Hi [[ session.user.profile.firstName ]]

Gemalto SafeNet EMEA Data Protection Channel

  • Date
  • Rating
  • Views
  • Quantum Threat Conundrum: How to Create a Quantum-Safe Security Strategy Today
    Quantum Threat Conundrum: How to Create a Quantum-Safe Security Strategy Today Stan Mesceda from Gemalto -Bruno Huttner & Gilles Trachsel from ID Quantique Recorded: Jun 19 2017 61 mins
    With the advent of massively powerful quantum computers, much of today's encryption will be vulnerable. Preparing for the inevitability of quantum should be an integral part of current risk management strategy. Gemalto is teaming up with ID Quantique, a leader in quantum security, to help security professionals understand quantum-safe cryptography and the impact it will have on enterprise security. Find out how you can create a quantum-safe environment for voice, video, virtualization and mass data today, securing these assets from even the most advanced cybercriminals and their super-computers.

    Join Gemalto and ID Quantique for a joint webinar to learn more about:
    •What is quantum computing and how it affects security
    •Quantum cryptography in action
    •Examples of quantum cryptography in the enterprise and government space
    •Quantum-safe solutions at a glance
    •Future developments of quantum cryptography
  • Don’t let Smartphones Kill your PKI Security Strategy
    Don’t let Smartphones Kill your PKI Security Strategy Gregory Vigroux, Enterprise Mobility Expert at Gemalto Recorded: May 23 2017 51 mins
    Half of businesses admit security is their biggest concern to increasing user mobility. Securing enterprise mobility has been an ongoing and arduous topic for IT security professionals. Maintaining high-assurance security, while offering access to company resources to an on-the-go workforce has become a balancing act. So much so, a third of businesses actually prevent employee access to company resources via mobile. This is likely not a long term or sustainable solution to the problem.

    So how do you find a compromise that won’t kill your security strategy? There are currently many technologies from derived credentials to mobile PKI. IT professionals are feeling the pressure to find a viable, user friendly, easy-to-deploy and secure options. In this webinar, we will discuss the current solutions in-depth and how they impact your current IT security policies. Attendees will learn more about:
    -Software-based security versus hardware-based security
    -How this impacts your back-end systems
    -Technology such as derived credentials and mobile PKI
    -Implementing a mobile PKI solution
  • Beyond 2FA: The Smart Way to Manage Cloud Access
    Beyond 2FA: The Smart Way to Manage Cloud Access Mor Ahuvia, Authentication Product Marketing at Gemalto Recorded: May 9 2017 44 mins
    Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

    But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

    This webinar explains:
    •Challenges to greater cloud adoption in the fintech space
    •How strong authentication complements access management
    •Why cloud access management is critical to an organization’s cloud adoption strategy
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls
    Part II – How to get started with GDPR & Applying Appropriate Security Controls Jason Hart, Gemalto, Lisa Bentall, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA Recorded: Apr 25 2017 62 mins
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
  • DIY PKI
    DIY PKI Rae Barton, PKI expert at Gemalto Recorded: Apr 17 2017 56 mins
    Public Key Infrastructure (PKI) is a well-known security protocol used by some of the world’s largest governments and top enterprises, but it’s a technology that also affords many possibilities in new and growing industries. Even small to medium sized businesses can greatly benefit from PKI. However, PKI is also often mistakenly perceived as being difficult to deploy. Gemalto is addressing this common misconception. The next webinar in our PKI series, DIY PKI, will walk attendees through the entire process of setting up a PKI environment and how to manage it. We have developed a five step process to make it easy for security professionals to get their PKI system up and running with minimal time spent. The five step implementation method will give you an idea of how to set up a two tier Microsoft PKI infrastructure with Gemalto SafeNet Authentication Manager and SafeNet Luna HSM to perform smart card log on for small to medium sized enterprises.

    Attendees of the DIY PKI webinar will learn:

    -Challenges of PKI deployment
    -Overall PKI integration ecosystem
    -Common use cases deployed in enterprises: Smart card logon – What happens in the backgrounnd, email encryption/signing

    Step by step implementation steps
    oInstall and configure a Hardware Security Module (HSM)
    oInstall the root CA and configure it with the HSM
    oInstall and configure the issuing CA
    oConfigure the permissions of users and create certificate templates
    oInstall and configure an authentication manager



    For the purpose of this webinar and using Gemalto’s five step propriety approach, we will use our SafeNet line of technologies to demonstrate the implementation of the PKI solution.
  • IoT Security Over Tea: Steeping Out the Hype
    IoT Security Over Tea: Steeping Out the Hype Gorav Arora, CTO Office Director of Technology at Gemalto Recorded: Apr 11 2017 63 mins
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls
    Getting started with GDPR, Privacy and Applying Appropriate Security Controls Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA Recorded: Mar 23 2017 56 mins
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • Digital Identities: The Changing Face of Consumer and Enterprise Security
    Digital Identities: The Changing Face of Consumer and Enterprise Security Mor Ahuvia, Product Marketing at Gemalto Recorded: Mar 15 2017 47 mins
    IT decision makers today realize that the enterprise and consumer worlds are merging closer together in how they secure our digital identities. As the consumer world tightens its security around online identities, the corporate world is embracing intuitive, user-friendly identity architectures.

    Enterprises are moving from traditional two-factor solutions, which are based on a binary yes/no validation, to more fluid methods of identity verification, such as context-based, risk-based and continuous authentication. They are also embracing architectures that allow users to import their social, government-issued or commercial identities into the enterprise space. Join this webinar to learn more about:

    •Key concepts impacting the enterprise security space
    •The consumerization of enterprise security
    •Designing enterprise security with UX in mind
    •The impact standards have on the future of strong authentication
  • PKI - Your Ally in the War Against Security Threats
    PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Recorded: Feb 23 2017 58 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • The Foundations and Future of PKI: Yes, it’s Alive and Kicking
    The Foundations and Future of PKI: Yes, it’s Alive and Kicking Asaf Lerner, PKI product development at Gemalto Recorded: Feb 6 2017 59 mins
    According to a report from the Ponemon Institute, 62% of businesses surveyed regard cloud-based services as the most important trend driving the deployment of applications using PKI, an increase from 50% in 2015. While 28% say IoT will drive PKI deployment. PKI is once again in the spotlight, thanks to the growing number of use cases.

    The foundations of PKI technology and it’s future potential will help professionals determine the best security strategy for the long term. This session will go over the building blocks of a PKI ecosystem and discusses the functionality and use cases of the technology. Whether you’re a security professional looking for a PKI refresher or you are starting from scratch, you will find this webinar useful.

    During our webinar, The Foundations and Future of PKI: Yes, it’s Alive and Kicking, we will cover:

    •Brief overview of PKI technology and it’s components
    •PKI for identity and data protection
    •Advanced security functions of PKI
    •Basic PKI practices
    •PKI vertical use cases
    •The brave new world of PKI – a look at emerging trends and technology

Embed in website or blog