Hi [[ session.user.profile.firstName ]]

HPE Security - Data Security

  • Date
  • Rating
  • Views
  • The Secrets of Staying Ahead of the Bad Guys
    The Secrets of Staying Ahead of the Bad Guys Smrithi Konanur, Global Product Manager at HPE Security & Priyank Kumar, Sr. Product Management at HPE Security Recorded: Dec 6 2016 64 mins
    With continued improvements in payments security through technologies such as P2PE and EMV, the PCI community has been effective at combating crime in a wide variety of traditional retail environments. As the use of stolen or fraudulent cards for in-person transactions becomes more difficult, however, criminals are increasingly shifting their focus to online activities, and the rapidly growing mobile payment sector. To stay ahead of the bad guys, merchants need solutions that are designed to reliably protect payment data within their environment, and reduce PCI scope without impacting business processes.

    Join this webinar to learn why any business that wants to remove sensitive data from their databases should understand these strategies on how they can eliminate exposure to cardholder data, reduce risks and PCI audit costs. You will learn:

    •How the threat landscape is evolving
    •What the attackers are doing differently
    •How to stay ahead of cyber thieves, while neutralizing the risk of payment data breaches
    •What is necessary to secure all e-commerce and mobile transactions
    •How to enable innovation and business growth while maintaining strong data protection
  • Mind Your Business: Why Privacy Matters to the Successful Enterprise
    Mind Your Business: Why Privacy Matters to the Successful Enterprise Dr. Robin Bloor,The Bloor Group; Jay Irwin, Teradata Center; Carole Murphy, HPE Security - Data Security Recorded: Nov 17 2016 67 mins
    There's no such thing as bad publicity? In the era of data breaches, that's not really true. Time and again in recent years, the mighty have fallen. And as sensitive data reaches the hands of bad guys the world over, so go the fates of customers and companies alike. That's why security is the fastest growing sector of enterprise IT today, with privacy issues front and center.

    Register for this episode of The Briefing Room to hear veteran Analyst Dr. Robin Bloor explain why companies need to pay serious attention to the ever-growing importance of privacy, not just security. He'll be briefed by Jay Irwin of Teradata and Carole Murphy of HPE Security, who will demonstrate how their technologies can be combined to create a robust privacy infrastructure that allows organizations to avoid data breaches, or at least keep the data encrypted, thus avoiding the damage of a breach.
  • Integrate Data Security with Your Big Data Platform
    Integrate Data Security with Your Big Data Platform Reiner Kappenberger - HPE Data Security, Praveen Jain - HPE Big Data Protection Recorded: Jun 17 2016 49 mins
    Does your organization use the SQL on Hadoop capabilities provided by Vertica? Are you concerned about protecting PII/PHI data when it flows across your Hadoop and Vertica clusters? Are you looking for a security solution that will allow you to meet PCI and other industry compliance and data privacy regulations?

    You can take advantage of the recent integration of HPE Vertica and HPE SecureData. This integration allows you to keep your data protected when it flows across multiple systems spread across multiple data centers on premise or in the cloud.
  • Intruder Alert: The Promise and Threat of IoT
    Intruder Alert: The Promise and Threat of IoT Reiner Kappenberger, HPE Security - Data Security; Jay Irwin, Teradata; Robin Bloor, and Dez Blanchfield, The Bloor Group Recorded: Apr 20 2016 74 mins
    Register for this episode of The Briefing Room to hear veteran Analyst Dr. Robin Bloor and Dez Blanchfield discuss both the opportunities and the risks facing your enterprise and your customers in the immediate future. Joining the discussion will be Jay Irwin, Director Teradata InfoSec Center of Expertise, who speaks from deep experience with enterprise use cases and initiatives in Big Data and IoT. Reiner Kappenberger, Global Product Management, HPE Security - Data Security will share his perspectives on innovative new technologies that enable security at a data-centric level to mitigate risks even while enabling business agility and opportunity.
  • Understanding Security Tokenization and PCI Compliance
    Understanding Security Tokenization and PCI Compliance Terence Spies, Chief Technologist, HP Security Voltage Recorded: Oct 20 2015 64 mins
    Consumer-facing organizations of all types face increasing IT complexity and a future where more applications will have PANs, tokens, and payment tokens flowing in the system. Understanding tokenization is critical to the security of applications, and to having solid justification for reducing audit scope in a tokenized environment.

    With newer methods of tokenization such as Apple Pay gaining ground in the marketplace, there is a need to develop deeper technical and architectural understanding of the available methods of protecting PAN data, and how security tokenization fits from the perspective of the end-to-end architecture of payments ecosystems.

    In this session our experts will explain how the tokenization system is secured within the network and how it maps tokens into PANs. Attendees will learn:

    The latest on PCI 3.0 and updates related to SSL and TLS encryption protocols and vulnerabilities that can put payment data at risk,
    Security and PCI-related aspects of payment vs. security tokenization in user networks, and
    Gain a deeper understanding of standards and options for protecting PAN data in multi-platform enterprise environments.
  • Avoid data residency mistakes and reduce risk and compliance challenges
    Avoid data residency mistakes and reduce risk and compliance challenges Mark Bower, Voltage Security, VP product management Recorded: Aug 16 2012 61 mins
    Learn how to avoid data residency mistakes by applying data-centric security for global governance, risk and compliance.

