Hi [[ session.user.profile.firstName ]]

HP Security - Data Security

  • Date
  • Rating
  • Views
  • Consumer-facing organizations of all types face increasing IT complexity and a future where more applications will have PANs, tokens, and payment tokens flowing in the system. Understanding tokenization is critical to the security of applications, and to having solid justification for reducing audit scope in a tokenized environment.

    With newer methods of tokenization such as Apple Pay gaining ground in the marketplace, there is a need to develop deeper technical and architectural understanding of the available methods of protecting PAN data, and how security tokenization fits from the perspective of the end-to-end architecture of payments ecosystems.

    In this session our experts will explain how the tokenization system is secured within the network and how it maps tokens into PANs. Attendees will learn:

    The latest on PCI 3.0 and updates related to SSL and TLS encryption protocols and vulnerabilities that can put payment data at risk,
    Security and PCI-related aspects of payment vs. security tokenization in user networks, and
    Gain a deeper understanding of standards and options for protecting PAN data in multi-platform enterprise environments.
  • Learn how to avoid data residency mistakes by applying data-centric security for global governance, risk and compliance.

    Data residency laws can place complicated requirements and constraints on the IT strategy - from preventing the adoption of distributed application architectures including cloud, to requiring expensive in-country data center operations with dedicated staff. US, EU cross border data laws, Offshore Banking rules, and federal mandates may also have conflicting data governance requirements leading to high compliance costs.

    However, businesses today operate across more geographic boundaries than ever before and as data travels globally, a company’s compliance, risk, and data governance obligations become exponentially more complex. In addition, data moving across public and private clouds increases breach risk and compliance regulators can stop projects in their tracks - sometimes with dramatic consequences.

    Join us for this live webcast where Mark Bower, VP product management, Voltage Security, will share effective strategies for protecting your data from threats while meeting privacy compliance regulations regardless of where your data is.

    -- Data residency risks and challenges, and using a data-centric security approach to overcome them

    -- How to embrace a complex regulatory environment without the cost and risk of a traditional in-country data center

    -- Best practices to govern data access across geographic compliance boundaries such as the US and Canada, and the US and the EU

    -- Use cases for financial entities operating offshore and private banking rules and regulations such as those in the EU, Singapore and Switzerland
  • Legacy approaches to securing email communications usually leave a lot to be desired or just plain don’t work, with usability being the number one barrier to adoption. They also require complex configuration files, key management, administration and provisioning – not to mention the multiple end-user steps to access encrypted emails and attachments. In many cases, inconsistent delivery methods even from a single solution results in clunky or unusable experience for mobile users.

    But what if your mobile users could send and read encrypted email on leading iOS, Android, and Blackberry devices using the native experience without the hassle of web browsers, managing certificates, or awkward proxy servers? What if you could manage granular email data protection policies across corporate and personal mobile devices, both inside and outside the enterprise, from a unified console?

    Join David Strom, expert on networking and communications technologies, and Mark Schweighardt, Director product management at Voltage Security, to learn:

    -The challenges posed by current mobile device security solutions for securing email communications on smartphones and tablets

    -How Voltage SecureMail Mobile Edition extends data-centric protection of emails seamlessly to and from desktops, applications, gateways, laptops, mobile devices, and cloud inboxes

    -How to read and send encrypted email via the Voltage SecureMail mobile apps, and the benefits to mobile users and IT security operations

    -How Voltage SecureMail Mobile Edition integrates with your existing compliance solutions such as DLP, archiving, and e-discovery, and with your existing email and IT infrastructure
  • Mobile devices such as smartphones and tablets have become mainstream business tools. Enterprises are accelerating their adoption of a Bring Your Own Device (BYOD) model to increase staff productivity and extend their relationships and brand to customers and partners through mobile channels, especially email. This presents major challenges to their existing security architecture and programs; every environment now features an unprecedented mix of operating systems, applications and practices
  • Every day, more and more sensitive business data and communication are being accessed by BYOD (Bring Your Own Device) and IT-provisioned smartphones, bringing huge implications to enterprise security and compliance efforts. It's not surprising that the top concern of today’s mobile enterprises is data security.

    Traditional, container-based approaches to securing data on smartphones have encountered limited success due to their complexity to use and deploy, which impacts user productivity. No amount of perimeter defense can completely protect data accessed by smartphones, as evidenced by the data breaches still happening today.

    Our guest speaker Bob Bragdon, Publisher, CSO Magazine and Mark Bower, VP Product Management, Voltage Security discuss a data-centric view for protecting valuable business data and talk about the top five strategies for mobile data security that can make or break your enterprise security strategy.
  • This webcast features Emily Mossburg, Principal, Deloitte & Touche LLP, who shares her personal experience in driving a data-centric security implementation at a Fortune 50, Top 10 bank.

    Topics include:
    - Conducting a broad evaluation of your data security options
    - Gauging capacity requirements
    - Ensuring that scalability is addressed in order to maximize your investment
    - Socializing the data security plan within your company
    - Leading your company through a successful data security implementation
  • Data privacy is typically driven by compliance mandates and while compliance does require security, it may not protect data as compliant data is breached every day.

    Join us for this free webcast to gain invaluable insights from cases studies including AIG Group, JPMorgan Chase and Heartland Payment Systems, among others.

    Learn how these companies are using a data-centric security strategy to:

    • Consolidate data protection into a single, scalable architecture platform
    • Simplify IT operations with stateless key management
    • Protect data - anywhere, all the time
    • Secure structured and unstructured data on any platform, anywhere
    from mainframe to mobile, in and out of the cloud

    Enterprise customer case studies will include:
    • Securing application data in the data center
    • Securing cross-border data for residency and privacy
    • Securing data in QA and pre-production environments
    • Securing data stored in public cloud services
    • Securing PCI and payments data
    • Securing document sharing between employees, partners and customers
  • As banking and financial institutions seek to benefit from tremendous cost savings possible with cloud infrastructure and services – two key factors must be considered – the Patriot Act which has strict stipulations regarding access to data and where it is stored and the protection of data even from third party service providers. This seminar will explore both these issues and by using some common examples such as BPOS, propose a framework for addressing both without impacting operational costs or adding large amounts of excess infrastructure.
  • Mainframes remain the core of business-critical operations in most of the world's largest and most successful enterprises, including those in banking, insurance, healthcare, and retail. But as IT management will attest, there can be issues with complexity when it comes to securing critical information on the mainframes running on z/OS. Implementing an encryption solution can be disruptive to business operations and require hundreds of lines of code to acquire and store keys and perform cryptographic operations. Adding to the complexity are the deep expertise and highly specialized knowledge needed to keep all the moving parts working. But it doesn’t have to be that way -- in this webcast we'll discuss proven strategies for easily implementing data security in the z/OS environment.
  • The fact is mainframe resources are now increasingly accessible from the Internet, and even when they aren't, internal threats, trusted partners, interaction with distributed machines, and outsourcing all represent risks that must be mitigated. Encryption can minimize the cost impact of data breaches because encrypted data is virtually useless to anyone. Learn the latest about securing mainframe information from Phil Smith, Mainframe Architect with Voltage Security who has 30+ years of mainframe experience.

Embed in website or blog