Securing Mobile Applications with CA SiteMinder® for Web Access Management
Mobile applications for iPad, iPhone and Android devices have revolutionized how organizations do business with their customers. Organizations are currently looking for reliable and easy to implement ways to connect mobile apps to the traditional IT resources.
During this webcast, we’ll discuss how you can meet these mobility business objectives to better engage your customers through the deployment of a single, unified security infrastructure that not only supports mobile applications but traditional browsers and web applications. The end result is an enhanced customer experience, enabling better access to products and services, while increasing application security and reducing security overhead.
Mobile topics that will be covered during this session include:
•The current state of mobile application authentication and authorization
•Centralizing policy authorization and auditing across multiple access points
•Advantages of using cookie-less session management for mobile applications
•Leveraging current investment that can be extended to mobile applications
You’ll learn how CA SiteMinder allows organizations to utilize one access management platform for all types of user access, by offering cookie based and cookie-less session management for traditional browsers, browsers on a Smartphone or tablet PC, a native iOS, or an Android application, by securing the REST communications channel between the device and the server.
Who should attend:
•Mobile security managers
•Security specialists and architects
•IT / Application Auditors
RecordedJun 26 201244 mins
Your place is confirmed, we'll send you email reminders
Carol Alexander, Sr Dir Product Marketing PaySec, CA; Hannah Preston, Solution Strategist PaySec, CA; Karen Webster, CEO MPD
Brace yourself, there's a storm coming. Soon you will see more and more global regulatory changes that could impact your payment security strategy. In fact, you may not even be aware that some changes are already underway.
Find out how to leverage innovative, already-available payment technologies during this evolution in the payment industry.
Join our distinguished panelists as they discuss regulatory disruption. Learn the steps you should be taking - right now - to help implement best practices in your fraud prevention strategies:
•Are you future-proofing your e-Commerce operations?
•Is your data at the center of your security strategy?
•Are you tracking the predictions for next 18 months?
Your identity and governance practices are well established, but they might not be as comprehensive as they need to be. Going beyond the basics is critical to greatly reduce security risk and improve efficiencies.
Join CA Technologies security expert, John Hawley, to examine how to broaden the scope of governance to include privileged users, contractors, and business partners, as well as controlling access to physical assets. You’ll also learn the important role of identity performance analytics in a governance deployment.
Cybercrime costs the global economy $445 Billion a year, more than the worldwide illicit drug trade, and even the GDP of many countries. And, targeted breaches are increasingly a tool of nation-states seeking intellectual property, dossiers on influential individuals, and devastating disruptions of business operations.
But for all their variety, each of these attacks share a common thread — a kill chain that exploits privileged users and their credentials to gain access to sensitive systems. Privileged access management is the most direct means of disrupting the kill chain and stopping attackers before they ever get started.
Join CA Technologies Dale Gardner and ISACA in an informative discussion on how to break the kill chain.
You will learn:
• How risks from system breaches — and the potential for long-lasting damages — are increasing
• How attackers exploit privileged users and their credentials in an ongoing string of data breaches and security incidents
• How to master the processes and tools needed to easily disrupt the kill chain, stopping attackers in their tracks and preventing breaches.
Rob Marti - CA Security and Jeremy Britton - Deloitte, Managing Director of Cyber Risk Services
Digital is everywhere—big data, cloud, mobile, social, the Internet of Things – and its changing the way we all work and play. Today, retailers are facing three major challenges: digital transformation initiatives, abandoned online shopping carts, and online identity fraud and data breaches. The common thread for success is to ensure that security becomes synonymous with a frictionless user experience.
Join security experts from CA Technologies and Deloitte in a discussion on how leading retailers are addressing these challenges and how a comprehensive Omnichannel Access solution can enable you to engage your customers in a secure and frictionless fashion across multiple devices and channels.
Jonathan D. Hancock, TSYS; James Jenkins, CA; Paul Dulany, CA; Steve Casco, CardNotPresent
3D Secure is “primed for ignition” … especially in the U.S., where the migration to EMV chip cards has resulted in an upward trend of card-not-present (CNP) fraud. In fact, it is estimated that in the U.S. alone, CNP fraud will reach approximately $7 billion by the year 2020.
What many card issuers may not know is that 3D Secure is an ideal solution to combat this specific type of fraud. What’s more, card issuers can leverage the enhanced data set available with 3D Secure to support a broader fraud strategy across CNP, brick and mortar, and even omni-channel segments.
