Meeting the Ongoing Challenge of Identity and Access Compliance
As new regulations (HITECH) arise, and existing ones introduce more stringent requirements (HIPAA, PCI), compliance remains an ongoing challenge for many organizations. Because manual compliance controls introduce expense and increase risk, Identity and Access Management (IAM) provides an excellent foundation on which to implement automated controls for continuous compliance. This webcast will provide a maturity model for compliance controls, and highlight critical capabilities for identity-related compliance in enterprise and cloud environments.
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 25th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.
Productivity matters to everyone, but the pressure’s really on if you carry a quarterly sales quota. This demo shows new, more efficient ways to communicate with enterprise-class cloud communications integrated into Salesforce and Desk.
Learn how users can initiate PSTN calls and SMS, host meetings and video conferences, view screen pops with relevant information, and more, without leaving Salesforce or Desk.
Our Sales Engineer will demo this integrated communications solution from RingCentral that is simple for end-users to adopt and use, and for IT to deploy and manage. See how to:
- Make and receive calls through the RingCentral phone system
- See business SMS messages as conversations
- Schedule Meetings & Conferences from Your Calendar
- View your complete communications history, including Calls, SMS messages, Faxes, Voicemail
Join us for our webinar to learn the insights into effective McAfee Email Security migration and improving protection effectiveness.
Email-based attacks have become more targeted—and harder to detect with conventional tools. That’s why today’s email security does so much more than filter spam and bulk email. Modern businesses need a solution that helps them stop threats, protect information, and respond to security events quickly and effectively. As Intel Security retires its email products, Proofpoint Enterprise Protection can help keep your organization secure.
Join us for a live discussion on November 19, at 1:00 pm PT, and learn why Proofpoint is Intel Security’s exclusive McAfee Email Protection transition partner and the recognized market leader in stopping advanced threats.
Editorial VB Insight webinar sponsored by Boomtrain
Do you create the most relevant messages and experience possible for your customers? How's your accuracy?
Or do they see generalized messages and offers that may be completely different depending on whether they engage with your company via ads, email, website, or your mobile app?
Consumers are tuning out noise — unsubscribing from email, turning off notifications, blocking ads — and are increasingly expecting and engaging with personalized content. What's more, they're incredibly intolerant of mistakes and errors -- a recent study found that upon finding an error in personalized messaging, 16% would consider a competitor's business and 13% would immediately abandon the transaction all together. Yikes.
In short, personalization is critical to the success of modern marketers, yet few are doing a good job today -- and are hemorrhaging customers without even realizing it.
We'll help you not only understand who customers are, and how to personalize their experiences. By attending this webinar you'll:
•Learn how to collect the right customer identity data
•Benchmark according to what your peers are doing today
•Objectives most commonly associated with personalization
•Best practices for engaging customers across channels
•Where in the funnel personalization can help most
Andrew Jones, analyst, VB Insight, VentureBeat
Cate Twohill, Senior director and managing partner of CRM services, WGBH, Boston
Brian Witlin, COO, Yummly
Wendy Schuchart, moderator, VentureBeat
Check out VB Insight to access Andrew's Personalization research, and to access the latest research on Marketing Technology: http://insight.venturebeat.com
To help enterprises integrate data, accelerate mobile development and create secure, revenue-generating, digital ecosystems - CA is introducing three new products in the API Management family at CA World 2015.
Join this webcast to be one of the first to receive an inside look into the next evolution of API management and mobile development tools which which directly help API Owners, Developers, Enterprise Architects, and Chief Digital Officers succeed in their roles.
Watch this webcast to discover:
- What new CA API Management products are being announced at CA World 2015
- What challenges they solve in mobile & IoT development
- How they expand the role of API Management in the API lifecycle
- How they fit into an enterprise architecture
ECC ist der modernste Verschlüsselungsalgorithmus, der beim Schlüsselaustausch und der Authentifizierung mit den Protokollen SSL und TLS zum Einsatz kommt.
ECC wird RSA voraussichtlich ablösen, da der explosionsartige Anstieg der Mobilgerätenutzung und der Kommunikation zwischen Maschinen (M2M) sowie die Entwicklung des Internet der Dinge die Grenzen der Skalierbarkeit des derzeitigen Standardalgorithmus RSA übersteigen.
Die Zuverlässigkeit und Leistung von ECC sind inzwischen klar erwiesen. Die größte Hürde für den Einsatz des Algorithmus ist mangelnde Kompatibilität mit vorhandener Technik. Deshalb hat Symantec Hybrid-SSL-Zertifikate mit ECC und RSA entwickelt. Mit diesen Zertifikaten können Sie Ihre bisherigen Infrastrukturinvestitionen weiterhin nutzen und gleichzeitig Kompatibilitätsprobleme vermeiden.
