Just-in-Time Authentication: Creating a New Balance of Security and Convenience
Enabling more sensitive online activities and transactions for a diverse user community (customers, partners, administrators) creates the need to have a high level of confidence that the person is who they say they are. At the same time the “Consumerization of IT” has raised user expectations for a smooth, intuitive online experience at anytime, from anywhere and from any device. This presents a real challenge because the historical relationship between authentication security and user convenience is inverse: as the strength of the authentication method goes up the user experience usually goes down.
With the emergence of new online threats, new device types and the increase in the amount of sensitive data available online, no one authentication method can meet all requirements to protect sensitive data and reduce fraud. There is a need for a flexible authentication system that can intelligently assess the risk of an activity and then require the appropriate authentication methods based on factors like the user, device, activity context and the activity itself. In this webcast, we will discuss the key requirements for a layered security approach that can enable a risk-appropriate and just-in-time authentication process which provides the security level required, while optimizing, or at least minimizing any negative impact on the customer experience.
Many organizations have struggled with BYOD programs due to MDM/MAM deployment challenges, user privacy concerns, and low adoption. This is causing some to question BYOD altogether. Fortunately, data shows that there is huge demand for BYOD, but such programs must meet employee needs in addition to IT needs.
In this webinar, you'll learn where existing BYOD programs have fallen short, and how the next-generation of mobile security products will ensure secure, broad adoption of BYOD.
Receive (ISC)² CPE credits for attending this webinar.
Virtual desktops are being widely adopted as a cost-effective way of providing users access to enterprise applications. Performance of these desktops and the scalability of virtual desktop deployments are a key to the success of these IT initiatives.
In this webinar, Jeff Stokes, Senior Content Developer, Microsoft and Bala Vaidhinathan, CTO, eG Innovations will focus on Windows virtual desktops and VDI image creation best practices that you can adopt to get the most of your virtual desktop infrastructure investments. Some topics will include:
- Best practices for building images in persistent and non-persistent virtual desktop deployments
- Tools for building optimized virtual desktop images
- Optimization techniques for Windows 7, 8 and 10 workloads
- Performance impact of changes and how to measure them at the desktop level
Much like a great UI is designed for optimal user experience, a great API is designed for optimal consumer experience. But what defines great consumer experience? And how can you deliver it consistently in every API you develop? In this session we’ll cover these topics in-depth and demonstrate best practices for developing great APIs through collaboration.
You will learn:
- Elements that define a great API consumer experience
- How to consistently drive API design in every API developed
- Best practices for API strategy
- API design pitfalls to avoid
Data preparation is occasionally referred to as data plumbing, suggesting that it is dirty grunge work that is an unglamorous necessity. We will see how this point of view misses entirely the discovery potential, value, and “thrill of the chase” that data preparation can offer. Data prep includes the all important first step in any analytics project: “Know Thy Data” (which is one of the fundamental principles of data science). We discuss data profiling, data transformations and normalization, feature selection and engineering, and more data prep approaches that empower you to begin learning from your data right out of the “starting gate” on your analytics project. Learning from Data (i.e., data science) doesn’t begin after data prep, but right from the start.
In 2011 Mark Andreessen stated “software is eating the world." Fast-forward to 2015, and it’s mobility eating the world. Today's mobile applications ignite business innovation and customer engagement. Success means transforming IT while engaging the business in mobile. Join HP software ADM, and see the latest App Delivery Management innovations. Explore a fast path to mobile software innovation and time to market. Learn how to deliver amazing mobile apps with confidence now.
Are you a data scientist working on a project with constantly changing requirements, flawed changing data and other disruptions? Guerrilla Analytics can help.
The key to a high performing Guerrilla Analytics team is its ability to recognise common data preparation patterns and quickly implement them in flexible, defensive data sets.
After this webinar, you'll be able to get your team off the ground fast and begin demonstrating value to your stakeholders.
