Hi [[ session.user.profile.firstName ]]

Securing Mobile Applications with CA SiteMinder® for Web Access Management

Mobile applications for iPad, iPhone and Android devices have revolutionized how organizations do business with their customers. Organizations are currently looking for reliable and easy to implement ways to connect mobile apps to the traditional IT resources.

During this webcast, we’ll discuss how you can meet these mobility business objectives to better engage your customers through the deployment of a single, unified security infrastructure that not only supports mobile applications but traditional browsers and web applications. The end result is an enhanced customer experience, enabling better access to products and services, while increasing application security and reducing security overhead.

Mobile topics that will be covered during this session include:

•The current state of mobile application authentication and authorization
•Centralizing policy authorization and auditing across multiple access points
•Advantages of using cookie-less session management for mobile applications
•Leveraging current investment that can be extended to mobile applications

You’ll learn how CA SiteMinder allows organizations to utilize one access management platform for all types of user access, by offering cookie based and cookie-less session management for traditional browsers, browsers on a Smartphone or tablet PC, a native iOS, or an Android application, by securing the REST communications channel between the device and the server.

Who should attend:
•Mobile security managers
•Security specialists and architects
•IT / Application Auditors
•Application/system owners
•Application Developers
Recorded Jun 26 2012 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Aaron Berman, Advisor, Solution Strategy, CA Technologies Security Business Unit
Presentation preview: Securing Mobile Applications with CA SiteMinder® for Web Access Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Harnessing the Power of Digital Consumer Identity Apr 26 2018 5:00 pm UTC 60 mins
    Naresh Persaud, Senior Director of Security at CA Technologies
    Today’s consumers do not want to wait on the phone for customer service. Today’s consumers do not want to fill out lengthy online forms to access information or resources. In short, today’s consumers’ time is valuable and not unlimited. As a result, every company is redefining its online digital experience to maximize customer engagement, enhance brand affinity, and increase consumer wallet share.

    This is your opportunity to learn how harnessing digital consumer identity can foster an effective consumer engagement strategy. Join Naresh Persaud, Senior Director of Security at CA Technologies as he shares case studies from multiple industries that are exploiting the power of digital consumer identity to build trust and make customer interaction frictionless.
  • Agentless Access Management: Can SiteMinder Do That? Mar 27 2018 5:00 pm UTC 60 mins
    Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products
    Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.

    Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:

    •Securely address critical user productivity needs
    •Transform your approach to access management
    •Foster new collaboration between security and application development teams
  • Insider Threats – Enhancing PAM as Effective Countermeasure Mar 22 2018 5:00 pm UTC 60 mins
    CA Hosts: Rob Marti, Privileged Access Management Director & Alexandra Beswerchij, Product Marketing Manager
    Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:

    • 90% of organizations feel vulnerable to insider threats
    • Over 50% have experienced an insider attack in the past year
    • 67% cite phishing as the prime concern of attacks

    Insider Threats are real. Be ready. Join CA hosts - Rob Marti, Privileged Access Management Director and Alexandra Beswerchij, Product Marketing Manager - to review the research and discuss how a layered and comprehensive Enterprise IAM approach enhances PAM to provides an effective countermeasure to both insider attacks and external actors.

    Exploit key security tactics and strategies.
  • Preparing for GDPR Compliance and Measuring Governance Recorded: Mar 15 2018 48 mins
    CA Technologies hosts: Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor
    Today, it’s estimated that 80% of companies are not prepared to comply with GDPR. The most challenging use cases are managing portability, conducting certification campaigns, and overseeing data access approval. Are you ready?

    Join CA Technologies hosts, Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor as they review:

    • How compliance requirements align with legislation
    • What data collection and analysis are required
    • Informative case studies on GDPR readiness

    What’s more, we’ll demo a dashboard for the Data Protection Officer to use for compliance reporting .
  • Threat Intelligence – Hype or Hope? Recorded: Mar 8 2018 53 mins
    Mark McGovern, Vice President, Product Management, CA Technologies
    As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning deliver the threat intelligence that is needed, and if so, how do we start to use it?

    Join Mark McGovern, Vice President, Product Management, CA Technologies as he takes a closer look at threat intelligence and its unique capabilities. The session will uncover the:

    • Challenges and benefits of collecting the data needed to detect threats
    • Immediate value and risks posed by a shared threat intelligence model
    • Advantages of applying advanced machine learning to specific problems

    Whether you are new to cybersecurity or an experienced professional, threat intelligence should be on your “need to know” security agenda.
  • GDPR & Privileged Access Management … Are You Ready? Recorded: Mar 1 2018 56 mins
    Cullen Lemley, Cybersecurity Consultant at CA Technologies
    May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • The Network Effect: Leveraging the Power of Consortium Data Recorded: Feb 27 2018 51 mins
    CA hosts: James Rendell, VP, Product Management, Payment Security & Paul Dulany, VP, Data Science
    Today, consumers are using millions of devices to buy whatever, whenever, and wherever. However, this rapid evolution of e- and m-commerce has created a target for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions. So, how can you stay ahead of sophisticated cybercriminals, reducing CNP Fraud Losses by 25% or False Positives by 35%.

