Browse communities
Browse communities
Presenting a webinar?

Advanced Authentication Goes Mainstream: Remote and Mobile Users are the Norm

David Gormley, Senior Principal, CA Technologies Security Business Unit
Advanced Authentication is no longer a solution for a sub set of users that access sensitive information on a regular basis. The number and types of breaches are on the rise and concerns about social engineering and identity theft are widespread….this all leads to the logical justification for advanced authentication for everyone.
More and more employees are accessing sensitive applications remotely. Many of them expect to access applications from multiple endpoints including mobile devices. Partners and customers are inherently remote and business owners want to empower them with access to new powerful online applications.

With this as the backdrop and the increasing number of Internet threats and attacks in the news ….it is all the more important to have a risk appropriate, multi-layered authentication solution. It is also critical to have a versatile approach to authentication that can encompass multiple methods and be flexible enough to react quickly to new threats or actual breaches if necessary.
Jul 12 2011
43 mins
Advanced Authentication Goes Mainstream: Remote and Mobile Users are the Norm
More from this community:

Data Center Management

  • Live and recorded (3002)
  • Upcoming (82)
  • Date
  • Rating
  • Views
  • Join us on Tuesday, March 31, 2015 at 11:00 AM PST/2:00 PM EST for a webinar titled "Hyperscaling Your SaaS Infrastructure" featuring InsideBIGDATA Managing Editor, Daniel Gutierrez and GridGain co-founder and EVP of Engineering, Dmitriy Setrakyan.

    In this 50 minute webinar we'll explore how modern SaaS, PaaS and IaaS systems are achieving unprecedented levels of scale and performance by implementing In-Memory Computing (IMC) technologies. We'll cover which types of services will benefit most from IMC, how IMC compares to alternative technologies, and how to get started evaluating this game-changing technology.

    This webinar is a must-see for technology leaders in the transition to high-speed, low-latency Saas, PaaS or IaaS services. Register Now.
  • Join us on Tuesday, March 31, 2015 at 11:00 AM PST/2:00 PM EST for a webinar titled "Hyperscaling Your SaaS Infrastructure" featuring InsideBIGDATA Managing Editor, Daniel Gutierrez and GridGain co-founder and EVP of Engineering, Dmitriy Setrakyan.

    In this 50 minute webinar we'll explore how modern SaaS, PaaS and IaaS systems are achieving unprecedented levels of scale and performance by implementing In-Memory Computing (IMC) technologies. We'll cover which types of services will benefit most from IMC, how IMC compares to alternative technologies, and how to get started evaluating this game-changing technology.

    This webinar is a must-see for technology leaders in the transition to high-speed, low-latency Saas, PaaS or IaaS services. Register Now.
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • Network Managers have a tall order in IT organizations today. Typically, they are tasked with two conflicting business directives:

    1. Deliver optimal end-user experience for networked applications

    2. Reduce the operational cost of the network, or reduce the IT budget

    But the knee jerk approach of “throwing bandwidth at the problem” while potentially improving end user experience, is hardly the answer to cost management and network optimization.

    In this webinar, Chris Greer will discuss the challenges that result from the common approaches utilized today in capacity planning and, outline a new way, comprised of 4 actionable steps to optimizing the bandwidth you may already have.
  • Network Managers have a tall order in IT organizations today. Typically, they are tasked with two conflicting business directives:

    1. Deliver optimal end-user experience for networked applications

    2. Reduce the operational cost of the network, or reduce the IT budget

    But the knee jerk approach of “throwing bandwidth at the problem” while potentially improving end user experience, is hardly the answer to cost management and network optimization.

    In this webinar, Chris Greer will discuss the challenges that result from the common approaches utilized today in capacity planning and, outline a new way, comprised of 4 actionable steps to optimizing the bandwidth you may already have.
  • Mobile Edge Computing (MEC) provides a new ecosystem and value chain in mobile networks. The Open-RAN ecosystem enables Mobile Operators to open their Radio Access Network (RAN) edge to authorized third-party applications and services. By transforming proximity, context, agility, rapid response time and speed into value for mobile users, mobile operators, network equipment vendors, and third-party providers can improve the customer experience and monetize mobile broadband. The MEC trend is gaining momentum with the establishment of an ETSI MEC Standardization group led by Intel, Nokia, Huawei and other major players.

    In the Webinar, we will present the MEC architecture within the mobile network and demonstrate a number of use cases
    -Leveraging the Open-RAN ecosystem to bring 3rd party applications like Content Delivery Networks (CDNs) to the Radio Edge;
    -Demonstrating the value of real-time network awareness for optimized content delivery;
    -And presenting advanced RAN-based technologies that further accelerate content delivery
  • As companies explore how they can leverage OpenStack to advance their business, they often ask if OpenStack is really “production-ready.” Through co-founding OpenStack, running one of the world’s largest OpenStack clouds, and managing OpenStack private clouds for enterprises, we know what is takes to make OpenStack production-ready. In this session, Justin Shepard, a Rackspace distinguished architect, will discuss what it means to be "production-ready" and how we designed Rackspace Private Cloud Powered By OpenStack to run production workloads. Register today to join this insightful and informative discussion.
  • Channel
  • Channel profile
  • Best of Both Worlds: Authentication That is Both Secure and Convenient for Users Recorded: Mar 24 2015 49 mins
    Charley Chell, Sr. Director, Security Solutions at CA Technologies
    Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.

    Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
  • Briefings Part 6: Identity Management and APIs – The Evolution Continues Recorded: Feb 12 2015 59 mins
    John E. Hawley, Jr., VP, Strategy for Security Solutions; CA Technologies; Brandon Dunlap
    The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Cyber-Defense: Are you Toast? Recorded: Feb 5 2015 34 mins
    Russell Miller, Director, Security Solutions, CA Technologies
    Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.

    Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
  • Customer-focused Identity Management: Improve Relationships and Security Recorded: Jan 29 2015 61 mins
    Andrew Kellett, Principal Analyst at Ovum & Sumner Blount, Director, Security Solutions for CA Technologies
    In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).

    Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
  • Turning the Confusing Identity Management Landscape into a Strategic Plan Recorded: Jan 22 2015 46 mins
    Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc., Sumner Blount, Director, CA Technologies
    In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.

    On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
  • Briefings Part 5: The Business of Identities – Predictions for 2015 Recorded: Jan 15 2015 61 mins
    Michelle Waugh, VP Security Solutions, CA Technologies
    Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
  • Briefings Part 4: Your Business is Exposed: Avoiding API Security Vulnerabilites Recorded: Dec 18 2014 58 mins
    Francois Lascelles, Chief Architect, CA Technologies
    APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • Want to Avoid Security Breaches? Leveraging the NIST Framework for Cybersecurity Recorded: Dec 4 2014 62 mins
    Jamie Brown, Director of Global Government Relations & Sumner Blount, Director of Security Solutions, CA Technologies
    Is your organization worried about joining the ranks of other companies that have suffered breaches recently? Are you concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks?
    The NIST Framework for Improving Cybersecurity defines guidelines and best practices for improving cybersecurity across several major areas. But, how do you take this complex framework and use it in your own environment, and what technologies can help you with adherence to it?
    In this webcast, Sumner Blount and Jamie Brown from CA Technologies will explore the Framework to help you develop a plan for improving cybersecurity in your own environment. We will focus on the Protect function because of its critical importance for protecting assets from improper access and use. Join us to learn how you can leverage identity management and the NIST guidelines to help your organization avoid the impact of a public breach.
  • Briefings Part 3: End-to-End Mobile Security, Samsung Knox and CA Technologies Recorded: Nov 20 2014 57 mins
    Leif Bildoy, Product Management CA Technologies​; Jeff Moles, Samsung KNOX Product Mgmt; Brandon Dunlap
    As the largest Android device manufacturer Samsung understands the value as well as the security implications that apps have introduced. While businesses are reshaping delivery models to capitalize on its opportunities, security risks are forcing organizations to think differently. Controlling access to the app is no longer sufficient. Instead, businesses have to take an end-to-end security approach – protecting access from the app to the backend API. Please attend this webinar to hear Leif Bildoy, Product Manager at CA Technologies, discuss how Samsung has increased the security within its KNOX Workspace to deliver end-to-end security while maintaining the ever important user experience.
  • Briefings Part 2: Are You Prepared For the Next Attack? Recorded: Oct 23 2014 57 mins
    Christopher Wraight & Carole Gunst, Directors, Security Solutions, CA Technologies
    Today, usernames and passwords continue to be stolen and exploited in record numbers. Hackers are still stealing credentials and accessing sensitive data. To stay ahead of hackers, you need to combine the appropriate forms of authentication and application access/session management to reduce risk and to prevent security breaches before they happen. Please join CA Technologies to learn about risk appropriate authentication and SSO/access management capabilities that can help protect your organization from hackers and their popular attack vectors.
  • Briefings Part 1: Unleashing The Power of Consumer Identity Recorded: Sep 25 2014 62 mins
    Merritt Maxim, Director, Security Solutions for CA Technologies
    How can today’s enterprises position themselves to best leverage large consumer populations in ways that meet the business’ requirements without overwhelming the IT organization? In this webinar, Merritt Maxim, Director, Security Solutions for CA Technologies, will discuss the key requirements to deliver consumer scale identity management and examine how capabilities such as user management, social login and risk-based authentication can help organizations realize the full value of consumer identities, while providing a simple user experience and one which helps keep risks in check.
  • Cloud IAM for Seamless Access to SaaS and On-Premise Apps Recorded: Sep 18 2014 59 mins
    David Gormley, Director, Security Solutions at CA Technologies
    In the application economy, it is critical to simplify access to applications delivered from the enterprise and cloud – and do so quickly, securely and cost effectively. Cloud IAM, or Identity and Access Management as a Service (IAMaaS), can be deployed with or without on-premise IAM products to provide seamless access for your employees, partners and customers.

