Hi [[ session.user.profile.firstName ]]

NCIPHER

  • Date
  • Rating
  • Views
  • What's driving security trends in the Middle East?
    What's driving security trends in the Middle East?
    Hamid Qureshi, Territory Sales Manager - Middle East, nCipher Security Recorded: Jul 17 2019 30 mins
    We surveyed hundreds of organizations in the UAE and Saudi Arabia for our annual Middle East Encryption Trends Study with global researchers, Ponemon Institute. The results reveal an increase in the use of emerging technologies like IoT and Docker containers, which open the door to new security vulnerabilities. In response, security leaders are broadening their use of encryption and strong key protection to protect sensitive data against theft and other threats. Join Hamid Qureshi in this session to;

    -discover these key security trends
    - learn how your peers are addressing their evolving business
    requirements
    - understand how nCipher can help you secure your critical data and
    apps
  • Innovative Information Protection for a Data-Driven Economy
    Innovative Information Protection for a Data-Driven Economy
    Juan C. Asenjo, nCipher Security and Carole Murphy, Micro Focus Voltage Recorded: Jun 26 2019 103 mins
    This web conference will provide insights on how to secure the growing data flows driving today’s global economy. Our experts will outline best practices for safely using data to optimize performance, enable new services, and transform existing business models, while addressing evolving threats and managing risks. The web conference will focus on the best ways of handling sensitive customer and transactional data, including healthcare and financial information, in light of the impact that the growing Internet of Things (IoT) is having on the capability to collect, analyze, and derive new customer insights and other business intelligence. Our speakers will identify the challenges faced by organizations that collect and use increasing amounts of data and need to maintain its confidentiality and integrity, and ensure compliance with data privacy requirements. The conference will close with a description of associated solutions underlining encryption, cryptographic key management, and the establishment of a secure root of trust, and recommendations on how to put these solutions in practice.

    https://www.secureworldexpo.com/resources/information_protection_data_driven_economy
  • Scalable web traffic visibility with Gigamon and nCipher
    Scalable web traffic visibility with Gigamon and nCipher
    Bassam Khan, VP - Product and Technical Marketing at Gigamon Recorded: May 28 2019 14 mins
    This presentation highlights the importance of having web traffic visibility and ensuring that your tools can keep a watchful eye over the whole of your network using technology from Gigamon and nCipher.
  • In PKI we trust – secure & high-performing identity management
    In PKI we trust – secure & high-performing identity management
    Graham McCord, Senior Manager for Strategic Alliances at Entrust Datacard Recorded: May 22 2019 11 mins
    This presentation highlights the importance of trusting your public key infrastructure to deliver secure and high performing identity management services, and how you can achieve this objective using technology from Entrust Datacard and nCipher.
  • Global encryption trends -- is your organization keeping pace?
    Global encryption trends -- is your organization keeping pace?
    Dr. Larry Ponemon, Ponemon Institute and John Grimm, nCipher Security Recorded: May 15 2019 61 mins
    Corporate data breaches are in the headlines on an almost daily basis, while business critical applications face malicious threat, or are accidentally compromised by employee mistakes. The 2019 Global Encryption Trends study, with data from almost 6000 respondents in 14 countries/regions, reveals:

    - How organizations in different industries and countries are using encryption to protect sensitive data
    - What use cases for hardware security modules (HSMs) are growing the fastest
    - Features of encryption solutions that organizations value the most

    Join Dr. Larry Ponemon and John Grimm for an overview of the top findings of this industry-leading study on encryption trends, and advice on addressing encryption's top challenges.
  • Perform Like a Conductor – Automated and Secure Key Orchestration with Venafi
    Perform Like a Conductor – Automated and Secure Key Orchestration with Venafi
    Ben Rogers,Senior Solutions Architect, Venafi Recorded: May 1 2019 11 mins
    nFinity partners spoke at nCipher RSA booth to highlight strengths of a combined nCipher / partner product integration.
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation
    Brett Bourke Abela, Senior Sales Engineer, UK, Thales eSecurity Recorded: Nov 22 2018 32 mins
    In the third of our #CoffeeBreak webcasts, Chris Ogilvie interviews Brett Abela, Thales eSecurity Sales Consultant on proactive data defence for digital transformation.

