Meeting the Ongoing Challenge of Identity and Access Compliance
As new regulations (HITECH) arise, and existing ones introduce more stringent requirements (HIPAA, PCI), compliance remains an ongoing challenge for many organizations. Because manual compliance controls introduce expense and increase risk, Identity and Access Management (IAM) provides an excellent foundation on which to implement automated controls for continuous compliance. This webcast will provide a maturity model for compliance controls, and highlight critical capabilities for identity-related compliance in enterprise and cloud environments.
Join us on October 2nd to learn how RingCentral’s enterprise-grade communications platform can give you the agility you need to grow your business without the capital expense needed for pbx-based communications.
Our sales engineer will demonstrate how RingCentral Office lets you initiate PSTN calls and SMS, host meetings and video conferences, view screen pops with relevant information, and more, from one cloud-based unified communications platform.
•How easy it is to add and configure users
•Basic operation like making calls, looking up contacts, and more
•How integrations with business apps drive productivity
Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.
With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?
Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.
IT security risks are changing, and undoubtingly increasing in complexity and frequency. Enterprises across the globe are struggling to not only keep up, but to maintain a secure network environment. From a recent breach by hackers to gain sensitive information of more than 100,000 taxpayers, to the breach of 110 million consumer records, the cyber threat landscape is getting worse every year. Hackers are faster, and organizations are taking longer to discover the breaches, giving thieves hours, days, and even weeks to explore the most private and sensitive company data.
Gemalto has identified key steps to help secure your enterprise network, certainly one of the first areas fraudsters attempt to infiltrate.
Join us on September 28th for an informative presentation that will help you plan a strategy to protect your most critical assets.
VMware Horizon View allows IT organizations to deliver virtual or hosted desktops and applications through a single platform to users. The success of these virtual desktop deployments is linked to the user experience: virtual desktops have to deliver better performance than physical desktops.
The heterogeneous, multi-tier, inter-dependent nature of the underlying infrastructure makes performance monitoring, diagnosis and reporting a challenge. When users complain that “the virtual desktop or application is slow”, IT administrators often struggle to determine the actual cause of the problem. Is it the network, database, application, virtualization platform, connection server, storage or the virtual desktop?
This webinar will help you learn how to unlock the benefits of desktop and application virtualization by enabling your organization to monitor, diagnose and report on the performance of your VMware Horizon View infrastructure.
Robots and drones have captivated us for more than half a century. When you think about a robot, you might automatically think about Rosie from the Jetsons. However, the next revolution of robotics will be very different than what you think. Robotics will enhance everyday life by enabling a broad range of applications from smart home to healthcare and transportation.
Why now? Historically, robots have been pre-programmed to complete tasks in industrial settings, but thanks to the same technology powering our smart phones, robots are poised to evolve into intelligent, intuitive machines capable of processing their environments quickly and efficiently - both on the ground and in the air. Robots will be seamlessly integrated with everyday life, handling tasks once too time-consuming or tedious for us.
In this webinar, we'll discuss:
*The key consumer and commercial applications of robots and drones
*The role robots will play in societies and economies
*How smartphone technologies will pave the way to robotics' future
* How cognitive technologies will transform our lives and business
* How Qualcomm is fostering innovation and helping the ecosystem
* The foundation of many IoT applications in shaping the way to robotics
Jim McGregor, Principal Analyst, Tirias Research
Andra Keay, Managing Director of Silicon Valley Robotics
Anthony Lewis, Senior Director of Technology, Qualcomm
Maged Zaki, Director of Technical Marketing, Qualcomm Technologies, Inc.
There are many ways in which people approach adding real-time communications with WebRTC to their service. While the dominant approaches are probably self development and using a WebRTC PaaS vendor, there’s a wider range of approaches.
In this session, Tsahi Levent-Levi, consultant and analyst of everything WebRTC, will go over the various approaches, revealing their advantages along with real vendor use cases.
We've all heard how DevOps can greatly accelerate velocity and efficiency. The challenge is how to transform an enterprise which was not born with the cloud, with established processes and systems. Join us on this webinar and hear how HP IT is making the move from:
• organizational silos to integrated teams and continuous delivery pipelines
• physical systems and storage to cloud infrastructure and Docker containers
• templates and forms to infrastructure-as-code
• change requests to change records
IDC Announces the Best Vendors for Client Computing Software
In the multi-device workplace, there are many vendors IT can choose from to better manage applications and desktops. So, which vendors offer the best client computing solutions with a commitment to long-term end-user computing innovation?
Find out how a variety of vendors compare and the reasons why VMware has moved into the Leaders category in the IDC MarketScape: Worldwide Virtual Client Computing Software 2015 Vendor Assessment.
