Advanced Authentication Goes Mainstream: Remote and Mobile Users are the Norm

David Gormley, Senior Principal, CA Technologies Security Business Unit
Advanced Authentication is no longer a solution for a sub set of users that access sensitive information on a regular basis. The number and types of breaches are on the rise and concerns about social engineering and identity theft are widespread….this all leads to the logical justification for advanced authentication for everyone.
More and more employees are accessing sensitive applications remotely. Many of them expect to access applications from multiple endpoints including mobile devices. Partners and customers are inherently remote and business owners want to empower them with access to new powerful online applications.

With this as the backdrop and the increasing number of Internet threats and attacks in the news ….it is all the more important to have a risk appropriate, multi-layered authentication solution. It is also critical to have a versatile approach to authentication that can encompass multiple methods and be flexible enough to react quickly to new threats or actual breaches if necessary.
Jul 12 2011
43 mins
Advanced Authentication Goes Mainstream: Remote and Mobile Users are the Norm
Join us for this summit:
More from this community:

Virtualization

Webinars and videos

  • Live and recorded (1867)
  • Upcoming (67)
  • Date
  • Rating
  • Views
  • Rob Sherwood, CTO of Big Switch Networks, will present an end-to-end open source technology stack for SDN R&D, spanning switch hardware, software and SDN controllers. He will touch on the Open Compute Projects' switch design, Open Network Linux, Project Indigo, Project Floodlight and others. He will also discuss how these projects fit together, their various evolutionary paths, and how this stack fits in the landscape of emerging commercial and open source SDN products.
  • Automation is a powerful tool. It strips time and cost out of processes, minimizes errors, and frees up skilled staff to focus on higher value activities. Most IT teams have already capitalized in some part on automation, and most IT professionals can see the potential in extending automation across the enterprise. But how do you embed automation in the company IT DNA? Where do you start in the journey from script automation towards enterprise-wide process automation?

    In this session you will learn how you can scale automation to an enterprise-level through the adoption of a Center of Excellence. Our proven approach creates a cohesive framework for automation and breaks through silos, so your organization benefits from economies of scale and the advantages that automation brings.
  • The IT industry is currently undergoing one of the most radical disruptions in its history, as traditional data centers are being replaced with cloud computing environments. New workloads such as mobile computing, social networking, and big data analytics are driving the need for a more dynamic, agile approach to enterprise computing. It is most prevalent in the networks within and between modern data centers.

    This presentation will discuss a new approach to application-aware data networking based on open industry standards (the Open Datacenter Interoperable Network, ODIN). In particular, we focus on recent approaches to SDN and NFV which deliver real value in next generation data networks. We will also discuss case studies which demonstrate the value of emerging cloud based, software defined environments.
  • The IT industry is currently undergoing one of the most radical disruptions in its history, as traditional data centers are being replaced with cloud computing environments. New workloads such as mobile computing, social networking, and big data analytics are driving the need for a more dynamic, agile approach to enterprise computing. It is most prevalent in the networks within and between modern data centers.

    This presentation will discuss a new approach to application-aware data networking based on open industry standards (the Open Datacenter Interoperable Network, ODIN). In particular, we focus on recent approaches to SDN and NFV which deliver real value in next generation data networks. We will also discuss case studies which demonstrate the value of emerging cloud based, software defined environments.
  • Scientists at CERN deployed PowerEdge C class servers to increase computing power and process data from the CMS experiment at the world-famous Large Hadron Collider (LHC) as they searched for the Higgs boson.
  • "Technology underpins everything at the Glasgow 2014 Commonwealth Games, and Dell plays an integral part, providing an end-to-end solution comprising all of the laptops, desktops, servers, storage and services we need"
    Brian Nourse, Chief Information Officer, Glasgow 2014 Commonwealth Games, United Kingdom
  • The Operations Bridge is “the” solution for IT Operations to effectively address the challenges they face when it comes to managing the new style of IT: complex composite applications, virtualized environments, cloud-based services, big data, and a variety of management solutions from different vendors. In this session, you will learn how the HP Operations Bridge solution allows you to take up those challenges and consolidate all your existing IT monitoring solutions, providing a unique solution to maximize efficiency and improve runtime and performance of your IT services.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • Channel
  • Channel profile
Up Down
  • Be Smarter than a Hacker. Intelligent Authentication Must be Strong & Risk-Based May 8 2014 4:00 pm UTC 60 mins
    In the past – and even now - IT departments have employed authentication methods that required end users only to provide a valid user ID and a password. Hackers have been successfully targeting user names and passwords as an entry point for malicious attacks for some time. To stay ahead of hackers, you need best practice Intelligent Authentication methods that include both strong and risk-based authentication.

