Online interaction with customers, employees and partners is more critical than ever and has taken quantum leaps in both the number and complexity of Web transactions while expanding to the cloud and mobile devices. This presents exciting opportunities for new business growth, yet also necessitates
Online interaction with customers, employees and partners is more critical than ever and has taken quantum leaps in both the number and complexity of Web transactions while expanding to the cloud and mobile devices. This presents exciting opportunities for new business growth, yet also necessitates security measures that were previously not considered.
Traditional Web Single Sign-On solutions provide a great foundation for this growth, but Web SSO must now deliver appropriate security to protect the use of new services in cloud and mobile environments. With the “Consumerization of IT,” users often select devices and applications independent of IT. Web SSO solutions must offer the right balance of security and user experience to keep business flowing and customers engaged.
This webcast will examine the expanding Web SSO ecosystem and discuss the range of capabilities that are important in today’s world of Web access security.
RecordedJul 12 201246 mins
Your place is confirmed, we'll send you email reminders
Enterprises and Service Providers are driving down cost, increasing automation, supporting cloud applications and delivering high quality of experience over ordinary broadband networks using a Software-Defined Wide Area Network (SD-WAN). But not all SD-WAN is created equal.
Join this webinar to learn more about the differences in SD-WAN architectures and how Cloud-Delivered SD-WAN with x86-based hardware drives down the cost of wide area networking, increases the automation of deployments and reliably supports cloud-based applications.
No registration required – EMC World 2016 is under way and StorageSwiss is there. Join me as I sit down with George Crump, Lead Analyst at Storage Switzerland. In this live podcast we will do more than just give you the news, we will give you our analysis of what the news means for EMC and for your organization.
Join us live on May 3rd at 9am ET or on-demand afterward. No registration required.
As organizations move into 2nd and 3rd generations of virtualization with VMware, they often experience high latency and unpredictable performance. The traditional disk-based storage they're depending on for their VMware environment is not keeping up. Flash is transforming datacenter cost, performance and capacity to address these challenges.
Join Chris Tsilipounidakis as he examines the benefits of transforming to an All-Flash virtualized datacenter to support virtualized workloads.
As a response to the never-ending bandwidth demand, CSPs are constantly enhancing their networks. Fiber brings superior transport capacity and quality compared to the other broadband media and has therefore become commonplace for CSPs.
This is the first in a series of ‘Winning with Fibre’ webinars. Get a comprehensive outlook on the fibre market and learn how it builds a perfect business opportunity for CSPs. You will gain multiple viewpoints of and hands-on experiences on the topic in the course of the series.
In this joint webinar with Comptel, Analysys Mason and GE Energy Connections, we will discuss the following topics:
-Dean Ramsay, Senior Analyst from Analysys Mason, outlines the fiber market and services as well as how it opens great business avenues for CPS
-James Wheatley, Product Line Manager from GE Energy Connections, shares experiences and lessons learnt from the global CSP market relating to the management of the physical fibre network across the entire plan, design, build, operate and maintain lifecycle
-Simon Osborne, CTO of Comptel Service Orchestration, explains the key principles in the service delivery processes with which CSPs can run healthy business both today and in the future
It’s interesting to see how today, various macro-economic factors are changing the procurement dynamics in the Oil & Gas industry.
The strategic importance of sourcing, procurement and supply management has risen manifold with challenges encompassing; the need for a reliable knowledge and analytics ecosystems to handle vast quantities and scopes of capital project data, multiple risk factors related to workforce scarcity, stakeholder community, cyber-security, regional regulatory stringency and variability and global price volatility and increasing requirements for speed, agility and precision as energy companies compete to extract profits and advantage from the plethora of industry innovation opportunities now underway. Choice of an optimal procurement solution can impact the key operations & profitability of any and every company.
Click here to know more about how Dell's Procurement-as-a-service solutions specifically designed for Oil & Gas industry are pre-empting some of the key trends in the industry to bring to you the future-ready BPO solutions that creates measurable impact to you core business.
Did you know that 31 percent of downtime comes from hardware problems and 13 percent comes from human error? How would you like to minimize or even eliminate these business interruptions?
