Hi [[ session.user.profile.firstName ]]

Beta Systems

  • Date
  • Rating
  • Views
  • Closing Pandora's Box: Complex Application Security Requirements, Simplified App
    Closing Pandora's Box: Complex Application Security Requirements, Simplified App
    Niels von der Hude, Director Market Development Recorded: Nov 12 2015 49 mins
    Once a user has been granted the permissions to access data and applications, how can we close the loopholes that may allow the user to access data in an inappropriate manner or ignore policy? Using today's ABAC (Attribute Based Access Control) standards, you can programmatically and systematically close the lid to Pandora's box and ensure accesses are only occurring where and when they should by an authorized user. We'll discuss ways to use existing technologies to close the gap between password management, identity access management and application based policies to control all access.
  • Network Security's Weakest Link: Password Management
    Network Security's Weakest Link: Password Management
    Ginny Turley, Director of North American Marketing Recorded: Oct 1 2015 28 mins
    While network security encompasses both the physical and software preventative measures to prevent and monitor unauthorized accesses or misuse of a computer network, the adoption of a password management policy and strategy can be foundational to the prevention of unauthorized uses of network resources. In many cases, simple password management is the weakest link. In this webcast, we'll explore what needs to be done to strengthen this important and oft overlooked aspect of network security and discuss password synchronization, and self-reset functions that can save time and money - and a lot of post-it notes as well.
  • Risk Driven IAM: Tackle IAM with a Risk Based Approach
    Risk Driven IAM: Tackle IAM with a Risk Based Approach
    Niels von der Hude, Director Market Development Recorded: Aug 27 2015 45 mins
    Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.
  • Insider threats - How to fight vulnerability from within the company
    Insider threats - How to fight vulnerability from within the company
    Niels von der Hude , Director of Market Development, Beta Systems Software Recorded: Jul 28 2015 34 mins
    Recent studies have shown that 50-70% of all attacks on information security are coming from within the organization, and often the length of time that the breach existed is unknown. There are many issues involved in closing the gaps that cause such insider incidents and strengthen the protection of data. Using the "need to know" principal, organizations can limit who has access to data. Controls that adjust given access rights to actual needs exist and should be utilized. This session will focus on how to adjust data access rights, implementing the "least privilege principal", and the use of detective and proactive risk-oriented controls.
  • Top 9 Pitfalls to Avoid When Implementing IAM Solutions
    Top 9 Pitfalls to Avoid When Implementing IAM Solutions
    Ginny Turley, Director of North American Marketing Recorded: Jun 30 2015 29 mins
    In this video, you'll learn about the top pitfalls encountered when organizations attempt to implement IAM solutions, and then we'll review best practices to avoid these pitfalls
  • Garancy Access Intelligence Manager
    Garancy Access Intelligence Manager
    Niels von der Hude, Director Market Development Recorded: Jun 30 2015 18 mins
    Business Intelligence for Access Intelligence - with Garancy Access Intelligence Manager, organizations can review access rights, assess risks, and drill down to get all the detail needed to make good decisions.
  • Garancy Recertification Center
    Garancy Recertification Center
    Ginny Turley, Director of North American Marketing Recorded: Jun 30 2015 19 mins
    Garancy Recertification Center is a business-oriented portal that makes the recertification process easy to understand for managers, with a dashboard that will track progress and allow for reporting and audits
  • Fast Forward IAM - Fixed Price IAM Solution
    Fast Forward IAM - Fixed Price IAM Solution
    Ginny Turley, Director of North American Marketing Recorded: Jun 30 2015 9 mins
    Reduce the risks involved with implementation of an IAM solution by chosing Fast Forward IAM. This webinar explains the components of Fast Forward IAM and the benefits to your organization which include a fixed price, a known deliverable, and a tangible timeline.
  • RBAC vs. ABAC
    RBAC vs. ABAC
    Allison Newman, Sr. Professional Services Consultant Recorded: Jun 30 2015 16 mins
    What are the strengths and weaknesses of RBAC and ABAC and is there a 'winner'? Is there a hybrid approach that combines the best of both of these methods for access control? This interview with an experienced consultant answers these questions

Embed in website or blog