    Digital transformation is business enhancing but fraught with danger. With services moving into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, with more and more of your corporate attack surface being exposed.

    The rise of cloud and the Internet of Things (IoT), has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    Join Chris and Brett for the third “coffee break” webcast when they will discuss:
    a) Key security considerations for a digital transformation strategy
    b) Why a proactive data defence strategy is crucial
    c) The benefits of maximising the level of control over data irrespective of where it is created, stored or shared.
    d) How can enterprises regain control of their data security?
  • Thales nShield non+ to nShield XC Migration
    Thales nShield non+ to nShield XC Migration
    Marc Class, Sales Engineer, Thales Australia Recorded: Mar 28 2018 36 mins
    "The new Thales nShield XC is set to replace the Thales nShield Solo and nShield Connect non-plus hardware security modules in the next few months. With a whole host of new features and capabilities, the XC will outperform the non-plus by an order of magnitude – and this webinar will help you understand the new model and the recommended migration plan, so you can get ready to make the switch.

    Join us on Wednesday March 28th March @ 11am AEDT for a briefing on:

    • New Features of the XC

    • Recommended migration steps from non-plus to XC

    • End of Support timelines

    We will have lots of time for Q&A at this session.

    We look forward to talking to you then.
    "
  • Proactive Data Defence for Digital Transformation
    Proactive Data Defence for Digital Transformation
    Ian Greenwood, Regional Sales Manager UK&I Recorded: Mar 23 2018 35 mins
    "Digital transformation is business enhancing and fraught with danger. With services moving online and into the cloud, the result is a faster, more agile and open service for consumers and enterprises. However, this digital transformation is taking place in an increasingly precarious environment, more and more your corporate attack surface is being exposed.

    With data breaches at an all-time high and incidents of identity theft risen by 57% in a year, consumers are questioning the security of their personal data held by organisations. The rise of cloud and the Internet of Things, has forced companies to take control of their data – regardless of where it resides and in addition, reputational damage caused by public breach is firmly on the agenda of the board.

    This webinar will consider:

    • Key security considerations for a digital transformation strategy

    • Why a proactive data defence strategy is crucial

    • The benefits of maximising the level of control over data irrespective of where it is created, store or shared."
  • GDPR Compliance Roadmap
    GDPR Compliance Roadmap
    Sanjay Parikh - Director of Risk & Compliance at Critical Start Recorded: Feb 21 2018 55 mins
    "Join Critical Start and Thales, Wednesday, Feb 21 for a Virtual Lunch and Learn as we glide through the General Data Protection Regulation (GDPR) regulatory articles and identify the key sticking points for achieving compliance. GDPR becomes enforceable on May 25, which means the clock is ticking to prepare your organization’s infrastructure and avoid costly penalties.
    We’ll discuss:
    •The importance of your controls related to data protection
    •Areas that impact compliance which most organizations don’t realize
    •A roadmap for tackling GDPR head on towards your road to compliance

    What is GDPR?
    A new intended to strengthen and unify data protection for all individuals in the European Union. The new law affects any organization that processes or handles the information of EU citizens, regardless of where that organization is located. The regulation applies to any personal information, whether it belongs to a customer, an employee, or other relationship with the organization.

    About the Speaker: For more than 20 years, Sanjay Parikh has helped organizations assess, design and strengthen IT security programs. As Director of Risk & Compliance for Critical Start, he applies deep expertise in both security and compliance to help organizations of all sizes to navigate complex regulatory requirements related to ISO27001, GDPR, NIST, FFIEC, HIPAA, PCI and more. He develops strategic security roadmaps to identify gaps, streamline workflows, reduce audit costs, and ensure compliance while meeting business objectives."

Embed in website or blog