Browse communities
Browse communities
Presenting a webinar?

O crescimento da Criptografia na Protecao de Dados

Paulo Veloso
Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tornado questões estratégicas de negócios para abordar os regulamentos de segurança e gerenciar os riscos
Jun 27 2012
28 mins
O crescimento da Criptografia na Protecao de Dados
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Applications that go bump in the night Recorded: Mar 12 2015 52 mins
    Richard Moulds, VP of Strategy at Thales e-Security, and Derek Brink, Vice President- Information Technology, Aberdeen Group
    The rise of malware and malicious insiders brings application security into clear focus. Well written software, security testing and code obfuscation mitigate risk but the most critical applications in the most risky locations need to go one step further to become tamper resistant. Trusted applications that handle sensitive data, control valuable IP and perform critical processes can be isolated and protected within secure execution environments. Mobile phones, embedded devices and data center servers all adopt physical hardening to secure the applications they host. This webinar focuses on protecting business applications that support high-tech manufacturing, content distribution, online authentication – in fact any situation where you need to know for sure that your application is doing precisely what the developer intended – nothing more, nothing less.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Nov 20 2014 39 mins
    John Grimm, Sr Director Product Marketing, Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we saw with the Heartbleed OpenSSL vulnerability and more recently with POODLE, encryption is no silver bullet and can’t be taken for granted. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, November 20th, to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • High Assurance Security for Mission Critical Applications Recorded: Oct 22 2014 61 mins
    Chris Glidden, SE Federal Thales - Bob Smith, SE Manager F5 Networks- Brian Jones, VP Federal & Mid Atlantic FishNet Security
    Downtime of critical networked applications can cost your company lost revenue opportunities in the short term, as well as long term negative impact on your brand. Attacks can interrupt the availability of critical applications or compromise sensitive data traversing your network.
    Securing critical applications to ensure availability is imperative.
    Integrating hardware security modules (HSMs) with intelligent network managers allows you to trust that data traveling across your network is encrypted and secure from unauthorized users.
    Join F5 Networks, Thales e-Security and FishNet for a free webcast to learn how to optimize and secure the delivery of critical applications. You’ll learn how F5’s BIG-IP System integrated with Thales’s nShield HSM can:
    •Deliver high performance processing
    •Provide robust security
    •Meet regulatory compliance standards
    •Secure data while improving data center performance
  • Host Card Emulation (HCE): How to take direct control of mobile payments” Recorded: Oct 22 2014 61 mins
    David Worthington, Principle Consultant Payment at Bell ID, Ian Hermon, Product Marketing Manager Payments, Thales e-Security
    This webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved.
  • Protecting Your Sensitive Data Does Not Have to Impact Business Operations Recorded: Sep 17 2014 61 mins
    Juan Asenjo, Senior Product Marketing Manager, Thales e-Security, Mark Bower, VP Product Management , Voltage Security
    Highly publicized software attacks and data breaches, combined with strict regulatory requirements, reinforce the ongoing risks associated with cardholder data at all points in the payment stream. The risks to data are everywhere, and your organization is ultimately responsible for the security of customers’ personally identifiable information (PII). This means you must protected PII not only during transaction processing, but also through business processes such as charge-backs, loyalty or repeat payments, storage and analytics – including outsourced environments.
    Voltage SecureData™ enables you to ensure sensitive data is de-identified while maintaining logical and referential integrity so it can remain in a protected state while still usable for critical business processes. Integration of Voltage SecureData with Thales nShield® hardware security modules (HSMs) provides enhanced safekeeping and management of critical cryptographic keys that underpin the security of the process. Enforced protection of sensitive data using policy driven data security enables you to protect PII across your entire workflow without disrupting operations and ensuring you can adhere to privacy regulations.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • Host Card Emulation (HCE): How to take direct control of mobile payments Recorded: Sep 16 2014 60 mins
    Ian Hermon, Product Marketing Manager - Thales e-Security, David Worthington, Principal Consultant - Bell ID
    For the past few years the desire by issuers to launch contactless mobile payment solutions has been hampered for a number of reasons – third party ownership of the secure element, need for new complex business relationships/contracts and availability of compatible mobile phones top the list of potential barriers. The incremental cost to support secure elements as well as companion credit/debit cards made the business case questionable for issuers.

    A recent update to the Android operating system has changed things forever – no longer does an issuer need a secure element in the mobile phone or a third party to provision the application to offer a secure mobile payment solution compatible with all NFC contactless point-of-sale (POS) terminals. A technology known as host card emulation (HCE) enables issuers to take direct control and fast track time to market.

    A webinar from David Worthington (Principle Consultant Payment & Chip Technology at Bell ID) and Ian Hermon (Product Marketing Manager Payments Security at Thales e-Security) will explain more about the HCE payment solutions from personal experience and how issuers can get involved, including:
    •An HCE technology overview
    •How the payments are secured
    •Benefits achieved by early adopters
    •Insight into how HCE is likely to evolve

    Please register using the appropriate button below for the time slot suitable to you on Tuesday 16th September 2014. We look forward to your participation and questions.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Aug 21 2014 39 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Jul 17 2014 35 mins
    John Grimm, Senior Director of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating exploits, surveillance, data breaches, insider threats, and more. But as we have seen recently with the Heartbleed OpenSSL bug, encryption is no silver bullet. The quality of its implementation is the major determining factor in the protection it actually provides and mitigating the costs of remediation.

    Join us on Thursday, July 17 to learn about:

    Five ways you can measure the quality, or trust level, your crypto systems provide
    Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jul 3 2014 46 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 61 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • Upgrading and Improving the Trust of Microsoft Windows Certificate Authorities Recorded: Jun 26 2014 60 mins
    Mark Cooper, President of PKI Solutions and Peter DiToro, Vice President Services at Thales e-Security
    Many public key infrastructures (PKIs) in use today are built on Microsoft Active Directory Certificate Services (AD CS), including a large percentage that are based on the Windows Server 2003 operating system. Given the end of service for that operating system in 2015, the significantly increased demands placed on legacy PKIs by today’s applications, and the need to support newer cryptographic algorithms, many organizations have determined that the risk of “no action” is simply too high. This webinar will highlight what you need to know to assess the security of your PKI, and to maintain or migrate your PKI to ensure continued trust. The webinar will also highlight the security and compliance benefits gained by integrating hardware security modules (HSMs) and outline the steps you need to take to incorporate them to protect the most vulnerable root and Certificate Authority (CA) keys in your infrastructure.
  • 5 Ways to Measure the Quality of Your Crypto Recorded: May 22 2014 36 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Future Proof Your Network: EMV, Mobile and the Cloud are Here Recorded: Apr 30 2014 60 mins
    David Worthington, Principal Consultant at Bell ID, Ian Hermon, Product Mktg Manager Thales
    The EMV liability shift is fast approaching in the United States. Along with the emerging trend towards innovative mobile payment solutions, this means that core infrastructures need to be enhanced to support new payment methods and channels – often with additional security, risk and lifecycle requirements. Now is the time for financial issuers to develop a future payments strategy that will enable you to migrate efficiently and quickly to EMV chip based technology, and adapt to stay competitive in this period of high disruption.
    Attendees will learn:
    •Facts vs. myths about EMV and how it reduces fraud
    •How the top 5 short-term challenges of EMV migration can be solved
    •The versatility of EMV and real-world examples of how it facilitates so much more than fraud reduction
    •EMV uses beyond cards – mobile (NFC) payments & host card emulation (HCE)
    •Examples of Bell ID and Thales e-Security deployments for EMV card and mobile payments
  • 5 Ways to Measure the Quality of Your Crypto Recorded: Apr 24 2014 32 mins
    John Grimm, Senior DIrector of Product Marketing at Thales e-Security
    Encryption, and cryptography in general, has been thrust into the spotlight as a critical technology for combating surveillance, data breaches, insider threats, and more. But encryption is no silver bullet, and the quality of its implementation is the major determining factor in the protection it actually provides. Join us on Thursday April 24 to learn about:
    •Five ways you can measure the quality, or trust level, your crypto systems provide
    •Effective strategies for dealing with the key management pain many organizations are starting to feel as they increase their deployment of cryptography
    •Use cases for strong cryptography and trusted key management with hardware security modules (HSMs)
  • Persistent Information Protection, Deploying Microsoft RMS with Thales HSMs Recorded: Feb 12 2014 87 mins
    Microsoft, Synergy and Thales
    Want to have a deeper understanding of how to deploy Microsoft Rights Management Services (RMS) with the added capability of generating and controlling your own key that secure your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how to deploy Microsoft RMS with the unique bring your own key (BYOK) capability across multiple operational scenarios including:

    • Subscription-based service in Azure
    • On-premises in Windows Server
    • Cross-premises in mixed environments

    You will also learn how to take advantage of the BYOK offering to secure your RMS private key within a Thales hardware security module (HSM) to maintain control of the critical keys securing your most sensitive data and intellectual property.
  • Persistent Information Protection, Extending the Use of HSM Within Microsoft RMS Recorded: Feb 11 2014 58 mins
    Microsoft, Synergy Advisors, Thales
    Want to take advantage of the cloud for collaboration but feel you will lose control of your sensitive data? Join us for a joint webinar with Microsoft, Synergy Advisors, and Thales to learn how you can deploy a unique solution that enforces strict security policies on your data assets and achieves persistent information protection. Learn how to:

    • Deploy new features and capabilities of Microsoft Rights Management Services (RMS)
    • Protect your sensitive files in any format and in any device, including iOS and Android
    • Share protected information with anyone, inside and outside your own organization

    You will also learn how the unique bring your own key (BYOK) capability enables you to generate and safeguard your own RMS private key within a Thales hardware security module (HSM), ensuring you that Microsoft operators cannot see or leak the keys during import or use.
  • Identity as a Service – Strong Enough for Government? Recorded: Nov 13 2013 59 mins
    Richard Moulds, Thales e-Security, and Daniel Turissini, ORC Inc.
    For many companies thinking about moving sensitive data to the cloud, security issues remain a significant concern. But Operational Research Consultants Inc. (ORC) and Thales e-Security are proving that the cloud really can be made as safe or even safer than on-premise deployments even for organizations as security-focused as the U.S. Federal Government.
    Join Daniel Turissini, CTO, WidePoint Corp. and Founder of ORC, Inc., a WidePoint company, and Richard Moulds, VP Product Marketing & Strategy at Thales e-Security
  • The cryptographic landscape is shifting – how do you stay safe? Recorded: Oct 30 2013 59 mins
    Rich Mogull, Securosis, Jeff Cherrington, Prime Factors, Richard Moulds, Thales e-Security
    The recent Snowden disclosures regarding the NSA’s alleged activity, as well as its influence on NIST and other organizations, put existing industry standard cryptographic algorithms and key lengths under renewed scrutiny. Equally, academic analysis of the same algorithms may indicate their useful lifecycle to be shorter than previously predicted. This combination may precipitate the need for rapid shifts from outdated algorithms and key strengths, to different ones less susceptible to attack or collisions.

    In this webinar, analyst Securosis will discuss these important landscape changes and you’ll hear strategies for managing the cryptographic algorithm and key length elements necessary for data protection, separate from core application functions so that algorithms can be replaced quickly and administratively - without requiring changes to application code. You’ll leave knowing how Prime Factor’s EncryptRIGHT makes encryption easy and Thales HSMs make encryption even stronger!
  • Proteção de Dados: Como as Empresas Brasileiras utilizam a Criptografia Recorded: Oct 23 2013 61 mins
    Paulo Veloso,Thales e-Security Country Manager, Brazil
    Veja como as organizações brasileiras estão aumentando o uso da criptografia para atender aos novos regulamentos e aos ataques cibernéticos. Pesquisa multi-nacional da Thales conclui que a criptografia e o uso de chaves criptográficas tem se tornado questões estratégicas de negócios para abordar os regulamentos de segurança e gerenciar os riscos
Encryption and Key Management Solutions
Data protection and security solutions to help companies meet compliance and protect the security of your most sensitive data leveraging encryption and key management.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: O crescimento da Criptografia na Protecao de Dados
  • Live at: Jun 27 2012 1:00 pm
  • Presented by: Paulo Veloso
  • From:
Your email has been sent.
or close
You must be logged in to email this