Browse communities
Browse communities
Presenting a webinar?

Authentication as a Service. Get your clients up and running in minutes.

Neil Hollister, VP of Service Provider Business, SafeNet
Strong authentication is becoming crucial for all organisations, creating a huge market opportunity which service providers are uniquely positioned to fulfill. But historically Service Providers have faced huge challenges to roll out and scale authentication as a service to their customers cost-effectively, as its expensive and complex to manage and administer for the mass market.

SafeNet’s Blackshield Cloud is a revolutionary cloud-based authentication service designed specifically for Service Providers providing:

•Increased revenue and customer stickiness by the provision of authentication solutions that differentiate your existing service portfolio
o"Ready to go" cloud-based standardised and certified, subscription service for your clients
oNo upfront costs due to cloud model and massively reduced total cost
oSimple, low, subscription cost - per user per year fee
oFits your business model – brand it, customise it, integrate it with your billing system, instantly
oSimple migration from your or your clients’ existing authentication products

Join your fellow professionals to understand how with Blackshield Cloud, a service provider can roll out and scale strong authentication as a service with ease, greatly reducing the investment, complexity and operational costs associated with traditional authentication servers and have customers up and running in minutes!
Jul 18 2012
54 mins
Authentication as a Service. Get your clients up and running in minutes.
More from this community:

Cloud Computing

  • Live 1 and recorded (4295)
  • Upcoming (109)
  • Date
  • Rating
  • Views
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Join us this week for a special 30-minute live session on how RingCentral integrates with Zendesk for improved workflow and increased productivity.

    Tune in every Friday for RingCentral Live. We’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session also features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.
  • DNS security breaches are more common than you think. From hijacking of a DNS record at the registrar to cache poisoning to data exfiltration through DNS, they can cause significant damage in terms of direct revenue loss, theft of sensitive information, and brand damage. Because DNS is rarely monitored closely, malicious actors use it to avoid detection and slip under the radar. Early detection is key to minimizing damage and disrupting the cyber-kill chain at the DNS level. Join this webinar to learn the different breach tactics, the impact a security breach can have, and best practices and mitigation techniques. Keeping your DNS secure means keeping your data secure.
  • Early on expectations from B2B buyers in their journey set the stage for marketing and sales to work together. As leads flow in, an agreed-upon plan and process should be in place for lead identification, distribution and follow-up. This optimized plan and process can make a huge difference between smooth sailing or rough seas in the next steps of the journey for the marketing and sales teams and most importantly, the buyer.

    So, what does this process look like, and how can an optimized lead process affect not only the quality of the buyer's journey, but opportunity generation? Join Isaac Payne, Marketing Operations Specialist, and Ali Gooch, Sr. Sales Manager-both of Pardot, as they explore and give us tips on how we can get the most out of an optimized lead process.
  • Early on expectations from B2B buyers in their journey set the stage for marketing and sales to work together. As leads flow in, an agreed-upon plan and process should be in place for lead identification, distribution and follow-up. This optimized plan and process can make a huge difference between smooth sailing or rough seas in the next steps of the journey for the marketing and sales teams and most importantly, the buyer.

    So, what does this process look like, and how can an optimized lead process affect not only the quality of the buyer's journey, but opportunity generation? Join Isaac Payne, Marketing Operations Specialist, and Ali Gooch, Sr. Sales Manager-both of Pardot, as they explore and give us tips on how we can get the most out of an optimized lead process.
  • Janssen Pharmaceuticals, a member of the Johnson & Johnson family of companies, transformed their medical information contact centers to deliver a faster, more seamless customer experience. Join this webinar to learn how using the Salesforce Service Cloud and Knowledge allows Janssen to:

    -Successfully manage a medical information solution across the pharmaceutical and medical device sectors of Johnson & Johnson
    -Increase agent productivity by automating 99% of processes for the medical device center
    -Improve agility and innovate on top of the Salesforce platform
    -Respond to customers 25% faster on their medical information requests
  • Janssen Pharmaceuticals, a member of the Johnson & Johnson family of companies, transformed their medical information contact centers to deliver a faster, more seamless customer experience. Join this webinar to learn how using the Salesforce Service Cloud and Knowledge allows Janssen to:

    -Successfully manage a medical information solution across the pharmaceutical and medical device sectors of Johnson & Johnson
    -Increase agent productivity by automating 99% of processes for the medical device center
    -Improve agility and innovate on top of the Salesforce platform
    -Respond to customers 25% faster on their medical information requests
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
  • Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.
  • Channel
  • Channel profile
  • Bedeutung der Verschlüsselung Jun 2 2015 1:00 pm UTC 75 mins
    Armin Simon, Northern EMEA Channel Manager
    Bedeutung der Verschlüsselung
  • Next Generation Authentication May 19 2015 2:00 pm UTC 75 mins
    Danna Bethlehem
    Next Generation Authentication from SafeNet offers frictionless authentication delivered from the cloud, combined with transparency, trust and control, allowing you to secure access to diverse applications and meet security regulations in a shifting IT landscape.