    Join David Gormley, Director, Security Solutions at CA Technologies, to learn how Cloud IAM can be easily integrated with existing IAM components to provide additional flexibility and scalability without burdening your IT infrastructure.
  • Privileged Identities: The Choke Point for Advanced Attacks Recorded: Sep 11 2014 63 mins
    Russell Miller, Director, Security Solutions at CA Technologies & Nimrod Vax, CA Technologies
    The most damaging attacks, whether from inside or outside the organization, have one thing in common: the use of privileged identities. Attackers use authorized or compromised privileged identities to gain access to information, attack new systems, and hide their tracks. Restricting access to compromised accounts is simply not enough. To mitigate damage from these attacks, a combination of capabilities, including fine-grained controls and governance is needed.
    Join Russell Miller, Director, Security Solutions at CA Technologies to learn how with the right blend of processes and controls on privileged accounts, you can create a comprehensive and cohesive approach to securing your organization where it matters most.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends (APJ Event) Recorded: Sep 11 2014 48 mins
    Merritt Maxim, Director, Security Solutions for CA Technologies
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and the Ponemon Institute recently conducted a worldwide survey of over 2,500 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Merritt Maxim, Director, Security Solutions for CA Technologies who will review the key findings from the survey, deliver insight into the current state of BYOID and provide guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud
  • Retail Security: Don’t Be the Next Breach Headline Recorded: Aug 21 2014 33 mins
    Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies
    2013 has been called “The Year of the Retail Breach.” Many organizations are struggling to maintain a comprehensive defense strategy while supporting customers with an engaging experience through mobile devices and social platforms. Retailers in particular have become increasingly aware of their vulnerability and are now searching for comprehensive approaches to security in 2014.

    Please join Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies, to understand common attack scenarios and learn how you can help protect critical systems, from Points-of-Sale (POS) to back-end infrastructure and supporting systems.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends Recorded: Aug 7 2014 56 mins
    Larry Ponemon, Chairman and Founder of the Ponemon Institute & Merritt Maxim, Dir., Security Solutions for CA Technologies
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and The Ponemon Institute recently conducted a worldwide survey of over 3,000 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Larry Ponemon, Chairman and Founder of the Ponemon Institute and Merritt Maxim, Director, Security Solutions for CA Technologies for a review of the key findings from the survey, insight into the current state of BYOID and guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud.
  • Enabling and Securing Multi-Channel Customer Interactions (Global Event) Recorded: Jul 30 2014 59 mins
    David Gormley, Director, Security Solutions for CA Technologies
    Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customers identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.

    Please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interactions.
  • Leveraging the NIST Framework to Improve Cybersecurity Recorded: Jul 24 2014 47 mins
    Sumner Blount, Sr. Principal, Security Solutions and Jamie Brown, Director, Government Relations for CA Technologies
    In February 2014, the National Institute of Standards and Technology (NIST) officially approved and released its Framework for Improving Critical Infrastructure Cybersecurity providing comprehensive guidance to help improve cybersecurity across a range of categories. It has since received significant attention from many organizations and verticals that are seeking best practices for strengthening security controls.

    Please join Sumner Blount, Sr. Principal, Security Solutions and Jamie Brown, Director, Government Relations for CA Technologies to explore the Framework’s goals and recommendations, and discuss key identity management technologies that can help improve your security strategy.
  • Critical Considerations for Securely Mobilizing Your Workforce–Any App, Anytime Recorded: Jul 15 2014 44 mins
    Tyson Whitten and Arun Bhattacharya, CA Technologies
    Enabling your mobile workforce is not a one-time effort but a journey. Various mobility considerations will undoubtedly come into play requiring IT to make decisions around what enterprise mobile apps to roll out to various employees and with what kind of access policies. Do you need to deliver mobile device access to existing web applications? Do you need to develop new native mobile apps – for your employees or your customers? And then what’s the best way to manage and secure these mobile apps? Please join Arun Bhattacharya and Tyson Whitten from CA Technologies as they provide customer validated recipes for securely enabling your mobile workforce, while covering everyday use cases for mobile app development, management and security.
  • IAM in the “Age of the Customer”: Balancing Usability and Security Recorded: Jul 10 2014 62 mins
    Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc. & John Hawley, VP Security, CA Technologies
    An increasing portion of your revenue and customer engagement hinges on digital relationships that span multiple channels like web and mobile, and this puts your customers in the driver’s seat more than ever before. Any hitch in securely registering or logging into your website, mobile app, or web services and undue friction when conducting transactions can send prospects and even loyal customers to your competition.

    Please join guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc. and John Hawley, VP of Security Strategy at CA Technologies, to explore the requirements for consistent security across channels of customer interaction and the need to create a new balance between convenience and security. Learn how Customer IAM (CIAM) can both enable and protect digital interactions so you can enhance customer relationships and reduce risk at the same time.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Advanced Authentication Goes Mainstream: Remote and Mobile Users are the Norm
  • Live at: Jul 12 2011 7:45 pm
  • Presented by: David Gormley, Senior Principal, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this