In diesem Webcast erfahren Sie,
welche Vorteile ECC in puncto Sicherheit, Zuverlässigkeit und Kapazität bietet,
wie die Zertifikatskette eines Hybrid-SSL-Zertifikats mit ECC und RSA aussieht und
wie Sie ein solches Zertifikat beantragen.
Whether adopting Exchange Online, or rolling out Office 365 web or native mobile apps, many organizations are still trying to figure out a deployment and user management strategy that spans the mobile cloud. Learn how VMware Identity Manager can simply federate even the most complex Active Directory environments and then automate the provisioning and licensing of Office 365 accounts while users simply login with their existing credentials. Then learn how to integrate Office 365 for mobile platforms with AirWatch Mobile Management to secure data at rest on iOS, Android and Windows 10 devices.
Join this session to find out more about what's new with the Horizon portfolio of desktop and application virtualization solutions--including Horizon 6, Horizon Air and Horizon Flex and how these products tie into the software defined datacenter-understand how other customers are taking advantage of these technologies and map out a plan for when to deliver these services through a cloud provider and when to manage these on premises.
The retail industry is becoming more complex and changing faster than ever before. Join us as we talk about the latest industry trends and explore how retailers are adopting End User Computing solutions to revamp customer engagement, store operations, employee communication, and security.
The blending of our work and personal lives is a reality for many digital employees. While many organizations continue to maintain strong lines of division, other organizations are struggling to find the right balance of security and privacy. This session will review trends, myths and best practices with our own VMWare in-house privacy council for establishing and communicating Bring-Your-Own policies.
John Hawley, VP, Security Strategy, CA Technologies; Brandon Dunlap, Brightfly
The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2015 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Michelle Waugh, VP, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Each year, security experts at CA Technologies offer predictions about some of the most compelling trends in the identity & access management market. In this webcast, we will bravely review our predictions from 2015, and rate ourselves on how we did. But, more importantly, we will fearlessly offer predictions about the world of identities for 2016, and offer specific guidance for what organizations can be doing now to prepare for these changes. On January 7, 2016 at 1:00PM Eastern, we focus on the future to see what might be coming down the road.
Hadeel Dabbagh, Director, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
The broad range of modern business SaaS apps available today enable employees to be more productive and collaborative than ever before, while allowing them to work anytime, anywhere and on the devices of their choice. However, the proliferation of SaaS apps and a “bring your own app” trend in the workplace has introduced risks and challenges when it comes to securing and managing access to apps across organizational silos. Join CA Technologies and (ISC)2 on December 10, 2015 at 1:00PM Eastern as we dive into the security, agility and user experience challenges associated with the rise of SaaS adoption, and how leveraging identity-centric security can help you unlock the potential of your organization’s SaaS investments.
As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business.
Join CA Technologies for a look at current trends in the industry such as how increased interaction with business users impacts the identity management lifecycle, and the privileged identity management strategies and techniques necessary to guard against breaches. This session will offer recommendations for increasing engagement with identity services across your open enterprise.
Dale Gardner, Dir, Security Solutions, CA Technologies, Brandon Dunlap, Brightfly
Over a billion records were breached last year in online cyber-attacks. Even though the details of these breaches may differ, they often have the same root cause – inadequate control of privileged user accounts and their actions in increasingly complex hybrid environments. On November 12, 2015 at 1:00PM Eastern, join CA Technologies and (ISC)2 as we examine some of the most notorious breaches and the steps that attackers took to take control of these accounts. You will also learn how Privileged Access Management (PAM) can help prevent successful attacks and protect critical corporate and customer information.
CA Technologies and Jason Cook, VP, Security and CISO for BT Americas
In an IT landscape fueled by mobility, cloud services and the internet of things (IoT), the number of applications, users and devices continues to proliferate rapidly—and without the right controls, so do the risks.
On November 5, 2015, join BT Security and CA Technologies for a webcast that defines a new approach to identity and access management. Attend the webcast and discover:
• How in the application economy, user identities have become the new security perimeter.
• Why so many IT teams are unprepared to contend with the escalating demands of identity and access management.
• How organizations can adopt a cloud-based identity and access management approach that strengthens security and enhances the user experience, while reducing ongoing costs, risks and complexity.
Robert Marti, Sen Principal, and Marty Yam, Sr. Advisor, Authentication Solutions, CA Technologies; Brandon Dunlap
Traditional authentication and authorization defenses against fraudulent access attempts have only slowed down cybercriminals and have made gaining access more difficult for legitimate users. Multi-factor authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session? Join CA Technologies and (ISC)2 on October 15, 2015 at 1:00PM Eastern to learn best practices for reducing your risk of data breaches caused by fraudulent access. During this session, we will explore how user behavioral profiling can enhance authentication security and how risk-aware session management can help prevent session hijacking.
