Authentication as a Service. Get your clients up and running in minutes.
Strong authentication is becoming crucial for all organisations, creating a huge market opportunity which service providers are uniquely positioned to fulfill. But historically Service Providers have faced huge challenges to roll out and scale authentication as a service to their customers cost-effe
Strong authentication is becoming crucial for all organisations, creating a huge market opportunity which service providers are uniquely positioned to fulfill. But historically Service Providers have faced huge challenges to roll out and scale authentication as a service to their customers cost-effectively, as its expensive and complex to manage and administer for the mass market.
SafeNet’s Blackshield Cloud is a revolutionary cloud-based authentication service designed specifically for Service Providers providing:
•Increased revenue and customer stickiness by the provision of authentication solutions that differentiate your existing service portfolio
o"Ready to go" cloud-based standardised and certified, subscription service for your clients
oNo upfront costs due to cloud model and massively reduced total cost
oSimple, low, subscription cost - per user per year fee
oFits your business model – brand it, customise it, integrate it with your billing system, instantly
oSimple migration from your or your clients’ existing authentication products
Join your fellow professionals to understand how with Blackshield Cloud, a service provider can roll out and scale strong authentication as a service with ease, greatly reducing the investment, complexity and operational costs associated with traditional authentication servers and have customers up and running in minutes!
RecordedJul 18 2012
Your place is confirmed, we'll send you email reminders
Ein Security Operations Center (SOC) soll aufgebaut oder erweitert werden. Jede derartige Investition erfordert eine Make-or-Buy Entscheidung.
In diesem Vortrag erläutern wir zunächst, welche Funktionen ein SOC erfüllen sollte und mit welchen Kosten zur Erfüllung der Anforderung zu rechnen sind. Dann gehen wir auf die Herausforderung ein, Mitarbeiter für das SOC zu rekrutieren. Wir zeigen auf, welche quantitativen und qualitativen Kriterien für eine Make-or-Buy Entscheidung speziell bzgl. eines SOC relevant sind.
Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor
Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.
Erfahren Sie in dem Webcast
• Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
• Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
• Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen
Le 18 février, nous avons lancé notre série de webinaires intitulée « Assumption of Attack » illustrant la protection exhaustive et avancée qu'offre notre suite logicielle Smart Protection Suite, une solution particulièrement efficace face aux cybercriminels.
Le cinquième épisode de notre série de webinaires portera sur la sécurité du Cloud hybride.
Que vous souhaitiez mettre l'accent sur la sécurité des environnements physiques, virtuels ou cloud, vous découvrirez comment protéger vos données et éviter les interruptions d'activité tout en vous conformant aux réglementations.
Este es el último seminario de nuestra serie de seminarios Web titulados “Assumption of Attack” que lanzamos el 18 de febrero para demostrar cómo nuestra solución líder de mercado Smart Protection Suite proporciona una protección multicapa para su empresa.
Nuestro sexto y último seminario Web abrirá la puerta n.º 6 para hablar de la "Web y la colaboración". ¿Cómo puede lograr una colaboración en tiempo real segura y evitar a la vez que el contenido inapropiado tenga un impacto negativo en su negocio?
Why choose between your datacenter and the cloud? A hybrid cloud solution gives you both.
You have already invested in server products that are on premises. You believe that Cloud is the future and the power of the Cloud can open up countless opportunities for people to do more and achieve more. But how can you leverage the Cloud given your current infrastructure?
Join this webcast to learn Hybrid Cloud options as well as how to extract value from your existing investments by:
- Expanding your options without adding complexity
- Easily moving workloads from your datacenter
- Building hybrid applications that leverage both on-premises and cloud resources
- Taking advantage of storage, backup, and recovery options with increased efficiency and reduced cost.
If you can’t see what’s on your network, then you can’t control it.
As new technologies emerge each day, so do the associated security threats - are you confident that you can see them before they wreak havoc on your network? 86% of executives aren’t, believing there are gaps in their ability to see what’s really going on inside their network.
Join Julian Matossian, Senior Product Manager, and Nick Kelly, Director of Product Marketing, as they delve into the current state of network visibility: the challenges, blind spots, and most importantly, the solutions to help illuminate your network.
Having the right security measures in place is only half the battle – you need to know exactly what they’re protecting you from.
What were the overall trends in cyber breaches, and what does this mean for organizations and the third party vendors with whom they work?
In this webinar, Advisen, an insurance analytics firm, will analyze cyber breaches and identify ebbs and flows throughout 2015 and into 2016. Panelists will then take the unprecedented step of correlating the data Advisen and Bitsight possess to take an even deeper dive to find possible threats to an organization’s cybersecurity — giving all stakeholders greater visibility into the cyber posture of organizations as well as their third party vendors.
Jay Jacobs, Senior Data Scientist, BitSight
Aloysius Tan, Product Manager, Advisen
Chad Hemenway, Managing Editor, Advisen (moderator)
Starting in earnest after the "Snowden Revelations" 2013, more and more service providers such as Google, Yahoo and Amazon have been embracing SSL by default. Whether in search, cloud services or webmail access, these providers have been instrumental in their support of a more secure and obfuscated web. But what does that mean for the enterprise information security professional? While the providers have "seen the light", have we become blinded by it? To ensure the inspection and subsequent protection of data streams in and out of our organizations, we need the ability to inspect encrypted traffic for policy violations or other malicious activity while still ensuring multi- jurisdictional rights to privacy. Join Blue Coat and (ISC)2 on May 26, 2016 for a roundtable discussion exploring methods and mechanisms for addressing SSL inspections and the search for malicious activity.
Join us to hear from Microsoft Azure, Chef and Trend Micro experts on how to best develop a cloud automation strategy in your Azure environment, keeping the agility of the cloud while ensuring that your Azure workloads are protected.
You will learn how to:
• Automate your security posture within Azure
• Use Chef to build compliance and resiliency into your Azure workloads
• Take security automation to the next level
Gloria Marcoccio, Senior Advisor Information Technology and International Privacy & Security Compliance
Fino a poco tempo fa, le leggi europee riguardanti la protezione dei dati erano principalmente focalizzate sul consenso della persona, limitazione delle finalità e trasparenza nei trattamenti, etc. mentre gli aspetti inerenti la sicurezza delle informazioni erano considerati, in linea generale, questioni squisitamente tecniche più che di conformità legale.
Questo quadro ora cambia profondamente con l'entrata in vigore il 25 maggio 2016 del nuovo Regolamento Privacy Europeo (GDPR), e con la prossima direttiva europea sulla sicurezza delle reti e dei sistemi informativi (NIS Directive). Tra le nuove e importanti prescrizioni in tema di sicurezza del GDPR spicca in modo particolare quella della violazione dei dati personali, che richiede alle aziende di tutti i settori di effettuare in tali casi la comunicazione al Garante privacy entro 72 ore e, in particolari condizioni, anche la comunicazione senza indebito ritardo a tutte le persone interessate dalla violazione a meno che i dati non siano stati resi inintellegibili (per esempio per mezzo di crittografia). Inoltre la direttiva NIS, una volta recepita nei Paesi Membri della UE, richiederà tra l'altro agli Operatori dei Servizi Essenziali (Energia, Trasporti, Sanità, etc.) e agli Operatori di Servizi Digitali (e-commerce, motori di ricerca on line, Cloud Computing) di comunicare alle autorità competenti nazionali i casi di incidenti di sicurezza.
L’Unione Europea vuole che la conformità alle nuove normative in materia di protezione dei dati diventi una questione prioritaria e ha così prescritto che queste regole siano soggette a pesanti multe (sono previste sanzioni fino a 20 milioni di euro, e per le imprese fino a 4% del fatturato mondiale, se superiore).
Partecipa al webinar organizzato da Symbolic e Gemalto che si terrà il prossimo 15 giugno alle ore 11:00 per conoscere il quadro normativo applicabile e le misure da predisporre per una corretta gestione dei casi di violazioni dati.
Joe Pindar, Director of Strategy, CTO Office, Gemalto
Many companies are making big investments in Cloud Foundry with providers such as Pivotal, IBM Bluemix, and GE Predix. The Cloud Foundry platform-as-a-service makes it easier for companies to build, test, and deploy applications more quickly – allowing them to focus on adding business value. This webinar will give an overview of how developers can build enhanced security into their applications using hardware security modules as the root of trust for their encryption and cryptographic operations.
RSA’s Data Protection Manager (DPM), BSAFE and tokenization products are quickly approaching EOL/EOPS, presenting RSA customers with an opportunity to reassess their encryption key management architecture and needs. With so many technologies available today that seemingly offer the same capabilities, how do you select the vendor and solution that is right for you?
Join Stephen Kingston, Product Manager for SafeNet KeySecure, Gemalto, where you will learn how you can:
• Benefit from proven, successful RSA to Gemalto migration use cases, including Healthcare, PII Protection and Retail PoS applications
• Easily migrate with the same one-to-one functionality offered by SafeNet KeySecure and SafeNet Data Protection Connectors
• Avoid encryption silos with a centralized key manager whether on-premises, virtual, or in the cloud
• Painlessly expand your encryption solution as your future needs grow, be it files, databases, applications, or tokenization
• Quickly get started with our 5 easy migration steps
Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker
Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
•If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
•Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto
Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
In this interactive webinar we will also discuss:
- Why your data is wanted
- The new data Protection paradigm
- Live Hacking demo
- What’s next and what to do now to remain on the safe side
Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
Organizations today need to employ cloud services in their day-to-day operations, but determining where to start and what works best is not an easy task. To build a hybrid-cloud platform, one must take into consideration a variety of factors including security, location, application requirements, and costs. Join us on April 21st to gain expert advice to help determine what mix of private and public clouds is right for you.
Stephen Helm, Sr Product Marketing Manager - Gemalto
Code signing protects the Devices we use every day; in devices you expect as well as ones you may not have thought about. Code signing is used heavily in transportation; cars, planes, busses, tractors, etc all leverage code signing on various parts to ensure from the manufacturer that they are all up to spec, safe and have a valid origin.
As the Internet of Things expands so does the need for trust that the code comes from the correct source. From Fridges to Bridges, Satellites to street lights, code signing is everywhere. Unfortunately, our adversaries have started to recognize value of stealing the sensitive cryptographic keys that underpin the code signing process.
Join Gemalto on this webinar to learn:
•The value of code signing in IoT
•How hackers are increasingly trying to steal signing keys
•Methods for high-assurance code signing
The breach is going to happen and when it does, you better make sure you are prepared. When your mission-critical applications such as industrial control systems are hacked, it’s not only about data being exposed. By injecting data into the system, the hacker can override the entire system and even shut it down. Join us on April 12th at 10am EST to learn how to prevent this happening through a layered security approach that includes encrypting your data in motion and at rest, and the cryptographic keys that secure it, while ensuring only authorized personnel can access the systems.
Adrian Davis, Managing Director (ISC)² EMEA; Joe Pindar, Director of Strategy in CTO Office, Gemalto
The Safe Harbor agreement allowed American and European countries to share personal data. This agreement is now invalid and a new one has taken its place. This not only impacts the ways companies conduct business and make their IT decisions, but also how they set up their data protection infrastructures.
This webinar will present:
• New proposed regulations
• Business implications
• A solution to stay compliant and avoid penalties
Join (ISC)² and Gemalto in this webinar to find out what you should know about the Safe Harbour agreement, how its invalidation impacts you and how to be compliant with the new EU regulation framework.
Konstantin Rabin (Kontomatik), Paul Hampton (Gemalto), Rashee Pandey (Bankable), Anders La Cour (Saxo Payments)
Moderator Konstantin Rabin will provide general numbers on the payment industry, will take a look into start-up fundings and some examples of innovative companies in the payments industry.
Then, he will ask the esteemed panel of experts the following questions:
1) What are the main drawbacks of the current payment options?
2) What should be the primary focus of the innovation in payments and why? (speed, cost reduction, transparency or anything else)
3) Name a greatest innovation in payments happened till date
4) Importance of cryptocurrencies in the realm of payments
5) How do millennials change the way payments are going to develop?
6) What are the main obstacles that prevent innovation in payments? (regulation, lack of funding, absence of common technology or anything else )
7) What is more important to innovate, online or offline payment systems?
8) What is the most crucial part of the Payment Service Directive 2? (or perhaps any other local directive)
9) How large will be a share of businesses using alternative payments in 3 years from now?
10) How would just a regular payment look in 2026?
The evolution of banking systems has led to a surge in digital banking and has drastically changed the security regulatory landscape. Banks are now required to understand and comply with a slew of new regulations which are affecting all areas of banking but specifically security, risk management, how to authenticate users and protect data and services. During this webinar, we’ll review the latest trends in EU regulations, the implications they have for banks and discuss best practices on how banks can effectively and efficiently comply with evolving requirements.
As the switch to the cloud blurs the boundaries of the traditional enterprise security perimeter, organizations are challenged with maintaining visibility into access events and enforcing consistent access controls across their data estate, which spans on-premises, virtualized and cloud-based applications. Applying uniform authentication policies on different types of applications may often require diverse integration methods, such as the RADIUS and SAML 2.0 industry standards, as well as custom agents or APIs. In this webinar, you will learn how Office 365, AWS Workspaces and SFDC—as well as other SaaS applications—can be easily secured using SafeNet Authentication Service.
Growing concern over climate change, increasing utility prices and the availability of sustainable energy like solar are driving increased demand for conservation, pricing transparency and cost savings. Smart energy solutions provide real time visibility into consumption and billing data helping consumers to conserve resources, while energy and utility companies are better able to balance production to meet actual demand reducing brown outs and other potential issues. At a time when energy utilities play an increasingly important part of our everyday lives, smart grid technologies introduce new security challenges that must be addressed.
In this webinar we will discuss:
•The threat landscape
•Addressing security challenges in critical infrastructure with cryptography and strong authentication
•Compliance with NERC CIP Version 5
•The road ahead
Gemalto surveyed 900 IT decision makers from around the globe on the subject of securing user mobility. Our findings reveal that although most organizations (97%) recognize the importance of mobility in their work practices, 92% still restrict access to resources from mobile devices. Not only were mobile access challenges uncovered, but with 20% of support tickets resulting from lost or forgotten passwords, identity management hurdles were uncovered, as well. Based on the Gemalto 2015 Authentication and Identity Management Index survey results, this webinar covers obstacles encountered by IT leaders in their quest for greater mobility, and four takeaways on how they are overcome.
Il Garante per la protezione dati personali ha adottato a Luglio 2015 le nuove Linee Guida sul Dossier Sanitario, che includono anche nuove prescrizioni subito attuative, indirizzate a tutte le strutture sanitarie in materia di protezione dei dati
Che cos’è il dossier Sanitario? È l’inevitabile strumento di gestione elettronica utilizzato da ospedali, aziende sanitarie, case di cura sia pubbliche che private, riguardo le informazioni sulla salute di un paziente per documentarne la storia clinica ed offrirgli un migliore processo di cura presso una singola struttura sanitaria, da non confondere con il Fascicolo Sanitario Elettronico, la cui gestione è obbligo di legge per le Regioni e le Province Autonome, per gli scopi istituzionalmente definiti in ambito Servizio Sanitario nazionale/regionale
Il webinar organizzato da Gemalto fa il punto della situazione sulle misure di sicurezza previste per il Dossier Sanitario, le nuove prescrizioni in materia di Data Breach e di diritto del paziente di conoscere gli accessi che sono stati eseguiti sul proprio dossier e relativi impatti in termini di misure tecniche/organizzative, il tutto in ottica di confronto con quanto previsto dalla legge vigente per il Fascicolo Sanitario Elettronico
Sichere Anmeldung ist elementarer Bestandteil der IT-Sicherheit, gleichzeitig sind Passwörter unsicher und aufwändig zu managen. Security-Verantwortliche sind daher auf der Suche nach moderner starker Authentifizierung, welche sich kostengünstig, unkompliziert und ohne großen Aufwand in die bestehende IT-Landschaft integriert.
Armin Simon zeigt Ihnen in diesem Webinar, wie Sie als Security-Verantwortlicher starke Authentifizierung mit Certificate Based Authentication (CBA) oder One Time Passwörtern (OTP) in Ihrem Unternehmen auf ein solides Fundament stellen.
Gorav Arora – Director of Technology, Data Protection - Gemalto
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 10th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
Adrian Davis, Managing Director, (ISC)² EMEA; Joseph Pindar, Senior Product Manager, Gemalto
The Internet of Things (IoT) promises to deliver better user experiences and increased efficiencies for business. But get the security wrong, and you will have a global recall on your hands with a large fine attached. Join (ISC)² and Gemalto-Safenet on November 3rd to learn how the Internet of Things will play a role in your future and what changes will be happening in security.
Employees are increasingly working out of the office. More and more of them are using mobile devices and logging in to cloud applications to perform business tasks. All this is creating a shift in habits termed ‘Enterprise Mobility’. Industry advancements in authentication and access management present new opportunities for organisations to increase their mobility posture.
Join (ISC)² and Gemalto in this webinar to find out how you can take advantage of a few guidelines to provide your employees with convenient, secure and compliant mobility.