Browse communities
Browse communities
Presenting a webinar?

Securing Mobile Applications with CA SiteMinder® for Web Access Management

Aaron Berman, Advisor, Solution Strategy, CA Technologies Security Business Unit
Mobile applications for iPad, iPhone and Android devices have revolutionized how organizations do business with their customers. Organizations are currently looking for reliable and easy to implement ways to connect mobile apps to the traditional IT resources.

During this webcast, we’ll discuss how you can meet these mobility business objectives to better engage your customers through the deployment of a single, unified security infrastructure that not only supports mobile applications but traditional browsers and web applications. The end result is an enhanced customer experience, enabling better access to products and services, while increasing application security and reducing security overhead.

Mobile topics that will be covered during this session include:

•The current state of mobile application authentication and authorization
•Centralizing policy authorization and auditing across multiple access points
•Advantages of using cookie-less session management for mobile applications
•Leveraging current investment that can be extended to mobile applications

You’ll learn how CA SiteMinder allows organizations to utilize one access management platform for all types of user access, by offering cookie based and cookie-less session management for traditional browsers, browsers on a Smartphone or tablet PC, a native iOS, or an Android application, by securing the REST communications channel between the device and the server.

Who should attend:
•Mobile security managers
•Security specialists and architects
•IT / Application Auditors
•Application/system owners
•Application Developers
Jun 26 2012
44 mins
Securing Mobile Applications with CA SiteMinder® for Web Access Management
More from this community:

Mobile Computing

  • Live and recorded (1215)
  • Upcoming (34)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Best of Both Worlds: Authentication That is Both Secure and Convenient for Users Recorded: Mar 24 2015 49 mins
    Charley Chell, Sr. Director, Security Solutions at CA Technologies
    Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.

    Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
  • Briefings Part 6: Identity Management and APIs – The Evolution Continues Recorded: Feb 12 2015 59 mins
    John E. Hawley, Jr., VP, Strategy for Security Solutions; CA Technologies; Brandon Dunlap
    The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
  • Cyber-Defense: Are you Toast? Recorded: Feb 5 2015 34 mins
    Russell Miller, Director, Security Solutions, CA Technologies
    Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.

    Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
  • Customer-focused Identity Management: Improve Relationships and Security Recorded: Jan 29 2015 61 mins
    Andrew Kellett, Principal Analyst at Ovum & Sumner Blount, Director, Security Solutions for CA Technologies
    In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).

    Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
  • Turning the Confusing Identity Management Landscape into a Strategic Plan Recorded: Jan 22 2015 46 mins
    Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc., Sumner Blount, Director, CA Technologies
    In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.

