RSAC 2024: How to Make Enterprise Browsers More Secure

Poornima DeBolle, co-founder and chief product officer for Menlo Security, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss the differences between enterprise browsers and normal ones, including how to make your enterprise more secure.

12 Min View

Poornima DeBolle, co-founder and chief product officer for Menlo Security, joins Dark Reading's Terry Sweeney at News Desk during RSA Conference to discuss the differences between enterprise browsers and normal ones, including how to make your enterprise more secure. She talks about their common vulnerabilities and how enterprise browsers have been targeted in the past few years. She offers some guidance around options buyers should look for, as well as what differentiates Menlo’s browser from others in the market.

Poornima co-founded Menlo Security, bringing years of product management experience to the table. For her achievements, she has been included in the Forbes 50 Over 50: Entrepreneurs list, Inc.’s Female Founders List and the Economic Times Trailblazers list. Before Menlo, she was a product management executive at Juniper Networks, responsible for cloud security, security management, and security analytics. She joined Juniper via its acquisition of Altor Networks, where she was vice president of product management and business development. Prior to that, she was head of business development at Check Point in product management and engineering roles. Poornima holds an MSCS from Arizona State University.

About the Author(s)

Terry Sweeney, Contributing Editor

Terry Sweeney is a Los Angeles-based writer and editor who has covered technology, networking, and security for more than 20 years. He was part of the team that started Dark Reading and has been a contributor to The Washington Post, Crain's New York Business, Red Herring, Network World, InformationWeek and Mobile Sports Report.

In addition to information security, Sweeney has written extensively about cloud computing, wireless technologies, storage networking, and analytics. After watching successive waves of technological advancement, he still prefers to chronicle the actual application of these breakthroughs by businesses and public sector organizations.


Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights