Exploring Endpoint Security: From Basics to AI-Era Threats, With Raakesh Thayyil

Aug 25, 2025

From antivirus to AI-powered threats, this session with Raakesh Thayyil (Group Head of Security & Privacy at PropertyGuru) breaks down the evolving world of endpoint security—what it means today, how remote work changed the game, and what lean security teams can actually do about it.

🔍 What you’ll learn:

  • Endpoint security basics explained with a castle analogy 🏰
  • How remote work broke security - and what’s still broken
  • Why AI is both your best friend and worst enemy in cybersecurity
  • Real-world frameworks, tools & tips for small security teams
  • Is traditional antivirus dead? (Spoiler: not yet)
  • How to think about Zero Trust, XDR, DSPM & more
  • Rapid-fire fun: Cybersecurity theme songs, mascots & coffee choices ☕

👇 Timestamps & Q&A included in the video chapters!

📢 Brought to you by The 403 Circle – an invite-only community for top CTOs & CISOs.

Join the community: https://www.getastra.com/the403circle-community-by-astra

00:00 - Introduction & Session Agenda

00:42 - About The 403 Circle Community

01:30 - Introduction to Astra Security

02:00 - Speaker Introduction: Rakesh Thayyil (Group Head of Security, PropertyGuru)

03:10 - What is Endpoint Security? (Castle Analogy)

06:00 - Impact of Remote Work on Endpoint Security

10:20 - Components of Endpoint Security: Basics to Advanced

13:00 - How AI Is Changing the Threat Landscape

18:00 - AI for Attackers vs Defenders

22:10 - AI in Security vs Security of AI

25:10 - Zero Trust, Microsegmentation & Modern Security Strategies

28:00 - Rapid-Fire Round with Rakesh

31:05 - Role of End Users in Endpoint Security

34:45 - Is Traditional Antivirus Still Relevant?

37:20 - Where Small Security Teams Should Start

41:55 - Frameworks and Practical Advice for SMBs

46:20 - Future of Endpoint Security & AI’s Dual Role

48:20 - Audience Q&A Begins

48:55 - Mistakes Companies Still Pay for After Remote Transition

50:55 - Best Endpoint Security Tools? (It Depends)

52:10 - Hybrid Work: Long-Term Risk?

53:50 - Addressing Compromised Devices and Users

56:00 - Thoughts on Application Virtualization

58:10 - Will Hardware Replace Software-Based Endpoint Security?

59:20 - Thoughts on Bitdefender EDR & Vendor Neutrality

60:20 - Closing Remarks & How to Connect with Rakesh