Want to learn more? Join us to explore:
• How 3D Secure has evolved since its introduction and common misconceptions about this protocol
• Where to properly utilize various types of data available within 3D Secure and how it can enhance an overall fraud strategy
• What industry experts say about the impact of 3D Secure data and existing partnerships to support U.S. issuers
•Jonathan D. Hancock, Fraud & Risk Management Solutions Director, TSYS
•James Jenkins, NA Sales Director, CA Technologies
•Paul Dulany, Data Science VP, CA Technologies
•Steve Casco, Founder, CardNotPresent.com
In up to two-thirds of security breaches, stolen or compromised user credentials belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack vector. In this way, attackers can steal sensitive data and wreak havoc. While you must provide access to third parties, you must also manage such high-impact security risks. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches.
In this webcast, you’ll learn:
- The identity, access, and security governance processes needed to protect your network
- How to ensure positive user identification to prevent credential theft and misuse
- Techniques to limit access to only those resources required to satisfy work or business requirements
- Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
- Establishing monitoring procedures that flag violations and speed forensic investigations
Dale R. Gardner, CA Technologies PAM, and Jeremiah Cornelius, Senior Security Architect, VMware
Virtualized network systems are inherently more secure than physical networks, since what is deployed can be known with absolute certainty – and therefore can be precisely identified and secured. And because the network is defined in software, connections can be securely defined only as a consequence of policy – rather than trying to add policy to physical network links after they’ve been deployed. Security is built in, rather than bolted on after the fact.
Network virtualization platforms for the Software-Defined Data Center (SDDC) bring the operational model of a virtual machine to your data center network, transforming the economics of network and security operations. This allows you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach. Adding specialized protections to monitor and control the activities of privileged users, and to protect and secure the credentials they use are critical to achieving comprehensive security.
Join us for this informative webcast to learn the key components required for protecting the Software-Defined Data Center.
Derek Brink, VP and IT Research Fellow at Aberdeen Group & Sumner Blount, Director, Security Solutions at CA Technologies
The world of security has changed. Security must now be extended to a larger, and more diverse user population. These extended users (partners and consumers in addition to employees) demand a simple, frictionless, and business-oriented user experience, but without sacrificing the confidence that their private information is secure. Aberdeen has shown that organizations that can meet the needs of this increasingly diverse user population can gain significant benefits – up to 60% gain in user productivity and an 80% increase in user satisfaction!
Join Aberdeen Group and CA Technologies for an informative webcast to learn how these results were achieved and how you can leverage these principles in your own environment. We will also explore a major bank’s experience and how they are leveraging identity management and governance capabilities to help transform their business - securely!
John Hawley, VP, Security Strategy, CA Technologies; Brandon Dunlap, Brightfly
The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2016 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Derek Brink, VP and IT Research Fellow at Aberdeen Group & Sumner Blount, Director, Security Solutions at CA Technologies
Identity and access management (IAM) initiatives with a focus on users can enable your business, while still supporting their traditional role in the important areas of security, compliance, and reliability.
In the research report "IAM for Everyone: How A Broader Strategic Focus on Users Pays Off," Aberdeen Group’s Derek Brink describes four high-level attributes that can help you quickly assess whether your organization’s IAM initiatives are on a path to achieve similar results:
- IAM is viewed not only as the technical means for control, compliance, and cost efficiencies, but also as an essential strategic business enabler
- Both rewarded risks (eg. enablement) and unrewarded risks (eg, protection) are among the top drivers of your IAM investment
- There is a strong focus on a convenient, streamlined, and personalized user experience
- The performance of your IAM investments are being measured and are helping to produce the desired business value
Join CA Technologies and Aberdeen Group for this highly informative on-demand webinar on IAM as a strategic enabler.
Nick Craig, VP of Payment Security, CA Technologies
Shopping cart abandonment is on the rise – often fueled by complicated checkout processes or card security prompts. In fact, the estimated value of online shopping carts left behind in 2015 was a staggering $3.38 trillion.*
Join this Card Not Present event with Nick Craig, VP of Payment Security, CA Technologies, to learn the methodology that card issuers can implement to streamline the checkout process and win back some of that lost revenue by providing a better, and more secure shopping experience.
Michelle Waugh, VP, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Each year, security experts at CA Technologies offer predictions about some of the most compelling trends in the identity & access management market. In this webcast, we will bravely review our predictions from 2015, and rate ourselves on how we did. But, more importantly, we will fearlessly offer predictions about the world of identities for 2016, and offer specific guidance for what organizations can be doing now to prepare for these changes. On January 7, 2016 at 1:00PM Eastern, we focus on the future to see what might be coming down the road.
Ankur Karer, Head of Global Pre-Sales of CA Technologies
Payment fraud losses amounted to $16.31 billion last year — with card-not-present fraud responsible for nearly 40 percent of that total at $6.4 billion. Investigating those cases (and resolving those disputes) is a major burden for card issuers; what’s essential to improving the process is to automate investigation and minimize operational overhead.