You will learn about:
* Guerrilla Analytics: a brief introduction to what it is and why you need it for your agile data science ambitions
* Data Science Patterns: what they are and how they enable agile data science
* Case study: a walk through of some common patterns in use in a real project
Watch this short webinar to get an overview of Windows 10, which converges traditional Windows operating systems to allow for security and management through a single, unified platform across mobile, desktop, and embedded products. This unified platform also allows programmers to develop and manage universal apps that can be written once and run on any form factor and screen size. As a result, the application experience will now be the same on a Windows PC, phone, or tablet, which is a huge evolutionary step for Windows in the enterprise.
Office 365 is Microsoft’s cloud-based productivity suite. Office 365 is central to Microsoft’s strategy as the company evolves into a mobile-first, cloud-first software and solutions provider. Office 365 is also central to the productivity strategy of many MobileIron customers since their employees will increasingly use Office on mobile devices instead of traditional PCs. Therefore the ability to secure and deploy Office 365 on mobile devices using MobileIron is a common requirement. This webinar will outline the MobileIron security framework for mobile apps and how it can be used to secure and deploy Office 365 on mobile devices.
Low-code platforms have become a critical factor in helping AD&D organizations rapidly deliver applications to win, serve and retain customers.
With these platforms, enterprises are routinely delivering apps much faster than conventional methods. But can these platforms truly scale across the full modern app lifecycle? What are the top use cases for deploying a low-code platform?
Join John Rymer of Forrester Research for an engaging discussion about the innovative ways organizations are utilizing low-code platforms across the app lifecycle. Hear from IT executives with Autoliv, Estafeta and NES Financial as they talk candidly about how low-code platforms have driven growth and competitive advantage in their organizations.
John Hawley, VP, Security Strategy, CA Technologies; Brandon Dunlap, Brightfly
The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2015 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Michelle Waugh, VP, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Each year, security experts at CA Technologies offer predictions about some of the most compelling trends in the identity & access management market. In this webcast, we will bravely review our predictions from 2015, and rate ourselves on how we did. But, more importantly, we will fearlessly offer predictions about the world of identities for 2016, and offer specific guidance for what organizations can be doing now to prepare for these changes. On January 7, 2016 at 1:00PM Eastern, we focus on the future to see what might be coming down the road.
Hadeel Dabbagh, Director, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
The broad range of modern business SaaS apps available today enable employees to be more productive and collaborative than ever before, while allowing them to work anytime, anywhere and on the devices of their choice. However, the proliferation of SaaS apps and a “bring your own app” trend in the workplace has introduced risks and challenges when it comes to securing and managing access to apps across organizational silos. Join CA Technologies and (ISC)2 on December 10, 2015 at 1:00PM Eastern as we dive into the security, agility and user experience challenges associated with the rise of SaaS adoption, and how leveraging identity-centric security can help you unlock the potential of your organization’s SaaS investments.
Sumner Blount, Director, Security Solutions, CA Technologies; Brandon Dunlap; Brightfly
Over a billion records were breached last year in online cyber-attacks. Even though the details of these breaches may differ, they often have the same root cause – inadequate control of privileged user accounts and their actions in increasingly complex hybrid environments. On November 12, 2015 at 1:00PM Eastern, join CA Technologies and (ISC)2 as we examine some of the most notorious breaches and the steps that attackers took to take control of these accounts. You will also learn how Privileged Identity Management (PIM) can help prevent successful attacks and protect critical corporate and customer information.
Robert Marti, Sen Principal, and Marty Yam, Sr. Advisor, Authentication Solutions, CA Technologies; Brandon Dunlap
Traditional authentication and authorization defenses against fraudulent access attempts have only slowed down cybercriminals and have made gaining access more difficult for legitimate users. Multi-factor authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session? Join CA Technologies and (ISC)2 on October 15, 2015 at 1:00PM Eastern to learn best practices for reducing your risk of data breaches caused by fraudulent access. During this session, we will explore how user behavioral profiling can enhance authentication security and how risk-aware session management can help prevent session hijacking.