    On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
  • Briefings Part 5: The Business of Identities – Predictions for 2015 Recorded: Jan 15 2015 61 mins
    Michelle Waugh, VP Security Solutions, CA Technologies
    Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
  • Briefings Part 4: Your Business is Exposed: Avoiding API Security Vulnerabilites Recorded: Dec 18 2014 58 mins
    Francois Lascelles, Chief Architect, CA Technologies
    APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • Want to Avoid Security Breaches? Leveraging the NIST Framework for Cybersecurity Recorded: Dec 4 2014 62 mins
    Jamie Brown, Director of Global Government Relations & Sumner Blount, Director of Security Solutions, CA Technologies
    Is your organization worried about joining the ranks of other companies that have suffered breaches recently? Are you concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks?
    The NIST Framework for Improving Cybersecurity defines guidelines and best practices for improving cybersecurity across several major areas. But, how do you take this complex framework and use it in your own environment, and what technologies can help you with adherence to it?
    In this webcast, Sumner Blount and Jamie Brown from CA Technologies will explore the Framework to help you develop a plan for improving cybersecurity in your own environment. We will focus on the Protect function because of its critical importance for protecting assets from improper access and use. Join us to learn how you can leverage identity management and the NIST guidelines to help your organization avoid the impact of a public breach.
  • Briefings Part 3: End-to-End Mobile Security, Samsung Knox and CA Technologies Recorded: Nov 20 2014 57 mins
    Leif Bildoy, Product Management CA Technologies​; Jeff Moles, Samsung KNOX Product Mgmt; Brandon Dunlap
    As the largest Android device manufacturer Samsung understands the value as well as the security implications that apps have introduced. While businesses are reshaping delivery models to capitalize on its opportunities, security risks are forcing organizations to think differently. Controlling access to the app is no longer sufficient. Instead, businesses have to take an end-to-end security approach – protecting access from the app to the backend API. Please attend this webinar to hear Leif Bildoy, Product Manager at CA Technologies, discuss how Samsung has increased the security within its KNOX Workspace to deliver end-to-end security while maintaining the ever important user experience.
  • Briefings Part 2: Are You Prepared For the Next Attack? Recorded: Oct 23 2014 57 mins
    Christopher Wraight & Carole Gunst, Directors, Security Solutions, CA Technologies
    Today, usernames and passwords continue to be stolen and exploited in record numbers. Hackers are still stealing credentials and accessing sensitive data. To stay ahead of hackers, you need to combine the appropriate forms of authentication and application access/session management to reduce risk and to prevent security breaches before they happen. Please join CA Technologies to learn about risk appropriate authentication and SSO/access management capabilities that can help protect your organization from hackers and their popular attack vectors.
  • Briefings Part 1: Unleashing The Power of Consumer Identity Recorded: Sep 25 2014 62 mins
    Merritt Maxim, Director, Security Solutions for CA Technologies
    How can today’s enterprises position themselves to best leverage large consumer populations in ways that meet the business’ requirements without overwhelming the IT organization? In this webinar, Merritt Maxim, Director, Security Solutions for CA Technologies, will discuss the key requirements to deliver consumer scale identity management and examine how capabilities such as user management, social login and risk-based authentication can help organizations realize the full value of consumer identities, while providing a simple user experience and one which helps keep risks in check.
  • Cloud IAM for Seamless Access to SaaS and On-Premise Apps Recorded: Sep 18 2014 59 mins
    David Gormley, Director, Security Solutions at CA Technologies
    In the application economy, it is critical to simplify access to applications delivered from the enterprise and cloud – and do so quickly, securely and cost effectively. Cloud IAM, or Identity and Access Management as a Service (IAMaaS), can be deployed with or without on-premise IAM products to provide seamless access for your employees, partners and customers.

    Join David Gormley, Director, Security Solutions at CA Technologies, to learn how Cloud IAM can be easily integrated with existing IAM components to provide additional flexibility and scalability without burdening your IT infrastructure.
  • Privileged Identities: The Choke Point for Advanced Attacks Recorded: Sep 11 2014 63 mins
    Russell Miller, Director, Security Solutions at CA Technologies & Nimrod Vax, CA Technologies
    The most damaging attacks, whether from inside or outside the organization, have one thing in common: the use of privileged identities. Attackers use authorized or compromised privileged identities to gain access to information, attack new systems, and hide their tracks. Restricting access to compromised accounts is simply not enough. To mitigate damage from these attacks, a combination of capabilities, including fine-grained controls and governance is needed.
    Join Russell Miller, Director, Security Solutions at CA Technologies to learn how with the right blend of processes and controls on privileged accounts, you can create a comprehensive and cohesive approach to securing your organization where it matters most.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends (APJ Event) Recorded: Sep 11 2014 48 mins
    Merritt Maxim, Director, Security Solutions for CA Technologies
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and the Ponemon Institute recently conducted a worldwide survey of over 2,500 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Merritt Maxim, Director, Security Solutions for CA Technologies who will review the key findings from the survey, deliver insight into the current state of BYOID and provide guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud
  • Retail Security: Don’t Be the Next Breach Headline Recorded: Aug 21 2014 33 mins
    Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies
    2013 has been called “The Year of the Retail Breach.” Many organizations are struggling to maintain a comprehensive defense strategy while supporting customers with an engaging experience through mobile devices and social platforms. Retailers in particular have become increasingly aware of their vulnerability and are now searching for comprehensive approaches to security in 2014.