    Featuring fully automated processes and support for a broad IT eco-system, frictionless authentication empowers organizations to protect numerous applications with strong authentication. A broad range of authentication methods and form factors ensures optimal risk mitigation and end user satisfaction.

    Join us to find out how Next Generation Authentication from SafeNet let’s you more easily secure more applications, protect more identities - and adapt to changing IT environments – while achieving the right balance for your business and security needs.
  • IAM and Authentication Trends in 2015 Recorded: Mar 24 2015 60 mins
    Doron Cohen, Chief Technology Officer and VP, SafeNet Authentication
    The Identity and Access Market (IAM) is undergoing exciting changes. Increased cloud adoption, cyber-threats and the speedy adoption of mobile computing is affecting how enterprises approach access security and authentication.

    Getting insight into these trends can help you prepare your organization for better and more effective Identity and Access policies during the coming year.

    Join us on for a webinar on “IAM and Authentication Trends in 2015”, on March 24, 2015, where you can hear all about Identity and Access trends and developments from an industry expert.
  • Stop SSL-Encrypted Attacks in their Tracks! Recorded: Mar 17 2015 47 mins
    Stephen Helm, Product Manager, SafeNet & Danny Luedke, Product Manager, F5 Networks
    Join us on March 17th to learn how SafeNet Luna HSMs integrate with F5 Networks BIG IP load balancer to protect the integrity of the SSL communications.
  • Security and The Internet of Things Recorded: Feb 17 2015 64 mins
    David Etue
    The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Join us on February 17th to learn how the Internet of Things will play a role in your future and what changes will be happening in security.
  • Building a Crypto Foundation Recorded: Jan 29 2015 57 mins
    Mark Yakabuski
    Building a Crypto Foundation
  • The Cyber Security Playbook: Securing Budget and Forming Allies Recorded: Jan 20 2015 49 mins
    SafeNet
    As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!

    Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!

    This session will reveal new strategies for:

    •Finding financial and operational support for information security initiatives across the organization;
    •Enlisting new, and at times, surprising allies for your information security projects;
    •Building a virtual team of ‘defenders’ across the organization.

    REGISTER TODAY for this insightful best practices session
  • The 6 Vulnerabilities of the Retail Payment Ecosystem Recorded: Dec 9 2014 40 mins
    Alexandra Lating - Product Marketing Specialist
    The retail payment ecosystem is a complicated and highly vulnerable system filled with multiple stakeholders responsible for security, such as hardware device manufacturers, software application providers and financial institutions. As a retailer, you rarely control the security for each piece of the payment ecosystem. But you still need to know everything about the process including:

    •The 6 ways your data is most vulnerable
    •How your data could be attacked
    •Which security stakeholder is responsible for protecting your data
    •What security solution should be implemented

    Join our live webcast on December 9th for more information on the vulnerabilities of the retail payment ecosystem, and what they mean for all security stakeholders, especially retailers.
  • Encryption and Payments: How Recent Breaches are Changing the Approach Recorded: Dec 3 2014 73 mins
    Stephen Helm, Product Marketing – SafeNet Paul Hampton, Product Manager - SafeNet
    We’re sure you’ve all heard about it in the news. With more than 2 billion records lost or stolen since 2013, how can you be sure your organization’s current security scheme will stand up against malicious attacks?

    Join SafeNet’s webinar, “Encryption and Payments: How Recent Breaches are Changing the Approach to Data Protection in the Payment Ecosystem” to learn how your organization can improve its current strategy. Encryption and tokenization have long been used to secure transactions that occur in the payment ecosystem, but our HSM experts will discuss how to take this approach to the next level. By dissecting the payment ecosystem, we’ll uncover a variety of vulnerabilities in the current process and demonstrate how to use encryption and key management more effectively.
  • Secure Enterprise & Cloud Applications w/ SafeNet Next Generation Authentication Recorded: Oct 29 2014 42 mins
    Danna Bethlehem
    The ability to access any corporate application, whether it resides on the network or in the cloud, ensures your employees have mobility and business agility. Anywhere, anytime remote access from any device however, increases management loads for IT professionals and obscures visibility into which employees are accessing what applications – and when.