Join Ankur Karer, Head of Global Pre-Sales of CA Technologies, and MPD CEO Karen Webster for a digital discussion on the best practices for implementing the ideal case management system that can help to improve operational efficiency by prioritizing cases and reducing inbound call volume.
Nick Craig, VP of Sales for CA Digital Payments, CA Technologies
Shopping cart abandonment is on the rise – often fueled by complicated checkout processes or card security issues – with research showing more than $4 trillion worth of merchandise will be left behind in online shopping carts in this year alone.
Watch this on-demand PYMNTS.com webinar where Nick Craig, VP of Sales for CA Digital Payments, CA Technologies and MPD CEO Karen Webster will discuss streamlining the checkout process to combat shopping cart abandonment.
The broad range of modern business SaaS apps available today enable employees to be more productive and collaborative than ever before, while allowing them to work anytime, anywhere and on the devices of their choice. However, the proliferation of SaaS apps and a “bring your own app” trend in the workplace has introduced risks and challenges when it comes to securing and managing access to apps across organizational silos. Join CA Technologies and (ISC)2 on December 10, 2015 at 1:00PM Eastern as we dive into the security, agility and user experience challenges associated with the rise of SaaS adoption, and how leveraging identity-centric security can help you unlock the potential of your organization’s SaaS investments.
As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business.
Join CA Technologies for a look at current trends in the industry such as how increased interaction with business users impacts the identity management lifecycle, and the privileged identity management strategies and techniques necessary to guard against breaches. This session will offer recommendations for increasing engagement with identity services across your open enterprise.
Dale Gardner, Dir, Security Solutions, CA Technologies, Brandon Dunlap, Brightfly
Over a billion records were breached last year in online cyber-attacks. Even though the details of these breaches may differ, they often have the same root cause – inadequate control of privileged user accounts and their actions in increasingly complex hybrid environments. On November 12, 2015 at 1:00PM Eastern, join CA Technologies and (ISC)2 as we examine some of the most notorious breaches and the steps that attackers took to take control of these accounts. You will also learn how Privileged Access Management (PAM) can help prevent successful attacks and protect critical corporate and customer information.
CA Technologies and Jason Cook, VP, Security and CISO for BT Americas
In an IT landscape fueled by mobility, cloud services and the internet of things (IoT), the number of applications, users and devices continues to proliferate rapidly—and without the right controls, so do the risks.
On November 5, 2015, join BT Security and CA Technologies for a webcast that defines a new approach to identity and access management. Attend the webcast and discover:
• How in the application economy, user identities have become the new security perimeter.
• Why so many IT teams are unprepared to contend with the escalating demands of identity and access management.
• How organizations can adopt a cloud-based identity and access management approach that strengthens security and enhances the user experience, while reducing ongoing costs, risks and complexity.
Robert Marti, Sen Principal, and Marty Yam, Sr. Advisor, Authentication Solutions, CA Technologies; Brandon Dunlap
Traditional authentication and authorization defenses against fraudulent access attempts have only slowed down cybercriminals and have made gaining access more difficult for legitimate users. Multi-factor authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session? Join CA Technologies and (ISC)2 on October 15, 2015 at 1:00PM Eastern to learn best practices for reducing your risk of data breaches caused by fraudulent access. During this session, we will explore how user behavioral profiling can enhance authentication security and how risk-aware session management can help prevent session hijacking.
Michelle Waugh, VP Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Rarely has the landscape of security changed as dramatically as in the past year. Applications are now rightfully driving security strategy across organizations of all sizes. Attacks against your critical systems and information are more insidious than ever before. Your customers are demanding access from a variety of devices, across access channels, along with a consistent, intuitive, and convenient user experience. If that wasn't enough, you need to engage with your developer communities to help build those complementary solutions that you need to grow your business. Join CA Technologies for this first part of a six-part webcast series on September 17, 2015 at 1:00PM Eastern to learn how security leaders can rise to the top of the pack by leveraging these new realities, and grow their business through an innovative security vision and strategy.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.
I will summarize the stages of analytics maturity that lead an organization from traditional reporting (descriptive analytics: hindsight), through predictive analytics (foresight), and into prescriptive analytics (insight). The benefits of big data (especially high-variety data) will be demonstrated with simple examples that can be applied to significant use cases.
The goal of data science in this case is to discover predictive power and prescriptive power from your data collections, in order to achieve optimal decisions and outcomes.
