<img alt="" src="https://secure.leadforensics.com/110471.png" style="display:none;">
Michael Landewe

Michael Landewe



dlp-webinar-featured

WEBINAR: Preventing Data Leakage in a Cloud Environment

In this webinar Avanan and GTB Technologies team up to show that with the right technology, cloud sharing doesn’t have to go hand in hand with cloud leakage.

Read more

mta-webinar-featured

WEBINAR: Why MTAs Are Yesterday's Technology

In this webinar, we take a critical look at MTA/SEG vendors like Proofpoint and Mimecast, and compare them to Avanan for securing Office 365.

Read more

avanan-vs-atp-web-ft

WEBINAR: How ATP Compares to Avanan

In this 40-minute webinar, we compare Advanced Threat Protection (ATP) to Avanan for securing Office 365. As we go through each of part of the ATP Security & Compliance Center, we ...

Read more

slack-webinar-ft

WEBINAR: Securing Slack

Slack has been rapidly growing as the communication and collaboration tool of choice for organizations on the cloud. Unlike email, however, Slack threats and vulnerabilities are la...

Read more

podcast-indepth-iaas-saas

[Podcast] An In-Depth Discussion on IaaS & SaaS: How to Protect Them

In this podcast, hosted by BioMetricNews.net, we discuss the theme of using the cloud to fortify the lines of defenses at your business or corporation.

Read more

HIPAA-webinar-featured

WEBINAR: HIPAA Compliance in the Cloud

This webinar identifies challenges of enforcing HIPAA compliance in the cloud. Healthcare IT experts Vince Campitelli and Jeffrey Gardner talk with Avanan cofounder, Michael Landew...

Read more

o365-from-inside-featured

WEBINAR: Securing Office 365 from the Inside

Learn how to implement security that goes beyond the perimeter of your Office 365 environment to offer complete SaaS security. In this webinar, we'll also discuss how Avanan blocks...

Read more

Blog Post2FWebinar Images (65)

WEBINAR: What to look for in a CASB

During this session, we demonstrate how Avanan's next-generation Cloud Access Security Broker redefines the term CASB.

Read more

Blog Post2FWebinar Images (70)

Why Employee Training Can't Solve The Phishing Problem

Microsoft’s 2018 23rd Edition Security Intelligence Report is out, and it confirms the conclusion that most in the security industry already know: we can no longer rely upon the en...

Read more

Spoofpoint

Is Office 365 more secure without Proofpoint?

This week we saw a phishing attack at one of our customers that is using Proofpoint before their Office 365 email—a pretty basic phishing attack that bypassed both Proofpoint and M...

Read more

capital-caring-ft

Capital Caring: Avanan Cloud Security for Healthcare

Since 1977, Capital Caring has improved care for those facing life-limiting illness through public education, advocacy, and direct support of patients and their families. Over 650 ...

Read more

Cloud Access Trojan Featured

Cloud Access Trojan: The Invisible Back Door to Your Enterprise Cloud

“Your desktop gets scanned for trojan back doors. But what about the backdoors in your cloud?”

Read more

cloud account takeover featured

White Paper: Cloud Account Takeover

This white paper covers everything you need to understand about how Cloud Account Takeovers happen, why they are so dangerous, and what you can do to protect against them.

Read more

cloud takeover protection featured

WEBINAR: Cloud Takeover Protection

In this webinars we will demonstrate how organizations quickly detect and protect against cloud takeover attacks using best-of-breed security in a single click.

Read more

securing cloud infrastructure featured

WEBINAR: Securing Cloud Infrastructure

In this webinars we will demonstrate how organizations quickly fill security gaps in your cloud infrastructure such as AWS and Azure using best-of-breed security in a single click.

Read more

Securing Google G Suite Featured

WEBINAR: Securing Google G Suite

In this webinars we will demonstrate how organizations quickly fill security gaps in Google G Suite using best-of-breed security in a single click.

Read more

Securing O365 featured

WEBINAR: Securing Office 365

In this webinars we will demonstrate how organizations quickly fill security gaps in Office 365 using best of breed security in a single click.

Read more

Securing Citrix ShareFile Featured

WEBINAR: Securing Citrix ShareFile

In this webinars we will demonstrate how organizations quickly fill security gaps in Citrix ShareFile using best of breed security in a single click.

Read more

Blog Post2FWebinar Images (42).png

WEBINAR: Future-Proofing Your Security for 2018

You can’t predict when, but we can show you how the next attack might happen. In this webinar we discuss the security trends of 2017 that predict the most likely threats of 2018. W...

Read more

5 Phishing Attack Trends to Look out for in 2018

Avanan has caught a tremendous number of previously-unseen attacks this year, and as a result we have identified some distinct trends that give insight into what we can expect in 2...

Read more

14-DAY FREE TRIAL

Get 100% visibility into your cloud right now. No risk. No obligation. No effect on your users.

START YOUR  FREE TRIAL