    Next Generation Authentication from SafeNet offers frictionless authentication delivered from the cloud, combined with transparency, trust and control, allowing you to secure access to diverse applications and meet security regulations in a shifting IT landscape.

    Featuring fully automated processes and support for a broad IT eco-system, frictionless authentication empowers organizations to protect numerous applications with strong authentication. A broad range of authentication methods and form factors ensures optimal risk mitigation and end user satisfaction.

    Join us to find out how Next Generation Authentication from SafeNet let’s you more easily secure more applications, protect more identities - and adapt to changing IT environments – while achieving the right balance for your business and security needs.
  • Busting the Top 5 Myths of Protecting Data in Motion Recorded: Oct 8 2014 59 mins
    Stan Mesceda, Product Manager of High Speed Encryption, SafeNet
    Fibre tapping is on the increase due to the high success rate currently enjoyed by cyber criminals targeting data in motion. A recent survey* conducted by Trustwave and published in their 2013 global security report, found that “Attackers were more successful at maintaining persistence and harvesting data in transit than they were at attacking stored data. Despite this a recent Spiceworks survey* of IT pros found that “29% of respondents are not encrypting ANY data in motion.”

    Add to this that high profile fibre tapping cases are becoming public news and increasing, and all of this contributes to the real need to protect data in motion from cyber threats.

    By protecting the data itself with encryption you render it useless to a 3rd party, but as with all technology applied to a business need, this brings about some common myths.

    Join this live webinar and hear Stan Mesceda, Senior Product Manager, High Speed Encryption, de-mystify the top 5 most common myths about protecting data in motion, listed below:

    •Ethernet is inherently secure/Fibre is not tappable
    •VPN/MPLS/IPSEC doesn't affect performance
    •My carrier is required to let me know if my data is breached
    •Encryption is complicated
    •Encryption is only affordable for the big guys

    Then following this discussion, learn about the business and technology benefits of encryption data in motion.

    Register today to join this insightful webinar

    *survey stats quoted are from the Trustwave 2013 Global Security Report and Spiceworks Voice of IT survey deployed to 200 IT pros worldwide conducted on behalf of SafeNet, July 2014
  • High-Assurance Encryption: Key Security Best Practices Recorded: Jul 17 2014 46 mins
    Stephen Helm, Product Marketing – SafeNet
    Encryption is fundamental for security but it is only as strong as the protection afforded to the cryptographic keys. If the keys are compromised, the encrypted data can be compromised.

    By utilizing a hardware root of trust to secure cryptographic keys and provision encryption, decryption, authentication, and digital signing services, you can provide your agency with reliable protection for transactions, identities, and applications.

    In this webinar, you will learn how to protect your cryptographic keys by easily integrating hardware security modules to your applications to secure:

    PKI/Certificate Services
    Digital Signatures
    Database and File Encryption
    Web Services
    Cloud Services

    Join your fellow professionals for this best practice session on effective encryption key management.
  • Fibre Tapping: How to Protect Your Data in Transit with Encryption Recorded: Jul 8 2014 5 mins
    Video
    Fibre tapping is not child’s play but if you’re criminally minded, there are options such as Evanescent Fibre Coupling to expose data in flight across high speed networks. With a very small signal loss – less than 1% - it’s practically undetectable. SafeNet shares how to protect data in motion against fibre tapping with encryption in this new video.
  • Recent EU Data Breach Regulations: Are you EU compliant? Recorded: Jun 26 2014 58 mins
    Gloria Marcoccio - IT Regulations & Information Security Expert, Jason Hart, VP, SafeNet
    Guidance to achieving compliance with new EU regulations

    With the EU Regulation 611/2013 for ISP/TelCo operators coming into force, the European regulatory framework is giving more precise guidance on the required security measures. The key objective of the EU Regulation is to limit data breaches and incidents.

    Measures that limit data breaches and incidents are central to the EU regulations, when applied correctly by an organizations security teams.

    Encryption is the most important recommended measure to achieve compliance and allows the data to become unintelligible. With Encryption organisations can reduce the residual privacy risks to a negligible level.

    Extended EU regulations with a wider target are expected: The new EU Data Protection Regulation and the Directive on Networks & Information Security (NIS) are both pending EU final approval to come into force.

