that co...

Read more


WEB BRIEFING: 2019 Gartner Security & Risk Management Summit

The Security & Risk Management Summit has a lot to digest. Across about 250 sessions from 210 speakers, 81 of them are Gartner Analysts. In this 25th Security Summit, over 3,500 at...

Read more


WEB BRIEFING: 2019 Global Phish Report

Avanan security scientists analyzed 55.5 million emails to surface key insights on how hackers target Office 365 and Gmail in the 2019 Global Phish Report. In this web briefing, we...

Read more


WEBINAR: Office 365 vs G Suite - Which Is More Secure?

In this webinar, we answer question of which is more secure: Office 365 or G Suite. You’ll leave with a clear understanding of how the subtle differences in O365 and G Suite securi...

Read more


WEBINAR: Preventing Data Leakage in a Cloud Environment

In this webinar Avanan and GTB Technologies team up to show that with the right technology, cloud sharing doesn’t have to go hand in hand with cloud leakage.

Read more


WEBINAR: Why MTAs Are Yesterday's Technology

In this webinar, we take a critical look at MTA/SEG vendors like Proofpoint and Mimecast, and compare them to Avanan for securing Office 365.

Read more


WEBINAR: How ATP Compares to Avanan

In this 40-minute webinar, we compare Advanced Threat Protection (ATP) to Avanan for securing Office 365. As we go through each of part of the ATP Security & Compliance Center, we ...

Read more


WEBINAR: Securing Slack

Slack has been rapidly growing as the communication and collaboration tool of choice for organizations on the cloud. Unlike email, however, Slack threats and vulnerabilities are la...

Read more


[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more


WEBINAR: HIPAA Compliance in the Cloud

This webinar identifies challenges of enforcing HIPAA compliance in the cloud. Healthcare IT experts Vince Campitelli and Jeffrey Gardner talk with Avanan cofounder, Michael Landew...

Read more


WEBINAR: Securing Office 365 from the Inside

Learn how to implement security that goes beyond the perimeter of your Office 365 environment to offer complete SaaS security. In this webinar, we'll also discuss how Avanan blocks...

Read more

Blog Post2FWebinar Images (65)

WEBINAR: What to look for in a CASB

During this session, we demonstrate how Avanan's next-generation Cloud Access Security Broker redefines the term CASB.

Read more

Blog Post2FWebinar Images (70)

Phishing Training for Employees: Why Employee Training Can't Solve The Phishing Problem

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer rely upon the en...

Read more


Is Office 365 more secure without Proofpoint?

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both Proofpoint and M...

Read more


Capital Caring: Avanan Cloud Security for Healthcare

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy, and direct support of patients and their families. Over 650 ...

Read more

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

cloud account takeover featured

White Paper: Cloud Account Takeover

This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against them.

Read more

cloud takeover protection featured

WEBINAR: Cloud Takeover Protection

In this webinars we will demonstrate how organizations quickly detect and protect against cloud takeover attacks using best-of-breed security in a single click.

Read more

securing cloud infrastructure featured

WEBINAR: Securing Cloud Infrastructure

In this webinars we will demonstrate how organizations quickly fill security gaps in your cloud infrastructure such as AWS and Azure using best-of-breed security in a single click.

Read more

Securing Google G Suite Featured

WEBINAR: Securing Google G Suite

In this webinars we will demonstrate how organizations quickly fill security gaps in Google G Suite using best-of-breed security in a single click.

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial