Hi [[ session.user.profile.firstName ]]

Appliance Key Management Advantages for IBM Storage Encryption

How can you be sure you can recover your data, long-term, ensure that keys are protected from theft, and limit access to all but legitimate users? Key management is the foundation to deploying encryption successfully.
During this webinar Thales e-Security and IBM will discuss:
• The
How can you be sure you can recover your data, long-term, ensure that keys are protected from theft, and limit access to all but legitimate users? Key management is the foundation to deploying encryption successfully.
During this webinar Thales e-Security and IBM will discuss:
• The importance of key management for effective encryption solutions
• Determining environmental readiness and solution qualifying criteria
• Six critical requirements of a robust key management system
• A best of breed approach: IBM software in a security-hardened appliance

Whether yours is a small enterprise looking for a reliable point solution, or a global organization with a large investment in centralized IT services, this presentation will inform you on how today’s solutions provide the right fit to accelerate adoption and plan for future growth.
Recorded Jul 12 2012
39 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
Presentation preview: Appliance Key Management Advantages for IBM Storage Encryption
Recommended for you:
  • Date
  • Rating
  • Views
  • Using Data Security to address HIPAA and HITECH Regulations Using Data Security to address HIPAA and HITECH Regulations Derek Tumulak, Vormetric VP of Product Management and Tricia Pattee, HOSTING Product Manager Live 60 mins
    Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • Deploying and Scaling Web Application with AWS Elastic Beanstalk Deploying and Scaling Web Application with AWS Elastic Beanstalk Jesper Söderlund and Abhishek Singh Recorded: May 26 2016 58 mins
    Want to easily deploy your Node.js, Ruby, Python, .NET, Tomcat, PHP or Docker web applications to AWS? AWS Elastic Beanstalk is a service that makes it easy to deploy, scale, and manage your web applications on AWS by providing preconfigured application stacks and managing the underlying infrastructure on your behalf. You simply select the application stack you want and upload your code to get started. This webinar will familiarize you with how to deploy your web application to AWS using AWS Elastic Beanstalk (EB). We will walk through the steps necessary to debug, test and scale your application to handle millions of web requests. Also, you will learn about deployment options, cost management, and ongoing monitoring and maintenance.

    Learning Objectives:
    • Understand the benefits of AWS Elastic Beanstalk versus do-it-yourself
    • Deploy a sample Node.js application using the Elastic Beanstalk command line interface
    • Modify application stack configuration and extend your application to use additional AWS resources (e.g.: DynamoDB, SNS, etc.)
    • Debug, load test, and scale the sample application to handle millions of web requests • Use deployment options available for zero downtime deployments (in-place and blug/green)
    • Use tags for cost management
    • Set up alarms to monitor you running applications
  • Building Scalable Web Apps on AWS Building Scalable Web Apps on AWS Jesper Söderlund and Ian Massingham Recorded: May 26 2016 44 mins
    Join AWS for this Building Scalable Web Applications webinar where we will explain the key architectural patterns used to build applications in the AWS Cloud, and how to leverage cloud fundamentals to build highly available, cost effective web-scale applications.

    You will learn how to design for elasticity and availability within AWS using a common web architecture as a reference point and discuss strategies for scaling, security, application management and global reach. If you want to know how to make your applications truly scale then join this webinar to learn more.
  • Building and Securing your 5* App Building and Securing your 5* App Steve Lamb, EMEA Regional Manager & Rob Stock, Solutions Consultant, Hewlett Packard Enterprise Recorded: May 26 2016 49 mins
    This month the debate will range around applications and how we deploy and secure them for mobile devices. Speakers will discuss BYOD, device management, developing and designing secure apps and how that impacts the lifecycle.

    This discussion will reference products including Mobile Centre, Unified Functional Testing, LoadRunner, Network Virtualization, Fortify Web Inspect, AppPulse Mobile ,Fortify on Demand, Fortify Source Code Analysis.
  • CA ARD: efficienza ed ottimizzazione dei test tramite un approccio Model-Driven CA ARD: efficienza ed ottimizzazione dei test tramite un approccio Model-Driven Domenico Maracci - CA Technologies Recorded: May 26 2016 28 mins
    In un momento in cui le iniziative IT corrono di pari passo col business, l’abilità di comunicare i requisiti di business in un modo che sia direttamente comprensibile all’IT diventa un imperativo. CA ARD utilizza l’approccio Model Driven Testing per eliminare ambiguità nei requisiti, ottimizzando i cicli di test garantendo totale test coverage.
  • Alternatives to RSA Data Protection Manager for Centralized Key Management Alternatives to RSA Data Protection Manager for Centralized Key Management Steve Kingston, Product Manager - Gemalto Recorded: May 25 2016 27 mins
    RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
    Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:

    • Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
    • Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
    • Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
    • Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
    • Quickly get started with our 5 easy migration steps
  • Alternatives to RSA Data Protection Manager for Centralized Key Management Alternatives to RSA Data Protection Manager for Centralized Key Management Steve Kingston, Product Manager - Gemalto Recorded: May 25 2016 27 mins
    RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
    Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:

    • Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
    • Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
    • Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
    • Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
    • Quickly get started with our 5 easy migration steps
  • From the Field to the Back Office: Complete Digital Transformation for Energy From the Field to the Back Office: Complete Digital Transformation for Energy Joseph Yoklavich, National Sales Director for Energy Recorded: May 24 2016 50 mins
    Attend this webinar to find out why USG&E, Engie and other energy companies choose OutSystems for application development and integration. You’ll see:

    •How to build a mobile application visually in minutes
    •How easy continuous change can be with Integrated App Feedback
    •How simple and fast integration with existing back-office systems and data can be
  • From the Field to the Back Office: Complete Digital Transformation for Energy From the Field to the Back Office: Complete Digital Transformation for Energy Joseph Yoklavich, National Sales Director for Energy Recorded: May 24 2016 50 mins
    Attend this webinar to find out why USG&E, Engie and other energy companies choose OutSystems for application development and integration. You’ll see:

    •How to build a mobile application visually in minutes
    •How easy continuous change can be with Integrated App Feedback
    •How simple and fast integration with existing back-office systems and data can be
  • Accessible and Affordable 3rd Party API and Microservice Integration Testing Accessible and Affordable 3rd Party API and Microservice Integration Testing Nathan Devoll, SV Consultant, CA Technologies Recorded: May 21 2016 56 mins
    Creating seamless digital experiences for customers can require hundreds of systems and services to work together. Not only do you have to worry about your own internal systems, but now in the world of APIs and microservices you also have to worry about how these external systems are going to work with yours.

    Testing dependencies on 3rd party services presents unique challenges. Many 3rd parties charge access fees for test interfaces and the availability and performance of the interfaces may not be the same as the production versions.

    Learn how service virtualization can be used to:
    •Virtualize 3rd party services so they are accessible all the time without fees
    •Replicate production like dependencies for testing
    •Reproduce production defects for faster remediation
    •Eliminate scheduling conflicts and enable parallel development
    •Generate virtualized data

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Appliance Key Management Advantages for IBM Storage Encryption
  • Live at: Jul 12 2012 3:00 pm
  • Presented by: Nathan Turajski - Thales e-Security and Gordon Arnold - IBM
  • From:
Your email has been sent.
or close
You must be logged in to email this