Michelle Waugh, VP Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Rarely has the landscape of security changed as dramatically as in the past year. Applications are now rightfully driving security strategy across organizations of all sizes. Attacks against your critical systems and information are more insidious than ever before. Your customers are demanding access from a variety of devices, across access channels, along with a consistent, intuitive, and convenient user experience. If that wasn't enough, you need to engage with your developer communities to help build those complementary solutions that you need to grow your business. Join CA Technologies for this first part of a six-part webcast series on September 17, 2015 at 1:00PM Eastern to learn how security leaders can rise to the top of the pack by leveraging these new realities, and grow their business through an innovative security vision and strategy.
Carol Alexander, Senior Director of Product Marketing & Charley Chell, Product Manager for CA Technologies
We live in a world where everything is driven by applications, connectivity, and mobility. Your customers are now far more likely to interact with your enterprise through software than a live person, and employees are conducting more business on mobile devices than traditional laptops and workstations. A critical success factor for thriving in this new reality is the ability for the enterprise to accurately identify users in a way that is both convenient to them and cost effective, while also protecting their identities and data from potential fraudsters.
Join this webcast where Carol Alexander, Head of Authentication Solutions, and Charley Chell, Security Advisor, from CA Technologies will discuss how you can transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction. Learn the key factors and considerations in using contextual authentication within your mobile applications to protect against inappropriate access and data breaches.
John Hawley; VP of Security Strategy at CA Technologies & Hila Gvir; Senior Principal Product Manager at CA Technologies
A successful Consumer-Scale Identity Management Deployment is far more than just adding more users. The user experience becomes critical in the success of the deployment as a new type of user begins to interact directly with the identity infrastructure. This webcast will show how to sell these projects to the business and how to create a user experience that will help ensure its success.
John Hawley, Vice President of Security Strategy at CA Technologies
Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.
As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
Ed Moyle, Director, Emerging Business and Technology Trends, Research/Standards & Academic, ISACA
There’s no doubt about it, smart devices are proliferating – and as they do, security pros have their work cut out for them. Not only are consumer devices on the rise that have embedded networking and computing technology (e.g. televisions and household appliances), but we’re also seeing integration in other areas as well: everything from automobiles to thermostats to smoke detectors now might ship with networking capability built in.
For security practitioners in enterprise, this can have serious ramifications: not only do they potentially require traditional “security hygiene” activities (e.g. patching and monitoring), but they can also introduce other complexities as well. For example in situations where they might find their way into regulatory-governed environments (e.g. the PCI cardholder data environment) or when adoption happens without involvement from IT.
This round table session will discuss how enterprises can approach securing the Internet of Things in their environments and how they can adjust their security programs to ensure that the environment stays protected going forward.
Scott Morrison, Senior Vice President and a Distinguished Engineer at CA Technologies
Chris Poulin, Research Strategist, X-Force at IBM
Gunnar Petersen, Founder/Principle Arctec Group & Visiting Scientist @ Carnegie Mellon
Russell Miller, Director, Security Solutions & Carol Alexander, Head of Product Marketing for Authenticat
Strong authentication and Single Sign-On can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session?
Please join Carol Alexander, Director, Authentication Solutions and Russ Miller, Director, Security Solutions to learn how Intelligent Authentication and Single Sign-On including Risk-Aware Session Management can help improve session security.
Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies
Access Management has grown consistently more challenging as your business requires secure engagement with new user groups and additional partners via mobile, cloud and social channels. In order to securely enable such a multi-channel, open enterprise you must:
• Facilitate secure federation with a large number of partners
• Enable the use of social identities
• Securely connect to Cloud-based services
• Extend access and security to mobile applications and devices
• Protect against existing and evolving threats
Please join Aaron Berman, Security Solutions Advisor and Russell Miller, Director, Security Solutions at CA Technologies, to learn how the latest Access Management capabilities can help you meet these rapidly evolving requirements and deliver secure applications on a timely basis.
Charley Chell, Sr. Director, Security Solutions at CA Technologies
Most two-factor authentication credentials offer high levels of security, but reduce usability; others offer limited security but are very easy to use. Risk-based authentication adds dynamic risk analysis to your authentication framework, while helping to maintain a frictionless experience for the user.