Join us and learn:
Which vendors are well aligned when it comes to customer needs
Which vendors offer the best client computing solutions with a commitment to long-term end-user computing innovation?
Which vendors have the commitment to providing resources and continued expansion of the EUC infrastructure
Are you communicating with your customers the same way you did 5 years ago? As technology evolves, so do your customers’ communication preferences. The customer service industry has seen a significant increase in SMS (aka texting) due to its ability to deliver convenient, proactive service for today’s on-the-go customer. Register for our webinar to learn how SMS technology can help you lower wait times and keep your customers informed.
In this webinar you’ll learn how SMS can:
- Reduce wait times and lower call volumes
- Help you stay proactive with your customers
- Mitigate risks for your business or customers
- Pair well with other communications solutions
Getting more from your UC investment:
Using Cisco APIs and SDKs to extend Cisco functionality directly to your users
Cisco provides APIs and SDKs which allow users to integrate their existing or new products on top of Cisco's UC platforms. Most customers don't realize these features are available to them out-of-the-box with their Cisco products.
Join us for a discussion and demonstration of how some of these APIs and SDKs, including the Jabber SDK, AXL API and other UC specific integrations that Cisco packages with their popular UC products.
In 2014, Hogan-De Paul joined the ranks at NYC-based Akkadian Labs as an experienced software engineer, specializing in custom Cisco Collaboration software with the company. His day to day role consists of gathering customer requirements, designing, testing, and implementing custom software solutions on top of Cisco VoIP platforms. Previously, Peter has also worked on configuring Cisco device firmware and technical marketing for VoIP based services. Peter graduated in 2013 from the New Jersey Institute of Technology with a degree in Software Engineering, with previous education credits from Rensselaer Polytechnic Institute and Stevens Institute of Technology.
John Hawley, VP, Security Strategy, CA Technologies; Brandon Dunlap, Brightfly
The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2015 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Michelle Waugh, VP, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Each year, security experts at CA Technologies offer predictions about some of the most compelling trends in the identity & access management market. In this webcast, we will bravely review our predictions from 2015, and rate ourselves on how we did. But, more importantly, we will fearlessly offer predictions about the world of identities for 2016, and offer specific guidance for what organizations can be doing now to prepare for these changes. On January 7, 2016 at 1:00PM Eastern, we focus on the future to see what might be coming down the road.
Hadeel Dabbagh, Director, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
The broad range of modern business SaaS apps available today enable employees to be more productive and collaborative than ever before, while allowing them to work anytime, anywhere and on the devices of their choice. However, the proliferation of SaaS apps and a “bring your own app” trend in the workplace has introduced risks and challenges when it comes to securing and managing access to apps across organizational silos. Join CA Technologies and (ISC)2 on December 10, 2015 at 1:00PM Eastern as we dive into the security, agility and user experience challenges associated with the rise of SaaS adoption, and how leveraging identity-centric security can help you unlock the potential of your organization’s SaaS investments.
Sumner Blount, Director, Security Solutions, CA Technologies; Brandon Dunlap; Brightfly
Over a billion records were breached last year in online cyber-attacks. Even though the details of these breaches may differ, they often have the same root cause – inadequate control of privileged user accounts and their actions in increasingly complex hybrid environments. On November 12, 2015 at 1:00PM Eastern, join CA Technologies and (ISC)2 as we examine some of the most notorious breaches and the steps that attackers took to take control of these accounts. You will also learn how Privileged Identity Management (PIM) can help prevent successful attacks and protect critical corporate and customer information.
Carol Alexander, Sr. Director, and Marty Yam, Sr. Advisor, Authentication Solutions, CA Technologies; Brandon Dunlap
Traditional authentication and authorization defenses against fraudulent access attempts have only slowed down cybercriminals and have made gaining access more difficult for legitimate users. Multi-factor authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session? Join CA Technologies and (ISC)2 on October 15, 2015 at 1:00PM Eastern to learn best practices for reducing your risk of data breaches caused by fraudulent access. During this session, we will explore how user behavioral profiling can enhance authentication security and how risk-aware session management can help prevent session hijacking.
Michelle Waugh, VP Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Rarely has the landscape of security changed as dramatically as in the past year. Applications are now rightfully driving security strategy across organizations of all sizes. Attacks against your critical systems and information are more insidious than ever before. Your customers are demanding access from a variety of devices, across access channels, along with a consistent, intuitive, and convenient user experience. If that wasn't enough, you need to engage with your developer communities to help build those complementary solutions that you need to grow your business. Join CA Technologies for this first part of a six-part webcast series on September 17, 2015 at 1:00PM Eastern to learn how security leaders can rise to the top of the pack by leveraging these new realities, and grow their business through an innovative security vision and strategy.