    Data residency laws can place complicated requirements and constraints on the IT strategy - from preventing the adoption of distributed application architectures including cloud, to requiring expensive in-country data center operations with dedicated staff. US, EU cross border data laws, Offshore Banking rules, and federal mandates may also have conflicting data governance requirements leading to high compliance costs.

    However, businesses today operate across more geographic boundaries than ever before and as data travels globally, a company’s compliance, risk, and data governance obligations become exponentially more complex. In addition, data moving across public and private clouds increases breach risk and compliance regulators can stop projects in their tracks - sometimes with dramatic consequences.

    Join us for this live webcast where Mark Bower, VP product management, Voltage Security, will share effective strategies for protecting your data from threats while meeting privacy compliance regulations regardless of where your data is.

    -- Data residency risks and challenges, and using a data-centric security approach to overcome them

    -- How to embrace a complex regulatory environment without the cost and risk of a traditional in-country data center

    -- Best practices to govern data access across geographic compliance boundaries such as the US and Canada, and the US and the EU

    -- Use cases for financial entities operating offshore and private banking rules and regulations such as those in the EU, Singapore and Switzerland
  • Simplified email data security for mobile smartphones and tablets
    Simplified email data security for mobile smartphones and tablets David Strom, networking and communications expert & Mark Schweighardt, Director product management, Voltage Security Recorded: Jul 12 2012 60 mins
    Legacy approaches to securing email communications usually leave a lot to be desired or just plain don’t work, with usability being the number one barrier to adoption. They also require complex configuration files, key management, administration and provisioning – not to mention the multiple end-user steps to access encrypted emails and attachments. In many cases, inconsistent delivery methods even from a single solution results in clunky or unusable experience for mobile users.

    But what if your mobile users could send and read encrypted email on leading iOS, Android, and Blackberry devices using the native experience without the hassle of web browsers, managing certificates, or awkward proxy servers? What if you could manage granular email data protection policies across corporate and personal mobile devices, both inside and outside the enterprise, from a unified console?

    Join David Strom, expert on networking and communications technologies, and Mark Schweighardt, Director product management at Voltage Security, to learn:

    -The challenges posed by current mobile device security solutions for securing email communications on smartphones and tablets

    -How Voltage SecureMail Mobile Edition extends data-centric protection of emails seamlessly to and from desktops, applications, gateways, laptops, mobile devices, and cloud inboxes

    -How to read and send encrypted email via the Voltage SecureMail mobile apps, and the benefits to mobile users and IT security operations

    -How Voltage SecureMail Mobile Edition integrates with your existing compliance solutions such as DLP, archiving, and e-discovery, and with your existing email and IT infrastructure
  • A practical approach for a mobile data-centric security strategy
    A practical approach for a mobile data-centric security strategy Jamie Bass, Director - PwC Advisory Security practice and Terence Spies, CTO, Voltage Security Recorded: Jul 10 2012 60 mins
    Mobile devices such as smartphones and tablets have become mainstream business tools. Enterprises are accelerating their adoption of a Bring Your Own Device (BYOD) model to increase staff productivity and extend their relationships and brand to customers and partners through mobile channels, especially email. This presents major challenges to their existing security architecture and programs; every environment now features an unprecedented mix of operating systems, applications and practices
  • 5 Tips for Securing Data On Smartphones and Tablets
    5 Tips for Securing Data On Smartphones and Tablets Bob Bragdon, Publisher, CSO Magazine and Mark Bower, VP Product Management, Voltage Security Recorded: Jun 13 2012 57 mins
    Every day, more and more sensitive business data and communication are being accessed by BYOD (Bring Your Own Device) and IT-provisioned smartphones, bringing huge implications to enterprise security and compliance efforts. It's not surprising that the top concern of today’s mobile enterprises is data security.

    Traditional, container-based approaches to securing data on smartphones have encountered limited success due to their complexity to use and deploy, which impacts user productivity. No amount of perimeter defense can completely protect data accessed by smartphones, as evidenced by the data breaches still happening today.

    Our guest speaker Bob Bragdon, Publisher, CSO Magazine and Mark Bower, VP Product Management, Voltage Security discuss a data-centric view for protecting valuable business data and talk about the top five strategies for mobile data security that can make or break your enterprise security strategy.
  • Reducing PCI scope and cyber risk - at the same time
    Reducing PCI scope and cyber risk - at the same time Emily Mossburg, Principal, Deloitte & Touche LLP Recorded: Apr 19 2012 59 mins
    This webcast features Emily Mossburg, Principal, Deloitte & Touche LLP, who shares her personal experience in driving a data-centric security implementation at a Fortune 50, Top 10 bank.

    Topics include:
    - Conducting a broad evaluation of your data security options
    - Gauging capacity requirements
    - Ensuring that scalability is addressed in order to maximize your investment
    - Socializing the data security plan within your company
    - Leading your company through a successful data security implementation

Embed in website or blog