Hi [[ session.user.profile.firstName ]]

Security Solutions

  • Date
  • Rating
  • Views
  • How to Enable Trust, Interoperability, & Shared Credentials
    How to Enable Trust, Interoperability, & Shared Credentials Ora Niknamfard, Product Marketing Manager Security at CA Technologies Recorded: Jun 21 2018 40 mins
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • How to Reduce Excessive Access for Highly Privileged Users
    How to Reduce Excessive Access for Highly Privileged Users Naresh Persaud, Senior Director of Security at CA Technologies Recorded: May 31 2018 41 mins
    Adopting privileged access management typically means forcing users to use named accounts instead of root and administrator accounts. As a result, the volume of privileged "named user" accounts in the enterprise is increasing. Fortunately, with effective role management and certification review, organizations can streamline and reduce excessive access.

    Join Naresh Persaud, Senior Director of Security at CA Technologies as he explains the challenge of privileged user governance, explores solutions, and presents a demo on how to manage privileged "named users."
  • Security at the Speed of App Development: DevOps Meets CA Single Sign-On
    Security at the Speed of App Development: DevOps Meets CA Single Sign-On CA Hosts: Herbert Mehlhorn, Product Management & Venky Karukuri, Sr Principal Architect Recorded: May 3 2018 61 mins
    For businesses and government organizations to succeed, development and security teams must quickly build, test, and deploy secure apps and features. The challenge presented by this DevOps process? Typically, there are only a few security teams to support many development teams.

    The good news? DevOps is not just for developers anymore. Join us as we discuss how CA Single Sign-On REST APIs can help security teams:
    • Confidently create, read, update, and delete policies
    • Easily move policies from dev to staging to production
    • Efficiently keep pace with development team practices

    We’ll also cover how to apply DevOps techniques to your infrastructure, allowing security teams to better prepare for releases, minimize downtime, and avoid costly upgrades.
  • Harnessing the Power of Digital Consumer Identity
    Harnessing the Power of Digital Consumer Identity Naresh Persaud, Senior Director of Security at CA Technologies Recorded: Apr 26 2018 41 mins
    Today’s consumers do not want to wait on the phone for customer service. Today’s consumers do not want to fill out lengthy online forms to access information or resources. In short, today’s consumers’ time is valuable and not unlimited. As a result, every company is redefining its online digital experience to maximize customer engagement, enhance brand affinity, and increase consumer wallet share.

    This is your opportunity to learn how harnessing digital consumer identity can foster an effective consumer engagement strategy. Join Naresh Persaud, Senior Director of Security at CA Technologies as he shares case studies from multiple industries that are exploiting the power of digital consumer identity to build trust and make customer interaction frictionless.
  • Agentless Access Management: Can SiteMinder Do That?
    Agentless Access Management: Can SiteMinder Do That? Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products Recorded: Mar 27 2018 61 mins
    Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.

    Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:

    •Securely address critical user productivity needs
    •Transform your approach to access management
    •Foster new collaboration between security and application development teams
  • Insider Threats – Enhancing PAM as Effective Countermeasure
    Insider Threats – Enhancing PAM as Effective Countermeasure CA Hosts: Rob Marti, Privileged Access Management Director & Alexandra Beswerchij, Product Marketing Manager Recorded: Mar 22 2018 49 mins
    Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:

    • 90% of organizations feel vulnerable to insider threats
    • Over 50% have experienced an insider attack in the past year
    • 67% cite phishing as the prime concern of attacks

    Insider Threats are real. Be ready. Join CA hosts - Rob Marti, Privileged Access Management Director and Alexandra Beswerchij, Product Marketing Manager - to review the research and discuss how a layered and comprehensive Enterprise IAM approach enhances PAM to provides an effective countermeasure to both insider attacks and external actors.

    Exploit key security tactics and strategies.
  • Preparing for GDPR Compliance and Measuring Governance
    Preparing for GDPR Compliance and Measuring Governance CA Technologies hosts: Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor Recorded: Mar 15 2018 48 mins
    Today, it’s estimated that 80% of companies are not prepared to comply with GDPR. The most challenging use cases are managing portability, conducting certification campaigns, and overseeing data access approval. Are you ready?

    Join CA Technologies hosts, Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor as they review:

    • How compliance requirements align with legislation
    • What data collection and analysis are required
    • Informative case studies on GDPR readiness

    What’s more, we’ll demo a dashboard for the Data Protection Officer to use for compliance reporting .
  • Threat Intelligence – Hype or Hope?
    Threat Intelligence – Hype or Hope? Mark McGovern, Vice President, Product Management, CA Technologies Recorded: Mar 8 2018 53 mins
    As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning deliver the threat intelligence that is needed, and if so, how do we start to use it?

    Join Mark McGovern, Vice President, Product Management, CA Technologies as he takes a closer look at threat intelligence and its unique capabilities. The session will uncover the:

    • Challenges and benefits of collecting the data needed to detect threats
    • Immediate value and risks posed by a shared threat intelligence model
    • Advantages of applying advanced machine learning to specific problems

    Whether you are new to cybersecurity or an experienced professional, threat intelligence should be on your “need to know” security agenda.
  • GDPR & Privileged Access Management … Are You Ready?
    GDPR & Privileged Access Management … Are You Ready? Cullen Lemley, Cybersecurity Consultant at CA Technologies Recorded: Mar 1 2018 56 mins
    May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • The Network Effect: Leveraging the Power of Consortium Data
    The Network Effect: Leveraging the Power of Consortium Data CA hosts: James Rendell, VP, Product Management, Payment Security & Paul Dulany, VP, Data Science Recorded: Feb 27 2018 51 mins
    Today, consumers are using millions of devices to buy whatever, whenever, and wherever. However, this rapid evolution of e- and m-commerce has created a target for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions. So, how can you stay ahead of sophisticated cybercriminals, reducing CNP Fraud Losses by 25% or False Positives by 35%.

    Banks maintain a wealth of valuable data, take advantage of it. Join CA Technologies hosts, James Rendell, Vice President, Product Management, Payment Security and Paul Dulany, Vice President, Data Science to explore the benefits of CA Risk Analytics Network. This is your opportunity to learn:

    •How neural network models, machine learning & artificial intelligence can help financial services
    •How to unlock the unique data advantage that can prevent CNP fraud losses
    •How the “network effect” and real-time learning stop online fraud instantly
    •How to identify which techniques and technologies will be important in the future
    •How banks have improved their bottom line; insight from our case studies


    Webcast Hosted by ISMG

Embed in website or blog