This webinar discusses what you can do to approach zero downtime for your mission-critical applications. You’ll learn:
•How you can maximize hardware uptime by implementing high availability, geo-clustering, live patching and easy rollback
•How to minimize human error by automating asset management and patch application
•How T-Systems International is using SUSE open source infrastructure to keep its mission-critical systems up and running
Is your company adopting or using cloud this year, but slowed down by security concerns? Our customers have faced the same hurdles you may be grappling with—operational complexity, concerns over encryption, and increasing developer responsibility among them.
Despite these concerns, cloud discussions for our technology and software customers firms have moved from “if” to “how" because of the much-needed flexibility the cloud provides.
In just 30 minutes in our webcast on Wednesday, April 27th, we'll share the challenges our customers are encountering on hybrid cloud and the shape of the solution that will address these. We'll then demo Bracket's agentless security layer as it performs transparent, always-on encryption that your developers can't turn off—and won't even notice.
High Availability doesn’t trump Disaster Recovery and there is nothing simple about creating a recovery capability for your business – unless you have a set of data protection and business continuity services that can be applied intelligently to your workload, managed centrally, and tested non-disruptively. The good news is that developing such a capability, which traditionally required the challenge of selecting among multiple point product solutions then struggling to fit them into a coherent disaster prevention and recovery framework, just got a lot easier.
Join us and learn how DataCore’s Software-Defined Storage platform provides the tools you need and a service management methodology you require to build a fully functional recovery strategy at a cost you can afford.
In up to two-thirds of security breaches, stolen or compromised user credentials belonging to a privileged user with wide-ranging access to sensitive systems, served as the initial attack vector. In this way, attackers can steal sensitive data and wreak havoc. While you must provide access to third parties, you must also manage such high-impact security risks. Join us to learn the top five best practices for regaining control of third-party access, and the processes and technology necessary to stop unauthorized access and damaging breaches.
In this webcast, you’ll learn:
- The identity, access, and security governance processes needed to protect your network
- How to ensure positive user identification to prevent credential theft and misuse
- Techniques to limit access to only those resources required to satisfy work or business requirements
- Preventing the unauthorized commands — and inadvertent mistakes — threatening your network
- Establishing monitoring procedures that flag violations and speed forensic investigations
Dale R. Gardner, CA Technologies PAM, and Jeremiah Cornelius, Senior Security Architect, VMware
Virtualized network systems are inherently more secure than physical networks, since what is deployed can be known with absolute certainty – and therefore can be precisely identified and secured. And because the network is defined in software, connections can be securely defined only as a consequence of policy – rather than trying to add policy to physical network links after they’ve been deployed. Security is built in, rather than bolted on after the fact.
Network virtualization platforms for the Software-Defined Data Center (SDDC) bring the operational model of a virtual machine to your data center network, transforming the economics of network and security operations. This allows you treat your physical network as a pool of transport capacity, with network and security services attached to VMs with a policy-driven approach. Adding specialized protections to monitor and control the activities of privileged users, and to protect and secure the credentials they use are critical to achieving comprehensive security.
Join us for this informative webcast to learn the key components required for protecting the Software-Defined Data Center.
Derek Brink, VP and IT Research Fellow at Aberdeen Group & Sumner Blount, Director, Security Solutions at CA Technologies
The world of security has changed. Security must now be extended to a larger, and more diverse user population. These extended users (partners and consumers in addition to employees) demand a simple, frictionless, and business-oriented user experience, but without sacrificing the confidence that their private information is secure. Aberdeen has shown that organizations that can meet the needs of this increasingly diverse user population can gain significant benefits – up to 60% gain in user productivity and an 80% increase in user satisfaction!
Join Aberdeen Group and CA Technologies for an informative webcast to learn how these results were achieved and how you can leverage these principles in your own environment. We will also explore a major bank’s experience and how they are leveraging identity management and governance capabilities to help transform their business - securely!
John Hawley, VP, Security Strategy, CA Technologies; Brandon Dunlap, Brightfly
The Identity Management market continues to be heavily influenced by several important trends – cloud, mobile, the rise of the user, and increased app velocity, among others. These trends have dramatically shaped the identity landscape, and changed the security strategy and tactics that many companies have adopted. How will these trends continue to impact the identity landscape, and what should organizations do to prepare for it? Join CA Technologies and (ISC)2 on February 4, 2016 at 1:00PM Eastern as we look at the next phase of identity management, and how these and other emerging trends will continue to shape the role of Security. We will also offer best practice guidelines for dealing with these continuing changes.
