Hi [[ session.user.profile.firstName ]]

Micro Focus Enterprise Security Products

  • Date
  • Rating
  • Views
  • Live Webinar: Enabling complete privacy protection from legacy to modern IT
    Live Webinar: Enabling complete privacy protection from legacy to modern IT Simon Wilkinson, Anna Russell, Daniel Clift, Brendan Rizzo Recorded: Sep 20 2018 27 mins
    During this session, we’ll introduce you to modern-day data security challenges.

    You’ll learn how Micro Focus Voltage can help you to overcome these challenges, while also improving operational efficiency, compliance, and revenue generation.

    We’ll also share real-world examples of how Voltage has enabled the world’s leading organisations to:

    •Scale big data security, by protecting big data streaming into and beyond the data lake, allowing secure analytics to be enabled on protected data at massive scale

    •Reduce high cost of compliance for data protection regulations, by protecting card data immediately after capture and minimising PCI audit scope

    •Secure workloads to the cloud, by seamlessly protecting data consistently across hybrid IT infrastructure, accelerating new business models

    This live webinar will be presented by:

    - Simon Wilkinson, EMEA Cyber & Security Strategist, Micro Focus
    - Anna Russell, Head of Data Security Consulting, Micro Focus
    - Daniel Clift, Senior Sales Engineer, Micro Focus
    - Brendan Rizzo, Senior Sales Engineer, Micro Focus
  • Deploying multi-factor authentication on mobile platforms
    Deploying multi-factor authentication on mobile platforms Brent Kynaston, TriVir LLC and Kent Purdy, Micro Focus Recorded: Aug 29 2018 47 mins
    Do you have mobile platforms in your organization? Are you interested in eliminating usernames and passwords on iOS, Android and Windows mobile devices and tablets?

    In this webinar you’ll learn:

    • How multi-factor credential enrollment and usage can be provisioned along with enterprise identity into the VMWare AirWatch, IBM MaaS360 and MobileIron environments as well as others
    • How to enable convenient access with tighter security and an improved experience for users and mobile developers alike
    • How easy it is to escape inefficient password processes, get away from resetting forgotten passwords, and enforcing strong passwords that are easily forgotten

    Register today to hear from Brent Kynaston, Principal Solutions Architect at TriVir LLC, a Virginia-based Identity and Access Management (IAM) integrator, and Kent Purdy of Micro Focus.
  • Key trends and application security risks from the 2018 AppSec Risk Report
    Key trends and application security risks from the 2018 AppSec Risk Report Alexander Hoole, Manager, Software Security Research, Micro Focus Fortify Recorded: Aug 28 2018 49 mins
    Fortify on Demand analysis shows broad vulnerability in apps. The majority of web or mobile applications we analyzed had at least one critical or high severity issue. Furthermore, 1 out of 2 apps had critical or high vulnerabilities not covered by the OWASP Top 10 2017.

    The biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer. That’s why it is important that organizations take a holistic view and include application security and vulnerability assessment as part of their software development program.

    In this webinar, we will share results from our recent primary research study that reveals:
    • The top application security risks
    • Where these risks originate
    • How to remediate these risks
    • Best practices to protect your business
  • How to manage and protect privacy throughout the data lifecycle
    How to manage and protect privacy throughout the data lifecycle Marcelo Delima, Product Marketing Manager-Security and Ali ElKortobi, Director, Product Management-IM&G, Micro Focus Recorded: Jul 26 2018 39 mins
    It has been said that 2018 is the year we lost our privacy. But regulators are enacting new legislation--or enforcing existing laws--to ensure that we gain our privacy back. This raises the stakes for enterprises around the world to improve data governance and protection throughout its lifecycle. Strategies for risk mitigation include an interlock of tools and techniques to improve information governance and protect data.