    Attend this webinar and discover how to keep your customers data safe and reduce the risk of having to notify a data breach to your customers under the new EU regulations.
  • The Cyber Security Playbook: Securing Budget and Forming Allies Recorded: Jun 17 2014 49 mins
    David Etue, VP Corporate Development Strategy, SafeNet & Josh Corman, CTO, Sonatype
    As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!

    Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!

    This session will reveal new strategies for:

    •Finding financial and operational support for information security initiatives across the organization;
    •Enlisting new, and at times, surprising allies for your information security projects;
    •Building a virtual team of ‘defenders’ across the organization.

    REGISTER TODAY for this insightful best practices session
  • Securing Your Mission Critical Data in Storage Recorded: Jun 11 2014 46 mins
    Blair Semple, CISSP-ISSEP, Director of Business Development, SafeNet
    Security is top of mind for storage professionals and their CIOs today. As enterprises look for ways to maximize storage efficiency, performance and capacity, keeping data safe from both hackers and rogue employees, is vital. For cyber criminals, storage is a major target as this is where the sensitive, mission-critical, and most other data is available.

    So how do you keep your storage secure? Encrypting your data is the foundation to protecting your assets. But what else can you do to ensure seamless access for authorized users, while keeping everyone else out? Find out more in this interactive presentation.
  • How Encryption Key Management Enables Data Center Transformation Recorded: May 15 2014 44 mins
    Blair Semple, CISSP-ISSEP, Director of Business Development, SafeNet
    In the past, companies had limited options for encrypting data, and the products that managed the encryption keys were complex, single-purpose, and expensive. Today, a virtualized data center requires a more nimble approach: new encryption solutions have been developed to encrypt data, and more powerful solutions for managing all of the necessary keys are required.

    Blair Semple, CISSP-ISSEP, Director of Business Development at SafeNet, will discuss the role of key management in the enterprise storage ecosystem, best practices, and the recommended characteristics of solutions.

    With this session, you can prepare for a key management system that meets your needs for security, scale, flexibility, and operational efficiency—both today and well into the future.
  • Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Recorded: May 14 2014 49 mins
    David Etue, VP Corporate Strategy, SafeNet
    Forget the geeky analysis of cloud security; risk is driven by people involved and the approach to adoption. This discussion will tackle the complex issues around data ownership and control in the hands of customers, providers, law enforcement, intelligence agencies and a pantheon of adversaries.

    If data is destiny, then too many people are in charge of your fate.

    We discuss how to get it back.
  • Multiple authentication solutions, but are they all equal? Recorded: May 8 2014 42 mins
    Jason Hart, VP, Cloud Services Architecture, Authentication
    How to map the Ideal Authentication Solution to your IT Environment

    Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

    Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

    Then we will discuss:

    •Current market trends around collaboration, cloud and security
    •Vulnerabilities associated with unsecured file sharing tools
    •The role of strong authentication in securing collaboration and file sharing tools
    •Authentication Case study
  • Secure payment vulnerabilities with Point-to-Point encryption Recorded: Apr 24 2014 57 mins
    Paul Hampton, Product Manager, SafeNet
    Everyday consumers assume that when making a purchase, online or in-store, their card data is handed off to a trusted source, with security in place to protect them. However protecting these transactions and the retail payment ecosystem has become increasingly complex, with recent data breaches of large retailers testament to the vulnerabilities.

    In addition, compliance with PCI DSS fails to address some of these vulnerabilities resulting in potential exploitation with disastrous consequences. To address these security gaps the scope of security needs extending from the merchant, acquirer, switch and bank or card issuers to include the manufacturers of payment terminals at the point of sale and developers of payment application software.

    Join your fellow professionals to understand how by using Point-to-Point Encryption, card data is encrypted from the earliest possible moment of its capture, and ensures that data remains in an encrypted state consistently until it arrives at the payment gateway.

    Then understand why many merchants are considering P2PE not only to secure vulnerabilities, but also because it can effectively remove some of the merchant’s own security infrastructures from the scope of compliance with regulations such as PCI DSS. Lastly understand why encryption is only as secure as the encryption keys as when cryptography is used to protect valued data, the risk is transferred from the data to the keys.
EMEA Data Protection Solution Webinars
EMEA data protection solution webinars designed for enterprise end users, distributors and resellers.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Authentication as a Service. Get your clients up and running in minutes.
  • Live at: Jul 18 2012 2:00 pm
  • Presented by: Neil Hollister, VP of Service Provider Business, SafeNet
  • From:
Your email has been sent.
or close
You must be logged in to email this