Derek Brink, VP and IT Research Fellow at Aberdeen Group & Sumner Blount, Director, Security Solutions at CA Technologies
Identity and access management (IAM) initiatives with a focus on users can enable your business, while still supporting their traditional role in the important areas of security, compliance, and reliability.
In the research report "IAM for Everyone: How A Broader Strategic Focus on Users Pays Off," Aberdeen Group’s Derek Brink describes four high-level attributes that can help you quickly assess whether your organization’s IAM initiatives are on a path to achieve similar results:
- IAM is viewed not only as the technical means for control, compliance, and cost efficiencies, but also as an essential strategic business enabler
- Both rewarded risks (eg. enablement) and unrewarded risks (eg, protection) are among the top drivers of your IAM investment
- There is a strong focus on a convenient, streamlined, and personalized user experience
- The performance of your IAM investments are being measured and are helping to produce the desired business value
Join CA Technologies and Aberdeen Group for this highly informative on-demand webinar on IAM as a strategic enabler.
Nick Craig, VP of Payment Security, CA Technologies
Shopping cart abandonment is on the rise – often fueled by complicated checkout processes or card security prompts. In fact, the estimated value of online shopping carts left behind in 2015 was a staggering $3.38 trillion.*
Join this Card Not Present event with Nick Craig, VP of Payment Security, CA Technologies, to learn the methodology that card issuers can implement to streamline the checkout process and win back some of that lost revenue by providing a better, and more secure shopping experience.
Michelle Waugh, VP, Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Each year, security experts at CA Technologies offer predictions about some of the most compelling trends in the identity & access management market. In this webcast, we will bravely review our predictions from 2015, and rate ourselves on how we did. But, more importantly, we will fearlessly offer predictions about the world of identities for 2016, and offer specific guidance for what organizations can be doing now to prepare for these changes. On January 7, 2016 at 1:00PM Eastern, we focus on the future to see what might be coming down the road.
Ankur Karer, Head of Global Pre-Sales of CA Technologies
Payment fraud losses amounted to $16.31 billion last year — with card-not-present fraud responsible for nearly 40 percent of that total at $6.4 billion. Investigating those cases (and resolving those disputes) is a major burden for card issuers; what’s essential to improving the process is to automate investigation and minimize operational overhead.
Join Ankur Karer, Head of Global Pre-Sales of CA Technologies, and MPD CEO Karen Webster for a digital discussion on the best practices for implementing the ideal case management system that can help to improve operational efficiency by prioritizing cases and reducing inbound call volume.
Nick Craig, VP of Sales for CA Digital Payments, CA Technologies
Shopping cart abandonment is on the rise – often fueled by complicated checkout processes or card security issues – with research showing more than $4 trillion worth of merchandise will be left behind in online shopping carts in this year alone.
Watch this on-demand PYMNTS.com webinar where Nick Craig, VP of Sales for CA Digital Payments, CA Technologies and MPD CEO Karen Webster will discuss streamlining the checkout process to combat shopping cart abandonment.
The broad range of modern business SaaS apps available today enable employees to be more productive and collaborative than ever before, while allowing them to work anytime, anywhere and on the devices of their choice. However, the proliferation of SaaS apps and a “bring your own app” trend in the workplace has introduced risks and challenges when it comes to securing and managing access to apps across organizational silos. Join CA Technologies and (ISC)2 on December 10, 2015 at 1:00PM Eastern as we dive into the security, agility and user experience challenges associated with the rise of SaaS adoption, and how leveraging identity-centric security can help you unlock the potential of your organization’s SaaS investments.
As you face an increasing number of identities with the inclusion of different types of business users, techniques such as risk-based access and entitlement catalogs become essential to mitigating the risks to your business.
Join CA Technologies for a look at current trends in the industry such as how increased interaction with business users impacts the identity management lifecycle, and the privileged identity management strategies and techniques necessary to guard against breaches. This session will offer recommendations for increasing engagement with identity services across your open enterprise.
Dale Gardner, Dir, Security Solutions, CA Technologies, Brandon Dunlap, Brightfly
Over a billion records were breached last year in online cyber-attacks. Even though the details of these breaches may differ, they often have the same root cause – inadequate control of privileged user accounts and their actions in increasingly complex hybrid environments. On November 12, 2015 at 1:00PM Eastern, join CA Technologies and (ISC)2 as we examine some of the most notorious breaches and the steps that attackers took to take control of these accounts. You will also learn how Privileged Access Management (PAM) can help prevent successful attacks and protect critical corporate and customer information.