    The Micro Focus Data Privacy Manager is a comprehensive solution to address the privacy governance needs of enterprises. The solution enables customers with the ability to manage and protect sensitive structured data throughout its lifecycle, from discovery and classification to protection and reporting from a single pane of glass.
  • Code with Speed…and Security: Gamified Developer AppSec Training (2018)
    Code with Speed…and Security: Gamified Developer AppSec Training (2018) Matias Madou, Ph.D., Co-Founder and CTO, Secure Code Warrior and Dylan Thomas, Sr. Product Manager, Micro Focus Fortify Recorded: Jul 16 2018 38 mins
    Delivering quality code on time and on budget is one of the biggest challenges of organizations worldwide. With evolving cyber security threats, security became a top of mind concern for board rooms and an essential KPI for development/testing. Since fixing security related (or any) issues later on in the software lifecycle is highly inefficient, the best approach is to blend security early on in the development/testing processes. One of the key methods of having fewer vulnerabilities in the code is through not introducing vulnerabilities in the first place. This requires increasing the security knowledge and awareness of developers through secure code development training.

    Fortify on Demand offers application security as a service with integrated secure development, security testing and continuous monitoring making securing applications easy and scalable for organizations. As part of Fortify on Demand, we offer gamified developer training as a result of our partnership with Secure Code Warrior. Secure Code Warrior addresses the root cause of security vulnerabilities in applications by educating developers on how to apply secure coding techniques. Fortify on Demand (FoD) integrates with Secure Code Warrior, so developers can not only identify but also remediate vulnerabilities in application code in a gamified manner—this appeals to the gaming mentality of developers by providing a competitive element.
  • How to Secure Email Communications and Improve Compliance
    How to Secure Email Communications and Improve Compliance Marcelo Delima, Micro Focus and Michael Osterman, Osterman Research Recorded: Jun 14 2018 36 mins
    The consequences of compliance violations are becoming more severe. GDPR, HIPPA, state laws and other privacy legislation are increasing the cost of data breaches and making the protection of personal data an issue of the highest importance. Email encryption is a key part of tool set required to protect sensitive personal data and comply with legislation. Learn about the challenges of complying with legislation and what characteristics an email encryption solution must have to provide the best possible protection for your most valuable data.
  • Endpoint Management Roadmap Review
    Endpoint Management Roadmap Review Jason Blackett, Micro Focus Recorded: Jun 13 2018 64 mins
    Come and find out what’s happening in Endpoint Management at Micro Focus. This session will be presented by Jason Blackett and other members of the Product Management team. They will discuss the upcoming product roadmap for products including ZENworks, Service Desk, Desktop Containers and ZENworks Mobile Workspace.
  • Switching from ZENworks Linux Based Imaging to WinPE Based Imaging
    Switching from ZENworks Linux Based Imaging to WinPE Based Imaging Jason Blackett, Micro Focus Recorded: Jun 12 2018 59 mins
    Join us as we take a deep dive into the Windows PE Based Imaging capabilities introduced in ZENworks 2017 Update 2. Learn how to use this new imaging solution to avoid common problems such as imaging unsupported hardware.
  • Accelerate Data Protection Time-to-Value in Hybrid IT
    Accelerate Data Protection Time-to-Value in Hybrid IT Carole Murphy, Global Product Marketing, Data Security (Voltage) Recorded: May 31 2018 27 mins
    The rapid adoption of cloud applications creates new risks, as data is constantly flowing to and from on-premises systems and cloud services. Strict privacy regulations such as GDPR, PCI DSS, and HIPAA, along with limited trust in hosted environments, could expose valuable data. Find out how to simplify and accelerate data-centric security deployment in cloud, commercial, and in-house applications, without critical application changes or integration required.
  • Building Out your B2C Cloud in a Way that Scales
    Building Out your B2C Cloud in a Way that Scales Jerry Combs, Principal Architect, Pointblue Technology and Kent Purdy, Micro Focus Recorded: May 23 2018 42 mins
    Implementing an access management system that provides services to the public presents many challenges that are not found in typical enterprise implementations. Chief among these are issues of scale as public facing systems typically serve many thousands or even millions of end users. Business-to-Consumer (B2C) and Government-to-Citizen (G2C) systems require processes, tools, and methodologies that allow a high degree of automation and self-service. Manual administration of such large numbers of user identities is simply not practical.

    In this webinar we will describe the challenges typical of public facing access management systems and an approach to solving them.

Embed in website or blog