    Please join Russell Miller, Director, Security Solutions and Michael Dullea, Sr. Principal, at CA Technologies, to understand common attack scenarios and learn how you can help protect critical systems, from Points-of-Sale (POS) to back-end infrastructure and supporting systems.
  • BYOID: New Ponemon Institute Study on Key Digital Identity Trends Recorded: Aug 7 2014 56 mins
    Larry Ponemon, Chairman and Founder of the Ponemon Institute & Merritt Maxim, Dir., Security Solutions for CA Technologies
    While Bring Your Own Identity (BYOID) can deliver tangible benefits to end users and relying parties, these benefits are accompanied with potential risks and liability concerns. CA Technologies and The Ponemon Institute recently conducted a worldwide survey of over 3,000 IT users and business users to understand the value, benefits and concerns that organizations have around using BYOID.

    Please join Larry Ponemon, Chairman and Founder of the Ponemon Institute and Merritt Maxim, Director, Security Solutions for CA Technologies for a review of the key findings from the survey, insight into the current state of BYOID and guidance on how organizations can overcome these barriers to gain the maximum value from BYOID without unnecessarily increasing risk or fraud.
  • Enabling and Securing Multi-Channel Customer Interactions (Global Event) Recorded: Jul 30 2014 59 mins
    David Gormley, Director, Security Solutions for CA Technologies
    Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customers identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.

    Please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interactions.
  • Leveraging the NIST Framework to Improve Cybersecurity Recorded: Jul 24 2014 47 mins
    Sumner Blount, Sr. Principal, Security Solutions and Jamie Brown, Director, Government Relations for CA Technologies
    In February 2014, the National Institute of Standards and Technology (NIST) officially approved and released its Framework for Improving Critical Infrastructure Cybersecurity providing comprehensive guidance to help improve cybersecurity across a range of categories. It has since received significant attention from many organizations and verticals that are seeking best practices for strengthening security controls.

    Please join Sumner Blount, Sr. Principal, Security Solutions and Jamie Brown, Director, Government Relations for CA Technologies to explore the Framework’s goals and recommendations, and discuss key identity management technologies that can help improve your security strategy.
  • Critical Considerations for Securely Mobilizing Your Workforce–Any App, Anytime Recorded: Jul 15 2014 44 mins
    Tyson Whitten and Arun Bhattacharya, CA Technologies
    Enabling your mobile workforce is not a one-time effort but a journey. Various mobility considerations will undoubtedly come into play requiring IT to make decisions around what enterprise mobile apps to roll out to various employees and with what kind of access policies. Do you need to deliver mobile device access to existing web applications? Do you need to develop new native mobile apps – for your employees or your customers? And then what’s the best way to manage and secure these mobile apps? Please join Arun Bhattacharya and Tyson Whitten from CA Technologies as they provide customer validated recipes for securely enabling your mobile workforce, while covering everyday use cases for mobile app development, management and security.
  • IAM in the “Age of the Customer”: Balancing Usability and Security Recorded: Jul 10 2014 62 mins
    Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc. & John Hawley, VP Security, CA Technologies
    An increasing portion of your revenue and customer engagement hinges on digital relationships that span multiple channels like web and mobile, and this puts your customers in the driver’s seat more than ever before. Any hitch in securely registering or logging into your website, mobile app, or web services and undue friction when conducting transactions can send prospects and even loyal customers to your competition.

    Please join guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc. and John Hawley, VP of Security Strategy at CA Technologies, to explore the requirements for consistent security across channels of customer interaction and the need to create a new balance between convenience and security. Learn how Customer IAM (CIAM) can both enable and protect digital interactions so you can enhance customer relationships and reduce risk at the same time.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Mobile Applications with CA SiteMinder® for Web Access Management
  • Live at: Jun 26 2012 5:00 pm
  • Presented by: Aaron Berman, Advisor, Solution Strategy, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this