Hi {{ session.user.profile.firstName }}

Securing Mobile Applications with CA SiteMinder® for Web Access Management

Manage webcast
Aaron Berman, Advisor, Solution Strategy, CA Technologies Security Business Unit
Mobile applications for iPad, iPhone and Android devices have revolutionized how organizations do business with their customers. Organizations are currently looking for reliable and easy to implement ways to connect mobile apps to the traditional IT resources.

During this webcast, we’ll discuss how you can meet these mobility business objectives to better engage your customers through the deployment of a single, unified security infrastructure that not only supports mobile applications but traditional browsers and web applications. The end result is an enhanced customer experience, enabling better access to products and services, while increasing application security and reducing security overhead.

Mobile topics that will be covered during this session include:

•The current state of mobile application authentication and authorization
•Centralizing policy authorization and auditing across multiple access points
•Advantages of using cookie-less session management for mobile applications
•Leveraging current investment that can be extended to mobile applications

You’ll learn how CA SiteMinder allows organizations to utilize one access management platform for all types of user access, by offering cookie based and cookie-less session management for traditional browsers, browsers on a Smartphone or tablet PC, a native iOS, or an Android application, by securing the REST communications channel between the device and the server.

Who should attend:
•Mobile security managers
•Security specialists and architects
•IT / Application Auditors
•Application/system owners
•Application Developers
Jun 26 2012
44 mins
Securing Mobile Applications with CA SiteMinder® for Web Access Management
More from this community:

IT Governance, Risk and Compliance

  • Date
  • Rating
  • Views
  • Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys.

    Discover how the Qualys AssetView gives you a fast, actionable view of all IT assets while helping to:

    > Gain comprehensive, scalable and always up-to-date view of endpoints — with continuously updated inventory of asset details, scaling to millions of assets

    > Deliver fast, accurate and actionable data — with a new layer of intelligence into the current state of endpoints, including details about services, file systems and registries as well as information to manage and secure systems

    > Minimize impact on systems and networks — by keeping itself lightweight and up-to-date to eliminate the need to reboot

    > Handle virtualized environments with ease — by keeping track of the constant proliferation of images inside and outside of the environment
  • Traditionally, most organizations have used email for sending files to colleagues or clients. However, as files increase in size and email attachment limits are an issue, employees are forced to either use old-fashioned FTP or circumvent company regulations by turning to insecure consumer-grade applications. 72% of the people we surveyed do! Let us tell you about a better way.

    Join us to learn 4 key best practices:
    1) Don’t mess with what users know – continue to use Microsoft Outlook to drive file transfers (just don’t leave it to Outlook to deliver them)
    2) Don’t leave it to users to decide when something is too big or too sensitive to send by email
    3) Do make the experience better and faster for users (as opposed to more complicated and slower)
    4) Have a policy (and protection) that covers email-based sharing even when mobile

    With Workshare, employees can email links to files, eliminating the need for attachments, while continuing to us the familiar Outlook to do it. Policy-enforcement means companies can secure, track, and expire file access and activity beyond the corporate firewall.

    Workshare also uses its customizable policy engine to ensure that the content that is shared is secured and removed of any sensitive information before it is shared.
    Intelligently scan and secure documents too large or too important to send by email. IT can set policies to determine when a file is too large to send, or critically when to block or clean a file if it contains sensitive hidden data that would expose the company to risk.
  • Our dependencies are clear. Organisations have become virtual, and all of this progress relies on systems and infrastructure that no one organisation maintains, and there is no turning back. Significant time and resources are being dedicated to coping with mistakes and oversights, while remediation time following system or data compromise is steadily getting longer.
    Industry has been cornered into a reactionary position addressing incidents as they occur.

    Such concerns are set to dominate discussions at the 2nd Annual (ISC)² Security Congress EMEA, October 20-21 in Munich, Germany.

    Join (ISC)², Infosecurity Magazine and two of the several top notch (ISC)² Security Congress EMEA speakers to examine our progress, how to challenge our reactionary position, and what is required to look forward to the future.

    Moderator: Michael Hine, Deputy Editor, Infosecurity Magazine
    Panellists: Adrian Davis, Managing Director, (ISC)² EMEA; Yiannis Pavlosoglou, Director of IT Risk, UBS; Georg Freundorfer, Director Security EMEA, Oracle

    WIN A FREE TICKET TO CONGRESS!
    (ISC)² is giving away 3 delegate passes for the 2015 (ISC)² Security Congress EMEA, to delegates who view the webinar for a minimum of 50 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. The free pass is valid for all sessions including pre-conference workshops and networking opportunities. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser: http://bit.do/isc2emeacongressprize
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • Get the answers to four common questions about using data standards to grow your business.
  • Learn how to improve workflows and increase efficiency through use of data standards.
  • For oil and gas operators, the need to achieve operational excellence and stay competitive through quality information has never been greater. Meeting the demand for increased profitability, better well performance and regulatory reporting cannot be accomplished without clean, trusted data.
    Informatica Data Quality is a market proven, industry leading solution to address these challenges that oil and gas companies are facing today. For the well lifecycle, Informatica Data Quality offers out-of-the-box PPDM rules to cleanse and harmonize the well data to increase your confidence in well lifecycle information, so better decisions can be made toward achieving operational efficiency, and continued innovations.
    In this webinar, we will demonstrate how Informatica Data Quality can help oil and gas companies to:
    •Understand the patterns and identify the anomalies in your well data
    •Leverage out-of-the-box PPDM rules to cleanse and standardize the well data quickly and effectively
    •Proactively monitor the data quality process to address operational issues
  • Join cloud security expert Tricia Pattee on August 27 for a quick, cut-to-the-chase analysis on where to get the most bang for your security buck. The interactive, hour-long discussion will include:

    -The five most common security mistakes
    -Top six areas of security spend
    -How to maximize budget – and minimize risk
    -Hidden cloud security costs

    The presentation will include a Q & A to answer your specific questions about security budgeting and cost management.

    Register today.
  • Identity Access Management is a complex matrix of requirements meant to assure that only the right people have access to your data. This requires the creation of a rules, roles, and a method for preserving information about access rights. In other words, we create 'big data' that then must be mined to find the most risky individuals and risky behaviors. By starting with a risk-based approach, finding those behaviors and individuals is easier. Explore with us as we examine how risk values can be assigned as you build the database so that analyzing and reporting become easier.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Mobile Applications with CA SiteMinder® for Web Access Management
  • Live at: Jun 26 2012 5:00 pm
  • Presented by: Aaron Berman, Advisor, Solution Strategy, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this