Hi [[ session.user.profile.firstName ]]

Gemalto SafeNet Information Security

  • Date
  • Rating
  • Views
  • SafeNet Authentication Service - Product Demo Webinar
    SafeNet Authentication Service - Product Demo Webinar Mor Ahuvia - Product Marketing Manager Recorded: Aug 29 2018 24 mins
    Watch the 30-minute demo webinar to see how easy and simple it is to:

    • Set up an admin account
    • Onboard new users
    • Automate token provisioning
    • Leverage user self-service
    • Generate reports
  • SafeNet Trusted Access - Product Demo Webinar
    SafeNet Trusted Access - Product Demo Webinar Mor Ahuvia - Product Marketing Manager Recorded: Aug 29 2018 29 mins
    SafeNet Trusted Access (STA) is a cloud-based access management service that makes it easy to manage cloud and web access with single sign-on, access policies and strong multi-factor authentication.

    Watch the 30-minute demo webinar to learn how you can:

    - Simplify user access with cloud single sign-on
    - Quickly set up access policies - Start global & go granular
    - Enable trust elevation and step-up authentication
    - Seamlessly integrate apps with a catalog of ready to use templates
    - Optimize security with contextual information
  • Fintech, Compliance & Data Protection – Steps to Secure the Breach
    Fintech, Compliance & Data Protection – Steps to Secure the Breach Ferry de Koning, Director Business Development, Gemalto and Gary Marsden, Senior Director, Encryption Products Recorded: Aug 14 2018 43 mins
    Fintech startup companies are disrupting the financial services industry, raising more than $120 billion over the last three years. Although these new entrants are changing how money and markets operate, they must still do business within the realities of regulations like GDPR and Australia's Notifiable Data Breaches scheme that the rest of the financial industry must operate. This means that data security and trust are just as important to Fintech companies as it is to traditional banks.

    Fintech companies are unique because of their agility, lean operations and that most are built using the cloud and digital technologies that banks are just now adopting. While this makes Fintech companies more nimble and they can enter new markets faster, it also presents more complexities for how Fintech companies need to manage security and meet compliance mandates.

    In this webinar you will learn about:

    •Fintech compliance and regulation from a data protection perspective.
    •How to build a secure the breach strategy using a case study from the physical world
    •Understand key elements for building cloud-based data security strategy that fits the needs of Fintech companies
  • ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility
    ISSA Thought Leadership Series: The Definitive Need for Crypto-Agility ISSA International Recorded: Aug 8 2018 64 mins
    On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing and the IoT device invasion, crypto-agility:

    · How can crypto-agility lend itself to a truly future-proof Enterprise and IoT device security strategy?
    · Cryptographic kryptonite: demystifying quantum computing
    · Challenges with digital certificate/device management at scale

    Moderator:

    Dr. Shawn Murray, Principal Scientist, US Missile Defense Agency & Director, ISSA International

    Presenters:

    Ted Shorter, CTO, Certified Security Solutions (CSS)
    Michael Gardiner, Principal Architect, Gemalto
    Michele Mosca, Founder, Institute for Quantum Computing
    Mike Brown, CTO & Co-Founder, ISARA Corporation
  • Secure the Breach (by Gemalto)
    Secure the Breach (by Gemalto) Gemalto Recorded: Jul 2 2018 2 mins
    Cloud, mobile, big data, the internet of things. Your enterprise is undergoing its digital transformation. But these new technologies mean more risk to your data as it moves beyond the perimeter.
    You know that a data breach is inevitable. So, when it happens to your business, will your data be secure?

    Gemalto’s portfolio of SafeNet identity and data protection solutions provide the centralized data security you need to secure the breach.

    Keep your data protected and secure your enterprise’s digital transformation.

    Learn more today at securethebreach.com
  • Implementing Virtualized Network Encryption to Secure SD-WANs
    Implementing Virtualized Network Encryption to Secure SD-WANs Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas Recorded: Jun 21 2018 60 mins
    Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.

    In this webinar you will learn about:
    •What is the best network fit for virtualized encryption
    •How to implement a virtual network encryption appliance in software-defined network
    •What are the cost, operational and performance benefits of virtual encryption
    •What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
  • Gemalto SafeNet Trusted Access Demo
    Gemalto SafeNet Trusted Access Demo Gemalto Recorded: Jun 20 2018 4 mins
    Thanks to SafeNet Trusted Access by Gemalto you can centrally manage access to cloud applications. The solution is flexible enough to easily adapt to business and security requirements but also convenient for employees thanks to the enhanced Single Sign On capability.

    With Safenet Trusted Access, you have a central service that lets you manage single sign on with granular access control and enforce appropriate levels of authentication across your enterprise cloud applications.

    For more information visit https://safenet.gemalto.com/access-management/idaas-safenet-trusted-access/
  • Gemalto and Venafi: Securing Machine Identities at Machine Speed
    Gemalto and Venafi: Securing Machine Identities at Machine Speed Gorav Arora, Director, Office of CTO, at Gemalto & Ben Rogers, Solution Architect, Venafi Recorded: Jun 12 2018 48 mins
    Machines are increasingly taking over tasks traditionally conducted by humans. Moreover, they often work independently to improve business productivity. As more and more machines come into existence, we need to be able to reliably identity which machines should be trusted and which shouldn’t. But the security that protects machine identities can no longer be slowed down by traditional manual or homegrown methods. These methods are no longer sufficient to allow organizations to scale and thrive at the speed of business.

    Join us at this webinar to learn how Gemalto and Venafi help organizations address these challenges.
  • HSM 101: What is a Hardware Security Module?
    HSM 101: What is a Hardware Security Module? Gemalto Recorded: Jun 11 2018 2 mins
    What is a hardware security module?

    A hardware security module is a dedicated crypto processor, designed to protect the crypto key lifecycle, validated for security by third parties (FIPS 140-2, Common Criteria, PCI HSM, FIPS 201).

    A hardware security module is a trust anchor. A trust anchor that protects the things we use every day. Things like SSL, DNS, banking and websites. Mobile devices. Smart meters. Medical devices. National identity cards. Credit card data and PINs. Mobile payments and verbal banking. Digital documents. Passports.

    And so much more. Hardware security modules typically are appliances or cards. Appliances or cards that ensure compliance. Simplify audits. Improve performance. Securely generate and store keys.

    Hardware security modules are trusted by the most security-conscious companies, agencies, banks, and service providers in the world.

    Hardware security modules: trust anchors in a digital world.

    For more information, visit https://safenet.gemalto.com/data-encryption/hardware-security-modules-hsms/
  • IoT Security Over Tea: Steeping Out the Hype
    IoT Security Over Tea: Steeping Out the Hype Gorav Arora, CTO Office Director of Technology at Gemalto Recorded: Jun 5 2018 63 mins
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you

Embed in website or blog