Carol Alexander, Senior Director of Product Marketing & Charley Chell, Product Manager for CA Technologies
We live in a world where everything is driven by applications, connectivity, and mobility. Your customers are now far more likely to interact with your enterprise through software than a live person, and employees are conducting more business on mobile devices than traditional laptops and workstations. A critical success factor for thriving in this new reality is the ability for the enterprise to accurately identify users in a way that is both convenient to them and cost effective, while also protecting their identities and data from potential fraudsters.
Join this webcast where Carol Alexander, Head of Authentication Solutions, and Charley Chell, Security Advisor, from CA Technologies will discuss how you can transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction. Learn the key factors and considerations in using contextual authentication within your mobile applications to protect against inappropriate access and data breaches.
John Hawley; VP of Security Strategy at CA Technologies & Hila Gvir; Senior Principal Product Manager at CA Technologies
A successful Consumer-Scale Identity Management Deployment is far more than just adding more users. The user experience becomes critical in the success of the deployment as a new type of user begins to interact directly with the identity infrastructure. This webcast will show how to sell these projects to the business and how to create a user experience that will help ensure its success.
John Hawley, Vice President of Security Strategy at CA Technologies
Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.
As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
Ed Moyle, Director, Emerging Business and Technology Trends, Research/Standards & Academic, ISACA
There’s no doubt about it, smart devices are proliferating – and as they do, security pros have their work cut out for them. Not only are consumer devices on the rise that have embedded networking and computing technology (e.g. televisions and household appliances), but we’re also seeing integration in other areas as well: everything from automobiles to thermostats to smoke detectors now might ship with networking capability built in.
For security practitioners in enterprise, this can have serious ramifications: not only do they potentially require traditional “security hygiene” activities (e.g. patching and monitoring), but they can also introduce other complexities as well. For example in situations where they might find their way into regulatory-governed environments (e.g. the PCI cardholder data environment) or when adoption happens without involvement from IT.
This round table session will discuss how enterprises can approach securing the Internet of Things in their environments and how they can adjust their security programs to ensure that the environment stays protected going forward.
Scott Morrison, Senior Vice President and a Distinguished Engineer at CA Technologies
Chris Poulin, Research Strategist, X-Force at IBM
Gunnar Petersen, Founder/Principle Arctec Group & Visiting Scientist @ Carnegie Mellon
Russell Miller, Director, Security Solutions & Carol Alexander, Head of Product Marketing for Authenticat
Strong authentication and Single Sign-On can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session?
Please join Carol Alexander, Director, Authentication Solutions and Russ Miller, Director, Security Solutions to learn how Intelligent Authentication and Single Sign-On including Risk-Aware Session Management can help improve session security.
Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies
Access Management has grown consistently more challenging as your business requires secure engagement with new user groups and additional partners via mobile, cloud and social channels. In order to securely enable such a multi-channel, open enterprise you must:
• Facilitate secure federation with a large number of partners
• Enable the use of social identities
• Securely connect to Cloud-based services
• Extend access and security to mobile applications and devices
• Protect against existing and evolving threats
Please join Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies, to learn how the latest Access Management capabilities can help you meet these rapidly evolving requirements and deliver secure applications on a timely basis.
Charley Chell, Sr. Director, Security Solutions at CA Technologies
Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.
Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
John E. Hawley, Jr., VP, Strategy for Security Solutions; CA Technologies; Brandon Dunlap
The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Russell Miller, Director, Security Solutions, CA Technologies
Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.
Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
Andrew Kellett, Principal Analyst at Ovum & Sumner Blount, Director, Security Solutions for CA Technologies
In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).
Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc., Sumner Blount, Director, CA Technologies
In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.
On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
Michelle Waugh, VP Security Solutions, CA Technologies
Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
Francois Lascelles, Chief Architect, CA Technologies
APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
Jamie Brown, Director of Global Government Relations & Sumner Blount, Director of Security Solutions, CA Technologies
Is your organization worried about joining the ranks of other companies that have suffered breaches recently? Are you concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks?
The NIST Framework for Improving Cybersecurity defines guidelines and best practices for improving cybersecurity across several major areas. But, how do you take this complex framework and use it in your own environment, and what technologies can help you with adherence to it?
In this webcast, Sumner Blount and Jamie Brown from CA Technologies will explore the Framework to help you develop a plan for improving cybersecurity in your own environment. We will focus on the Protect function because of its critical importance for protecting assets from improper access and use. Join us to learn how you can leverage identity management and the NIST guidelines to help your organization avoid the impact of a public breach.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.