Please join Charley Chell, Sr. Director, Security Solutions at CA Technologies to learn how you can enhance the value of two-factor authentication and strengthen the security posture of your organization with risk-based authentication.
John E. Hawley, Jr., VP, Strategy for Security Solutions; CA Technologies; Brandon Dunlap
The Identity Management market has been buffeted over the past two years by several important trends – cloud, mobile, social media, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. But, these changes are not finished. In this webcast, we'll look at the next phase of identity management and APIs, and how the continuing trend towards cloud services and the explosion of mobility and applications will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Russell Miller, Director, Security Solutions, CA Technologies
Attackers continue to expose vulnerabilities at the world’s most recognized organizations. They are more skilled, more dedicated and supported by more resources than ever. While no one wants to be the “next one”, the key lies in understanding that privileged identities are at the heart of every highly-damaging breach.
Please join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy for CA Technologies to learn how protecting privileged identities can help bring the best security controls to the chokepoint of a potential attack. With the right controls in the right places, you can be well positioned to be in the headlines for only the right reasons.
Andrew Kellett, Principal Analyst at Ovum & Sumner Blount, Director, Security Solutions for CA Technologies
In the application economy, increasing demand from customers to engage with modern businesses online, through social media and via mobile applications, has generated new requirements for customer-focused Identity and Access Management (IAM).
Join us on January 29, 2015 at 11am EST, when Andrew Kellett, Principal Analyst at Ovum, will offer practical guidance for aligning your IAM strategy to support both user experience and security controls, which evolve throughout the customer lifecycle. He will explore the unique challenges of customer-focused IAM and how it can be leveraged to improve customer relationships. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to illustrate key technologies that can support effective and secure customer-focused IAM deployments.
Guest speaker Andras Cser, VP & Principal Analyst, Forrester Research, Inc., Sumner Blount, Director, CA Technologies
In the Application Economy, factors such as mobility, cloud, social media and the Internet of Things demand new ways of managing identities and access across your increasingly mobile users.
On January 22, 2015 at 11am EST, guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., will explore how these factors are changing the identity and access management (IAM) landscape and discuss the impact of Customer IAM. He will highlight specific predictions for how identity-based security will evolve in the coming year and offer specific guidance for how to improve your customer engagement and plan a successful security strategy. Sumner Blount, Director, Security Solutions for CA Technologies, will join the discussion to provide further insight and practical guidance.
Michelle Waugh, VP Security Solutions, CA Technologies
Last year, experts at CA Technologies offered a set of predictions about interesting trends in the identity market and its related technology areas. In this webcast, we will review those predictions and rate ourselves on how we did. But, more importantly we will fearlessly offer predictions about what will be happening in the world of identities during 2015, and offer specific guidance into what organizations can be doing now to prepare for these changes.
Francois Lascelles, Chief Architect, CA Technologies
APIs are quickly becoming the hacker's new favorite attack vector. Why wouldn't they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. And your private APIs can be exploited just as easily as a public API. So what measures can you take to strengthen your security position? During this webcast, Francois Lascelles, Chief Architect, CA Technologies, will discuss recent API data breaches, the top 5 API security vulnerabilities that are most impactful to today's enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
Jamie Brown, Director of Global Government Relations & Sumner Blount, Director of Security Solutions, CA Technologies
Is your organization worried about joining the ranks of other companies that have suffered breaches recently? Are you concerned whether your cybersecurity procedures and technologies will protect you from similar insider threats and external attacks?
The NIST Framework for Improving Cybersecurity defines guidelines and best practices for improving cybersecurity across several major areas. But, how do you take this complex framework and use it in your own environment, and what technologies can help you with adherence to it?
In this webcast, Sumner Blount and Jamie Brown from CA Technologies will explore the Framework to help you develop a plan for improving cybersecurity in your own environment. We will focus on the Protect function because of its critical importance for protecting assets from improper access and use. Join us to learn how you can leverage identity management and the NIST guidelines to help your organization avoid the impact of a public breach.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.