Michelle Waugh, VP Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Rarely has the landscape of security changed as dramatically as in the past year. Applications are now rightfully driving security strategy across organizations of all sizes. Attacks against your critical systems and information are more insidious than ever before. Your customers are demanding access from a variety of devices, across access channels, along with a consistent, intuitive, and convenient user experience. If that wasn't enough, you need to engage with your developer communities to help build those complementary solutions that you need to grow your business. Join CA Technologies for this first part of a six-part webcast series on September 17, 2015 at 1:00PM Eastern to learn how security leaders can rise to the top of the pack by leveraging these new realities, and grow their business through an innovative security vision and strategy.
Carol Alexander, Senior Director of Product Marketing & Charley Chell, Product Manager for CA Technologies
We live in a world where everything is driven by applications, connectivity, and mobility. Your customers are now far more likely to interact with your enterprise through software than a live person, and employees are conducting more business on mobile devices than traditional laptops and workstations. A critical success factor for thriving in this new reality is the ability for the enterprise to accurately identify users in a way that is both convenient to them and cost effective, while also protecting their identities and data from potential fraudsters.
Join this webcast where Carol Alexander, Head of Authentication Solutions, and Charley Chell, Security Advisor, from CA Technologies will discuss how you can transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction. Learn the key factors and considerations in using contextual authentication within your mobile applications to protect against inappropriate access and data breaches.
John Hawley; VP of Security Strategy at CA Technologies & Hila Gvir; Senior Principal Product Manager at CA Technologies
A successful Consumer-Scale Identity Management Deployment is far more than just adding more users. The user experience becomes critical in the success of the deployment as a new type of user begins to interact directly with the identity infrastructure. This webcast will show how to sell these projects to the business and how to create a user experience that will help ensure its success.
John Hawley, Vice President of Security Strategy at CA Technologies
Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.
As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
Ed Moyle, Director, Emerging Business and Technology Trends, Research/Standards & Academic, ISACA
There’s no doubt about it, smart devices are proliferating – and as they do, security pros have their work cut out for them. Not only are consumer devices on the rise that have embedded networking and computing technology (e.g. televisions and household appliances), but we’re also seeing integration in other areas as well: everything from automobiles to thermostats to smoke detectors now might ship with networking capability built in.
For security practitioners in enterprise, this can have serious ramifications: not only do they potentially require traditional “security hygiene” activities (e.g. patching and monitoring), but they can also introduce other complexities as well. For example in situations where they might find their way into regulatory-governed environments (e.g. the PCI cardholder data environment) or when adoption happens without involvement from IT.
This round table session will discuss how enterprises can approach securing the Internet of Things in their environments and how they can adjust their security programs to ensure that the environment stays protected going forward.
Scott Morrison, Senior Vice President and a Distinguished Engineer at CA Technologies
Chris Poulin, Research Strategist, X-Force at IBM
Gunnar Petersen, Founder/Principle Arctec Group & Visiting Scientist @ Carnegie Mellon
Russell Miller, Director, Security Solutions & Carol Alexander, Head of Product Marketing for Authenticat
Strong authentication and Single Sign-On can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session?
Please join Carol Alexander, Director, Authentication Solutions and Russ Miller, Director, Security Solutions to learn how Intelligent Authentication and Single Sign-On including Risk-Aware Session Management can help improve session security.
Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies
Access Management has grown consistently more challenging as your business requires secure engagement with new user groups and additional partners via mobile, cloud and social channels. In order to securely enable such a multi-channel, open enterprise you must:
• Facilitate secure federation with a large number of partners
• Enable the use of social identities
• Securely connect to Cloud-based services
• Extend access and security to mobile applications and devices
• Protect against existing and evolving threats
Please join Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies, to learn how the latest Access Management capabilities can help you meet these rapidly evolving requirements and deliver secure applications on a timely basis.
Charley Chell, Sr. Director, Security Solutions at CA Technologies
Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.
Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
John E. Hawley, Jr., VP, Strategy for Security Solutions; CA Technologies; Brandon Dunlap
The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Russell Miller, Director, Security Solutions, CA Technologies
Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.
Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
Andrew Kellett, Principal Analyst at Ovum & Sumner Blount, Director, Security Solutions for CA Technologies
In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).
Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc., Sumner Blount, Director, CA Technologies
In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.
On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
Michelle Waugh, VP Security Solutions, CA Technologies
Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.