    Please join Carole Gunst, Sr. Principal and Charley Chell, Sr. Director, Security Solutions from CA Technologies to learn which Intelligent Authentication methods are essential and what you can do to protect your organization with authentication methods that are both strong and risk-based.
  • Enabling and Securing Multi-Channel Customer Interactions Apr 24 2014 5:00 pm UTC 60 mins
    Today's organizations are moving more interactions online through web, mobile and API-enabled web services to empower their customers and increase revenue. Managing the high volume of customer identities and enabling secure interactions across a set of web, mobile and hybrid apps, from a variety of different devices can be challenging.
    On April 24th at 1pm ET, please join David Gormley, Director, Security Solutions for CA Technologies, to learn how you can securely accelerate the delivery of new applications and services, while improving the customer experience across multiple channels of interaction.
  • Single Sign-On is Critical to Business Objectives (Global Event) Recorded: Apr 16 2014 30 mins
    Dynamic forces such as cloud, mobile and social media are forcing IT leaders to change their approach to security. This raises an important question: how should you manage identity and access effectively while juggling business objectives of speed, cost effectiveness and positive customer experience?

    With identity as the new perimeter, single sign-on can be the foundation of both managing risk and reaping the benefits of these new business strategies.

    Please join Ken Ang, Security Solution Strategist for CA Technologies, to learn more about management of user identities throughout their lifecycle and access rights across multiple platforms, with a single, scalable and reliable solutions.
  • Identity Management: The Foundation of Secure Business Recorded: Mar 12 2014 45 mins
    Providing convenient user access to systems and applications, while managing risk and governing access, remains the key challenge that IT and Security need to overcome to support critical business functions. As the number of users multiplies and devices, systems and platforms grow increasingly diverse, sophisticated identity management capabilities such as automated provisioning and end-user self-service functions are required to support business growth in the emerging open enterprise.

    Please join us for this webcast, when Merritt Maxim, Director, and Bob Burgess, Advisor, Security Solutions from CA Technologies will discuss how identity management and governance solutions from CA Technologies can facilitate the common identity-related tasks such as provisioning, entitlements certification and access requests to enable secure business growth and a simplified user experience.
  • A Dream or Necessity? Achieving Unified Web and API Access (Global Event) Recorded: Mar 12 2014 48 mins
    The multi-channel organization is here and you can thank the Application Programming Interface (API). While the Web has served as the primary form of user engagement, the mobile channel has expanded how organizations reach consumers and employees, with the API acting as the fundamental connectivity point. As your organization rolls out multi-channel environments, can you avoid siloed management and security, or are there practical steps you can take to achieve unified access?

    Please join Cheng Jang Thye, Principal Business Tech Architect for CA Technologies, to discuss how unified access can be achieved by leveraging your existing web application management investment when deploying API security and management solutions. You will learn the opportunities APIs can provide to your business, the required components of an API solution, how CA Layer 7 API solutions integrate with CA SiteMinder web access solutions, and get an overview of the recently available policy integration with the release of CA Layer 7 API Gateway 8.0.
  • Identity Management and Governance for SAP Environments Recorded: Mar 5 2014 43 mins
    When requesting access to systems or applications, business users need to know the potential risks of such actions to enable compliance with internal business policies and government regulations. The cost for non-compliance can be high. As a result, organizations are seeking solutions that combine automated Segregation of Duties (SoD) risk analysis with robust capabilities for user provisioning and user management, to manage user access and prevent out-of-policy activities.

    Please join Bob Burgess, Solution Strategy Advisor at CA Technologies, and James Rice, Director of Customer Solutions at Greenlight Technologies, to learn how you can obtain better visibility into your SAP/GRC environments and manage the risk of over-privileged users and SoD violations.
  • The Threat of Session Hijacking and How You Can Prevent It Recorded: Feb 19 2014 41 mins
    Session Hijacking is a serious security threat where the cookie used to authenticate a user to a remote server is stolen and then used by an attacker to assume the victim’s identity and take over their session. Since the user session appears to be valid, it is difficult to detect once the hijacking has occurred, so pre-emptive steps need to be taken upfront.

    Please join Chris Wraight, Director, Security Solutions and Aaron Berman, Security Solutions Advisor at CA Technologies to learn why this security gap exists and explore solutions to assist in preventing such attacks.
  • Security Update: 2013 Takeaways and Predictions for 2014 (Global Event) Recorded: Feb 18 2014 59 mins
    Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business, intellectual property and customer privacy continues to present new opportunities and challenges for security professionals.

