3 eye-catching vendor announcements from Black Hat

<p>Black Hat 2025 is this week, and through all the fervor, a few things have caught my eye as worth mentioning.</p>
<p>Two of them — from Check Point Software and Menlo Security — deal with secure access to apps and data from unmanaged devices, while a third from SentinelOne is around end-user AI usage.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<section class=”section main-article-chapter” data-menu-title=”Unmanaged devices announcements”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Unmanaged devices announcements</h2>
<p>My recent research into the intersection of endpoint management and security has shown that an average of 31% of endpoints that access corporate resources are unmanaged. More importantly, 59% of <a href=”https://www.techtarget.com/searchenterprisedesktop/tip/How-to-deal-with-unmanaged-devices-in-the-enterprise”>those unmanaged desktops</a> are not secured by secure access service edge, <a href=”https://www.techtarget.com/searchsecurity/answer/What-are-the-most-important-pillars-of-a-zero-trust-framework”>zero trust or other alternative means</a>, so they’re just black holes at the edge.</p>
<p>With this in mind, I’m particularly interested in two announcements from vendors Check Point and Menlo.</p>
<h3>Check Point</h3>
<p>Check Point has been doing browser security for a long time but focused more on the network and browser extension angles with its announcement. At Black Hat, they <a target=”_blank” href=”https://blog.checkpoint.com/harmony-sase/securing-the-unmanaged-check-point-enterprise-browser-delivers-zero-trust-to-any-device/” rel=”noopener”>published a blog</a> detailing their Check Point Enterprise Browser as a way to secure unmanaged devices to deliver zero trust to any device.</p>
<div class=”youtube-iframe-container”>
<iframe id=”ytplayer-0″ src=”https://www.youtube.com/embed/D6nql-FGAyk?autoplay=0&amp;modestbranding=1&amp;rel=0&amp;widget_referrer=null&amp;enablejsapi=1&amp;origin=https://www.techtarget.com” type=”text/html” height=”360″ width=”640″ frameborder=”0″></iframe>
</div&

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from Search Security Resources and Information from TechTarget

Read the original article: