Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.
Identity and Access Management in a Socially-Connected WorldPaul Ferron, Security Solutions Director, CA Technologies EMEAIn today’s socially-connected world, conducting business effectively demands easy access to information from anywhere at any time. More people need access to more data through the use of more devices than ever before.
Join this webcast and learn how CA Technologies helps companies across the world to enable business in a secure manner. Through the use of a Cloud Identity and Access Management service, CA allows the right people have access to the right information at the right time. By seamlessly leveraging existing investments, while extending Identity and Access Management to the cloud, CA Technologies vastly reduces the time to deliver secure new business services.Read more >
Medium-sized organizations have many of the same business challenges as their larger counterparts – but often do not have the budget or resources to address them. Simeio Solutions recently helped a mid-sized financial company securely authenticate employees to their mobile applications. CA SiteMinder, with proven single-sign on and session management capabilities, allowed Simeio to cost-effectively streamline mobile application access for their customer in less than 90 days.
Join this webcast to hear Ed Pascua from Simeio Solutions and Aaron Berman from CA Technologies discuss how CA SiteMinder and Simeio Solutions were able to quickly transform mobile application security for this organization.
Following the release of CA SiteMinder® r12.5 last year, CA Technologies is demonstrating its continued commitment to secure Single Sign-On (SSO) and Access Management with the release of CA SiteMinder r12.51. This release contains some exciting updates including:
•Enhanced support for Web Service Interfaces
•OAuth and OpenID support
•Agent-less SSO, and new localized versions.
Join us for this webcast, where Chris Wraight, Director, Security Solutions for CA Technologies will discuss the new enhancements to CA SiteMinder.
In May of 2010, CA and The Ponemon Institute released a survey in North America and Europe on the security of cloud applications, infrastructure and platforms. Almost 3 years have passed from that initial study and CA and Ponemon have decided to revisit the topic.
- What¹s changed in 3 years?
- Are the concerns the same or have they evolved?
- Have security threats changed to meet this new computing model?
- Have solutions kept pace?
- Are more standards in place?
Join (ISC)2 along with CA, The Ponemon Institute and Cloud Security Alliance on March 21, 2013 for a discussion on the latest survey findings and what the industry thinks about cloud security issues.
As the IT landscape has evolved from mainframe to distributed computing, then to virtual and cloud, CA Technologies has been there helping to secure the world’s leading companies. Understanding that every business has different needs, CA continues to offer solutions to suit a wide range of IT environments. Now the same trusted name in IT security is helping to bridge the gap between physical, hybrid and cloud environments with CA CloudMinder™. As your own business and IT needs are evolving, now is a good time to consider…who’s minding your cloud?
In this webcast, Chris Wraight, Director, Security Solutions for CA Technologies will demonstrate how the CA CloudMinder™ suite of cloud security solutions helps you adopt Identity and Access Management (IAM) in the cloud securely, on your own schedule and according to your own needs. Now you can secure user identities, access, and information within cloud, on-premise and hybrid environments.
BYOD (bring your own device) is about enabling business users to access business information and applications, anytime, anywhere and from a range of personal devices. The new CA IdentityMinder mobile app provides BYOD access for some of the most common identity-related tasks an organization needs, but does so in a manner that is easy to setup, administer and use.
In this webcast, Bob Burgess, Advisor, Solution Strategy at CA Technologies, will discuss how the CA IdentityMinder mobile app can provide:
•Mobile access to password self-service and workflow approvals.
•Simple setup, configuration and corporate branding of the app.
•Complete control of which identity functions are available to mobile users.
•Immediate termination of application access if device is lost or due to a user’s changed status.
•Better business enablement in a mobile environment.
Organizations need to provide administrators with access to shared and privileged accounts on a regular basis. Though a necessity, these shared accounts represent multiple regulatory compliance and information security challenges. Ensuring user accountability, controlling access to these accounts and regularly reviewing access to sensitive applications by these accounts are requirements imposed by regulations and good business practices.
In this webcast, Steven McCullar and Bob Burgess, Security and Compliance Advisors with CA Technologies, will discuss how to:
• Control access to privileged accounts via check-in and check-out processes
• Provide temporary and/or emergency access to privileged accounts
• Better ensure accountability for privileged accounts
• Automate periodic access review of these special accounts
You will learn how to take advantage of the above capabilities within your environment and in doing so help reduce your organization’s compliance risks by implementing better control of the shared account lifecycle.
Virtualization is no longer the exclusive domain of non-core applications. By virtualizing mission-critical workloads, organizations are coming face-to-face with unique challenges around risk and compliance. Whether your organization is already grappling with these issues, or taking a ‘wait-and-see’ approach, a strong security posture is needed to gain all the benefits of virtualization.
Learn how today’s virtualization security tools can help you:
•Bring Privileged Identity Management to both the hypervisor and virtual machines
•Enable accountability for your virtualization administrators
•Automate security in a dynamic virtual environment
•Mitigate the risk of new vulnerabilities in your virtualization platform
•Meet virtualization compliance requirements
In this webcast, Russ Miller, Principal and Steven McCullar, Advisor, Solution Strategy, Security Solutions for CA Technologies will discuss the controls available to virtualize your most business-critical systems, and help you stay ahead of the curve for security.
Mobile devices are ubiquitous and end users tend to keep them close at hand. This makes them a viable option as an authentication credential device and for out-of-band authentication methods. The growing use of mobile devices for access to Web-based or native mobile applications introduces many new risks and fraud opportunities, including those related to BYOD and privacy. In this webcast, we will discuss popular use cases for these scenarios and highlight key considerations to assist you for planning your mobile authentication strategy.
With all its inherent value, the cloud introduces new security challenges for both consumers and providers of cloud services in all types of IT environments. A challenge for enterprises is how to leverage existing investments in identity and access management (IAM) solutions and extend their reach to the cloud in a hybrid on-premise/off-premise world to reduce operational costs and enable enterprise agility. Challenges for cloud service providers include how to secure an evolving virtualized environment and how to maintain the integrity of tenant information.
Learn how Identity and Access management services, whether on-premise or in the cloud, can help you more securely access your applications and enterprise resources – wherever they may reside.
It seems that all organizations are talking about these days is "Big Data". As security professionals, we all know that there are challenges in securing it, making it appropriately accessible and classifying the growing mountains of data. How do organizations deal with these issues, as well as adding the appropriate controls for identity and access to limit the disclosure and leakage of sensitive data. Join (ISC)2 and CA Technologies on December 20, 2012 at 1pm Eastern as we present the final part of our Security Briefings series on Identity and Access Management.