    As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, what we learnt from them and also predict what we expect will happen in the world of identity and cyber-security in the next 12 months.

    Our takeaways and predictions are based on gathering thoughts and ideas from many customers, practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear and practical guide for your enterprise security strategy and roadmap.

    Please join Reuben Koh, Director, Security Strategy for CA Technologies, for a thought provoking, actionable discussion on where we’ve come and where we are heading.
  • Security Series Part 6: Unleashing the Power of Big Data through Secure APIs Recorded: Feb 13 2014 62 mins
    Quite often what makes an organization unique can be found in the volumes of data it has stored and hidden from the outside world. But while access is prevented and data is protected, new revenue streams are prohibited. Please join us to learn how securely externalizing your core Big Data assets through a Secure API Data Lens can result in new business models and revenue streams never attainable until now.
  • It’s Okay to be a Control Freak! (Over Privileged Identities) Recorded: Feb 11 2014 58 mins
    When it comes to managing privileged identities, it’s ok to be a “control freak” in order to prevent harmful results such as data loss and destruction, malicious damage, fines, and lawsuits. Auditors are also requiring that their clients proactively demonstrate the ability to control privileged users and report on their activities. Managing passwords for privileged accounts is a starting point, but there is more you can do to help secure your IT environment.

    In this webcast, join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy, Security Solutions for CA Technologies, to learn how you can help ensure that your environments are protected by implementing least privilege access and fine-grained access controls.
  • SaaS Versus On-Premise…Deployment Reality Recorded: Feb 5 2014 39 mins
    Webinar 2 builds upon the information presented in the Webinar 1: SaaS Versus On-Premise…What Are My Options? In Webinar 2, we take a deeper dive into the decision making process that leads to the right model for your enterprise systems or utility services.

    Some of the issues that need analysis when making a cloud/no-cloud decision include analysis of the costs, understanding the use cases, looking at security and governance, and the value of time-to-market and agility. The idea is to weigh the positives and the negatives, understand the core metrics, and then make a decision based upon the best available information.

    We’ll explore how to understand the deployment realities when considering an on-premises versus SaaS solution. We’ll suggest a decision model and step-by-step process to define the core metrics for the decision, and provide some helpful experiences from the trenches from those who have made these critical calls in the last several years.

    Topics covered include:

    •Step 1: Comparing Costs
    •Step 2: Understanding Use Cases
    •Step 3: Considering Security and Governance
    •Step 4: Considering Time-to-Market and Agility
    •Step 5: Pulling the Trigger
    •Step 6: Considering Operations
  • Your APIs Are Exposed: Avoiding the Top 5 API Security Vulnerabilities Recorded: Jan 29 2014 54 mins
    APIs are quickly becoming the hacker’s new favorite attack vector. Why wouldn’t they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. But there’s a new wrinkle. As demonstrated during the widely publicized Snapchat data breach, a private API can be exploited just as easily as a public API. So what measures can you take to strengthen your security position?

    In this webcast, Francois Lascelles, Chief Architect, CA Technologies Layer 7, will discuss recent high profile API data breaches, the top 5 API security vulnerabilities that are most impactful to today’s enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
  • SaaS Versus On-Premise…What Are My Options? Recorded: Jan 23 2014 44 mins
    The growth of cloud computing is due largely to the growth of software-as-a-service (SaaS). The SaaS consumption model, in many cases, provides more agility and cost efficiencies than traditional methods of consuming software. While SaaS is indeed a consideration, there are instances where it’s just not a fit. Recognizing when to go SaaS and when to stay on-premise is a problem that enterprises will wrestle with now and into the future, as cloud computing continues to gather momentum.

    The truth is that the SaaS model is not always a good fit, and neither are traditional approaches to software deployment and operations. You have to consider many options, requirements, and technologies to understand what’s right for your specific needs.

    In this Webinar, we’ll take the mystery out of how to select SaaS-delivered solutions or traditional on-premise approaches. We’ll explore the requirements to consider, and the types of technologies available.

    Topic covered, include:

    •Defining the options, including SaaS and on-premise
    •Understanding the technology options
    •Understanding the cost advantages
    •Understanding fit-for-purpose
    •Charting a path to the right decision
  • The New Age of Identity: Survival of the Federated Recorded: Jan 22 2014 59 mins
    As the ability to adapt to new trends such as social identity, SaaS and mobile users becomes a competitive differentiator, many organizations are leveraging identity federation to both support new customer engagement and control the sharing of information externally. In this webcast, featured Gartner analyst Mary Ruddy will discuss five key patterns that are driving current trends in identity federation, the effect of those patterns on broader identity and access management (IAM) architecture, and how organizations should be adapting to these changes. In this session, you will learn how to identify which situations would benefit most from identity federation, how to determine the appropriate authentication level and the role that federation standards such as OAuth and OpenID Connect play in your identity federation deployment.

    Merritt Maxim, Director, Security Solutions for CA Technologies will also provide key insight on how identity federation can help securely enable your business in the new ‘open’ economy and what you can do to control shared information while maintaining availability and accessibility.
  • Security Series Part 5: Key Takeaways from 2013 & Predictions for 2014 Recorded: Jan 16 2014 59 mins
    Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business and privacy continues to present new opportunities and evolve in the marketplace. As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, and predict what we expect will happen in the world of identity and cyber-security in the coming year. Our takeaways and predictions are based on gathering thoughts and ideas from many practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear understanding of where the world of identity and security is going. Please join us for a thought provoking, actionable discussion on where we’ve come and where we are heading in the identity marketplace.
  • Security Series Part 4: The Economics of Digital Identity Recorded: Dec 19 2013 61 mins
    Digital identities help solve a crucial problem in today’s highly interconnected IT world-namely knowing the identity of the individual interacting with you. Unfortunately, there are no ways to perfectly determine the identity of a person or thing in cyberspace. Even though there are numerous attributes associated to a person’s identity, these attributes or even identities can be changed, masked or dumped. This session will look at how organizations can leverage these existing digital identities in a manner that does not increase risk or impede user productivity and satisfaction and also share some recent research from the Ponemon Institute on this topic.
  • Your APIs Are Passing Sensitive Data. Are You Compliant? Recorded: Dec 12 2013 61 mins
    The API economy has arrived and business models are being reshaped to take advantage of the financial opportunities that application development has to offer. However, the data exposed through externally facing Application Programming Interfaces (APIs) can often be sensitive or highly regulated. This can put your company at risk of data compromise or non-compliance.

    Please join Nimrod Vax, VP, Security Solutions and Dana Crane, Sr. Principal, Security Solutions, CA Technologies, to learn about the business opportunities that APIs can deliver, and what you can do to reduce the risk of compromising data, while ultimately maintaining compliance.
  • Strong Authentication is Taking A Risky Turn - Are You Prepared? Recorded: Dec 11 2013 60 mins
    As online threats grow increasingly sophisticated and password weaknesses continue to be exposed, strong authentication has become more popular. Many organizations struggling to balance better protection with user convenience are turning to risk-based authentication. This allows them to evaluate contextual factors such as device identification, geolocation and IP address to determine risk levels, without impacting the experience of legitimate users.

    Please join guest speaker Andras Cser, VP and Principal Analyst at Forrester Research, Inc., and David Gormley, Director, Security Solutions at CA Technologies to learn about the trends and best practices for layered authentication methods and how you can implement a risk-based layer of protection against identity theft, data breaches and fraud.
  • Achieve Unified Web & API Access with CA SiteMinder® & CA Layer 7 Recorded: Dec 4 2013 51 mins
    The multi-channel organization is here and you can thank the Application Programming Interface (API). While the Web has served as the primary form of user engagement, the mobile channel has expanded how organizations reach consumers and employees, with the API acting as the fundamental connectivity point. As your organizations rolls out multi-channel environments, can you avoid siloed management and security, or are there practical steps you can take to achieve unified access?

    Please join Ben Urbanski, Sr. Solution Architect from CA Layer 7 Technologies and Herb Mehlhorn, Advisor Product Management for CA SiteMinder, discuss how unified access can be achieved by leveraging your existing web application management investment when deploying API security and management solutions. You will understand the opportunities APIs can provide to your business, the required components of an API solution, how CA Layer 7 API solutions integrate with CA SiteMinder web access solutions; and get an overview of the recently available policy integration with the release of CA Layer 7 API Gateway 8.0.
  • Security Series Part 3: Accelerate Mobile App Delivery: API Security for DevOps Recorded: Nov 21 2013 61 mins
    The relationship between Development and Operations continues to become more intertwined as cloud and mobile service expectations rise. Faster application release cycles and improved quality equates to improved operational performance and customer satisfaction. But how can good API Security & Management practices help to accelerate the delivery of mobile apps? And what’s the most effective way to secure them? Please join us to discuss API Security & Management practices to improve your DevOps application delivery process.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Advanced Authentication Goes Mainstream: Remote and Mobile Users are the Norm
  • Live at: Jul 12 2011 7:45 pm
  • Presented by: David Gormley, Senior Principal, CA Technologies Security Business Unit
  • From:
Your email has been sent.
or close
You must be logged in to email this