    Banks maintain a wealth of valuable data, take advantage of it. Join CA Technologies hosts, James Rendell, Vice President, Product Management, Payment Security and Paul Dulany, Vice President, Data Science to explore the benefits of CA Risk Analytics Network. This is your opportunity to learn:

    •How neural network models, machine learning & artificial intelligence can help financial services
    •How to unlock the unique data advantage that can prevent CNP fraud losses
    •How the “network effect” and real-time learning stop online fraud instantly
    •How to identify which techniques and technologies will be important in the future
    •How banks have improved their bottom line; insight from our case studies

    Webcast Hosted by ISMG
  • Insider Threats – Best Practices for Detecting and Preventing an Attack Recorded: Feb 22 2018 50 mins
    David Duncan, VP Security Marketing at CA Technologies
    Your biggest security risk may be inside your organization. Today’s most damaging threats don’t originate from criminal outsiders or malware but from insiders - both malicious and careless. So, are there preventative options?

    Join this candid discussion of cybersecurity experts – featuring David Duncan, VP Security Marketing at CA Technologies – as they reveal best practices to protect your organization and review key findings from the latest 2018 Insider Threat Report, including:

    • Why 90% of organizations feel vulnerable to insider attacks
    • How the use of behavior and data monitoring is accelerating
    • What popular technologies can help detect, deter and prevent insider attacks

    All registrants will receive a full copy of the new 2018 Insider Threats Report.

    This Panel Discussion is hosted by Cybersecurity Insiders
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance Recorded: Feb 15 2018 38 mins
    CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Advanced Access Management for the Modern Enterprise Recorded: Feb 8 2018 37 mins
    CA Technologies hosts: Martin Yam, VP Authentication & Cloud Solutions, Carol Alexander, Senior Director, Security Products
    It’s a dilemma. Today, security must be built into mobile applications to fight rampant online fraud, but many App Developers don't have the necessary skill set … nor the time required to become proficient coders. What is the answer?

    Join CA Technologies hosts - Martin Yam, VP, Authentication & Cloud Solutions and Carol Alexander, Senior Director, Security Products - to learn how to quickly build and maintain modern, frictionless, and secure apps for your customers. It’s true. With CA Rapid App Security, developers can easily and rapidly:
    • Integrate device security and multifactor and risk-based authentication into apps
    • Eliminate dozens of complex steps, typically required for coding user and device security

    Let your developers focus on mobile applications requirements, while your business delivers a trusted user experience.
  • Reduce Risk Now with Privileged Access and Identity Management Recorded: Feb 7 2018 55 mins
    Naresh Persaud, Senior Director, Security at CA Technologies & Greg Shanton, Vice President, Cyber Security at Neovera
    Are you using or plan on using managed security services for privileged access or identity management? The market for managed security service is undergoing tremendous growth – it’s set to double within the next two years.
    Join us to learn how one MSP uses Privileged Access Management and Identity Management to streamline internal security controls and help customers reduce risk. We'll discuss use cases that managed security companies are addressing and provide insight on how best of breed companies are adapting.
  • Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0 Recorded: Jan 25 2018 59 mins
    CA Technologies Payment Security gurus, Product Management Advisor Jayakuma & Presales Director Matt Berryman
    Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?

    Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
    • How to interpret the recent payment initiatives
    • If risk-based authentication satisfies mandates
    • Which strong authentication methods are compliant
  • From Where You Are to Where You Want to be with 3DS 2.0 Recorded: Jan 18 2018 23 mins
    Hannah Preston, Solution Strategist, Payment Security, CA Technologies
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • CA Briefings Part 2: How to Control Risk & Enable Trust in the Digital Economy Recorded: Jan 11 2018 61 mins
    Speakers - David Duncan, VP, Security, CA Technologies; Brandon Dunlap, Moderator
    The application economy is altering the way we live, work, and interact. As a result, organizations are transforming the way they provide services to customers, employees, and partners. But no matter how these services are accessed, a fundamental concern remains: How does an organization protect sensitive data, while still allowing a frictionless and enjoyable user experience?Join David Duncan, VP, Security of CA Technologies and (ISC)2 on Thursday, January 11, 2018 at 1:00PM Eastern for examination of the cybersecurity risks that can result from application development and what it takes to future-proof business trust.
  • Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics Recorded: Dec 12 2017 53 mins
    Rob Marti, Director of Privileged Access Management, CA Technologies
    Discover the trends and opinions about insider threats that your peers have revealed in the recently published Cybersecurity Insiders report.