A few years ago, kik might have seemed like just another messaging app. Today it boasts 275 million users and its very own Bot Shop a platform for companies like Sephora and Weather.com to display their bot prowess. More and more smart companies are sitting up and paying attention, as Yahoo, Facebook, and others get into the messaging bot game.
Today most bots center around the conversational interface offered by Facebook Messenger and the likes of kik, but who knows what tomorrow might mean?
Join our VB Live event as our panel of experts talks about what smart companies know about bots. From messaging to shopping, bots are increasingly part of the business landscape.
In this webinar, you’ll learn to:
* Understand the importance of bots to brands
* Know bot landscape and what it means for your business
* Recognize the potential synergies and pitfalls between bots and brands
* Paul Gray, Director of Platform Services, Kik
* Jon Cifuentest, Analyst, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
Register for this free executive leadership live event today!
Today's supply chains are faced with an increasing number of distribution channels, a broader set of suppliers and ever decreasing product cycles. A new approach is required that delivers a step change in agility. MuleSoft's API-led approach delivers up to 200% faster development cycles through leveraging re-usable assets. Join us for a walkthrough of this approach, including a demo of Anypoint Platform and Anypoint B2B.
Hardware or software applicance-based load balancers do not scale horizontally. They often cause configuration delays, overspending, and overprovisioning. Avi Networks leverages the power of central management and insights derived from distributed load balancing resources to provide predictive autoscaling of load balancers as well as application components. Enterprises can eliminate upfront capital costs and adopt an elastic subscription-based model for load balancing. The Avi Vantage platform alleviates operational complexities inherent in buying hardware and managing multiple appliances.
In this webinar learn new best practices for autoscaling load balancers and applications. Learn the flexibility and cost savings achieved through:
• Software-defined L4-L7 services and central management
• Use of commodity x86 servers for load balancing
• Elastic scaling based on real-time traffic that eliminates overprovisioning
• Avoiding CapEx and significantly reduced OpEx
Internet of Things deployments are well underway across all industry verticals. In this webinar, Brian Partridge, VP, Mobility & Telecom, and Christian Renaud, Research Director, IoT, will review key technologies such as IoT platforms and security, potential M&A activity, and discuss recent research on edge and fog computing.
Current estimates show that there are about 180 billion app downloads per year, which is projected to rise to over 360 billion by 2020. There is no question that the demand for mobile content won't drop off any time soon. Yet, netting high quality mobile users is the fly in the ointment of many app developers and marketers.
Despite the rapid growth of the mobile market, finding the right user (not just any user) can stump even the experts. And user acquisition is expensive--doing it right can be even more so.
Join VentureBeat's panel of experts as we attempt to demystify successful mobile user acquisition. In this webinar you'll learn to:
* Acquire high quality not just large quantities of users
* Understand the power of analytics as a mobile acquisition strategy
* Identify how to uncover the secrets of effective acquisition
* Learn how to build loyalty amongst users
* James Peng, Head of Mobile Acquisition, Match Group
* Christian Calderon, Chief Revenue Officer, Ketchapp Games
* Stewart Rogers, Director of Marketing Technology, VentureBeat
* Rachael Brownell, Moderator, VentureBeat
The new competitive battleground for business is customer experience. Your success hinges on ensuring every customer interaction is the best it can be, but for businesses undergoing digital transformations, that means developing comprehensive monitoring across a growing number of channels while gaining valuable insights into all aspects of the customer experience. To successfully deliver a five star experience you need insights that will allow you to optimize the complete buyer’s journey across web, mobile, and wearables and provide flawless operational performance.
Join us for an exclusive webinar with Donnie Berkholz, Research Director from 451 Research to learn about the latest market trends, the importance of becoming a data-driven business and the need for analytics.
If you work as an IT Service and Support professional in higher ed, you are all too familiar with the challenges of the profession. Students, staff and faculty that need help…right away! Staffing and knowledge management challenges that accompany a student support model! Classrooms, dormitories, technology hubs, and administrative offices spread over a wide geographic area! And a huge variety of devices and equipment that require on-demand support! The simple fact is this…You have the most demanding job in the service and support industry…period!
To learn best practices in Service and Support for Higher Ed, register NOW for this first of its kind MetricNet webcast!
With the rising implementations of Agile and DevOps methodologies, many organizations that have more business experts than technical experts are finding it difficult to keep up with the pace of development. These teams need a way to fully engage the business experts in the test automation process without sacrificing speed, quality and scale.
Join Roee Weisbert, Senior Functional Architect, and learn how HPE Business Process Testing is the bridge that provides the ultimate scriptless framework for technical and non-technical users. See how the latest updates to BPT & UFT allow testers to automate in an intuitive and easy to use platform, optimizing efficiency, time, and quality of your applications.