    Join Rob Marti, Director of Privileged Access Management at CA Technologies, as he guides you through the report and examines technologies and preventative measures.

    Selecting the right insider threat solution is a pivotal decision; make sure you know your options.
  • CA Briefings Part I: Privileged Access Management in a DevOps environment Recorded: Dec 7 2017 59 mins
    Steven McCullar, Advisor, Solution Strategy, CA; Scott Willson, Product Marketing Dir, Release Automation, CA; B. Dunlap,
    Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.
  • How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA Recorded: Dec 5 2017 64 mins
    Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies
    A new technology has emerged called Attack Path Mapping (APM). APM lets you evaluate the probability of the hacker kill chain and quantify the risks, significantly reducing risks through more effective controls.

    Join Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies as they share how APM can help companies think like a hacker, leveraging insight to resolve vulnerabilities.

    What’s more, find out how Scotia Gas Network and National Center for Cyber Security are successfully employing Attack Path Mapping … today.
  • Securing Identities & Earning Consumer Trust in the Mobile Commerce World Recorded: Nov 30 2017 62 mins
    Al Pascual, Research Dir, Javelin Strategy & Research & Carol Alexander, Sr Dir, Digital Payments Security, CA Technologies
    Mobile is increasingly becoming a part of every consumers’ identity. In fact, it has proven to be at the center of consumers’ financial lives, providing a boon for financial institutions. However, the increasing use of this digital channel is escalating the security risks faced by consumers and institutions.

    Join Javelin Strategy & Research and CA Technologies to learn about such advances in authentication as, real-time behavioral analytics, machine learning, and 3-D Secure 2.0. Advancements that are designed to secure accounts and payments, without overburdening consumers with a friction-laden experience.

    •How the confluence of mobile banking and payments is influencing future standards
    •How consumer expectations are evolving with their mobile channel experiences
    •How financial institutions and service providers should be securing their accounts
  • Adaptive Thinking: How Capital One Combats Fraud Recorded: Nov 16 2017 40 mins
    Dave Laramy, Director of Fraud Strategy, Capitol One & Hannah Preston, Solution Strategist, Payment Security, CA
    Capital One is a Top 10 credit card issuer in the UK and is recognized as an award winner for its exceptional customer experience. The team's philosophy to continually try new things, allows them to successfully balance tighter fraud prevention and increased customer satisfaction. In fact, Capital One readily adopted the CA Payment Security Suite to help ensure that balance.

    Join Dave Laramy, Director of Fraud Strategy at Capital One and Hannah Preston, Solution Strategist, Payment Security at CA as they share tactics to eliminate legacy fraud controls and embrace more efficient ways to battle the bad guys with intelligent data and authentication.

    Tune in and explore how to:
    • Implement best practices and strategies for leveraging data and authentication
    • Improve fraud prevention and the checkout experience with 3DS 2.0
    • Prepare for regulatory changes, scheme mandates, and future transformations
  • Using Managed Security Services? You Need Identity Management! Recorded: Nov 9 2017 56 mins
    Naresh Persaud, Sr. Dir. Security, Prod. Mgmt. CA; Greg Shanton, VP Cyber Security, Neovera; B. Dunlap
    Set to double in the next two years, the managed security services market is being driven by the rising cost of security. One MSP found the formula for success by using Identity Management not only to streamline internal security controls but to also help customers reduce risk. If you are using or planning to use managed security services, join CA and (ISC)2 on November 9, 2017 at 1:00PM Eastern to discover the security requirements that require identity and access. We'll discuss use cases managed security companies are addressing and provide insight on how best of breed companies are adapting.
Discuss Strategies, Explore Trends
CA Technologies’ end-to-end identity and access management Security Solutions give you the freedom to connect everyone to everything from everywhere—along with the confidence that your critical corporate data is still safe and secure.

Join us for informative security discussions and technical insights led by CA Security leaders and third-party experts. We’ll cover topics around identity, privileged users, payment security, access management and other top cybersecurity trends in the industry.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Mobile Applications with CA SiteMinder® for Web Access Management
  • Live at: Jun 26 2012 5:00 pm
  • Presented by: Aaron Berman, Advisor, Solution Strategy, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close