CA Technologies and Jason Cook, VP, Security and CISO for BT Americas
In an IT landscape fueled by mobility, cloud services and the internet of things (IoT), the number of applications, users and devices continues to proliferate rapidly—and without the right controls, so do the risks.
On November 5, 2015, join BT Security and CA Technologies for a webcast that defines a new approach to identity and access management. Attend the webcast and discover:
• How in the application economy, user identities have become the new security perimeter.
• Why so many IT teams are unprepared to contend with the escalating demands of identity and access management.
• How organizations can adopt a cloud-based identity and access management approach that strengthens security and enhances the user experience, while reducing ongoing costs, risks and complexity.
Robert Marti, Sen Principal, and Marty Yam, Sr. Advisor, Authentication Solutions, CA Technologies; Brandon Dunlap
Traditional authentication and authorization defenses against fraudulent access attempts have only slowed down cybercriminals and have made gaining access more difficult for legitimate users. Multi-factor authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session? Join CA Technologies and (ISC)2 on October 15, 2015 at 1:00PM Eastern to learn best practices for reducing your risk of data breaches caused by fraudulent access. During this session, we will explore how user behavioral profiling can enhance authentication security and how risk-aware session management can help prevent session hijacking.
Michelle Waugh, VP Security Solutions, CA Technologies; Brandon Dunlap, Brightfly
Rarely has the landscape of security changed as dramatically as in the past year. Applications are now rightfully driving security strategy across organizations of all sizes. Attacks against your critical systems and information are more insidious than ever before. Your customers are demanding access from a variety of devices, across access channels, along with a consistent, intuitive, and convenient user experience. If that wasn't enough, you need to engage with your developer communities to help build those complementary solutions that you need to grow your business. Join CA Technologies for this first part of a six-part webcast series on September 17, 2015 at 1:00PM Eastern to learn how security leaders can rise to the top of the pack by leveraging these new realities, and grow their business through an innovative security vision and strategy.
Carol Alexander, Senior Director of Product Marketing & Charley Chell, Product Manager for CA Technologies
We live in a world where everything is driven by applications, connectivity, and mobility. Your customers are now far more likely to interact with your enterprise through software than a live person, and employees are conducting more business on mobile devices than traditional laptops and workstations. A critical success factor for thriving in this new reality is the ability for the enterprise to accurately identify users in a way that is both convenient to them and cost effective, while also protecting their identities and data from potential fraudsters.
Join this webcast where Carol Alexander, Head of Authentication Solutions, and Charley Chell, Security Advisor, from CA Technologies will discuss how you can transparently leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction. Learn the key factors and considerations in using contextual authentication within your mobile applications to protect against inappropriate access and data breaches.
John Hawley; VP of Security Strategy at CA Technologies & Hila Gvir; Senior Principal Product Manager at CA Technologies
A successful Consumer-Scale Identity Management Deployment is far more than just adding more users. The user experience becomes critical in the success of the deployment as a new type of user begins to interact directly with the identity infrastructure. This webcast will show how to sell these projects to the business and how to create a user experience that will help ensure its success.
John Hawley, Vice President of Security Strategy at CA Technologies
Consumer-Scale Identity Management Deployments require different approaches than the typical employee use case. However, there are profound benefits - from overall risk reduction to enhanced engagement and loyalty with customers. This webcast will highlight the key challenges in moving identity management from the IT user to a much larger business user population and highlight best practices for success.
As a two part series, this webcast will be followed by "Improving Your User Experience for Successful Consumer-Scale Identity Management", scheduled on August 19th.
Ed Moyle, Director, Emerging Business and Technology Trends, Research/Standards & Academic, ISACA
There’s no doubt about it, smart devices are proliferating – and as they do, security pros have their work cut out for them. Not only are consumer devices on the rise that have embedded networking and computing technology (e.g. televisions and household appliances), but we’re also seeing integration in other areas as well: everything from automobiles to thermostats to smoke detectors now might ship with networking capability built in.
For security practitioners in enterprise, this can have serious ramifications: not only do they potentially require traditional “security hygiene” activities (e.g. patching and monitoring), but they can also introduce other complexities as well. For example in situations where they might find their way into regulatory-governed environments (e.g. the PCI cardholder data environment) or when adoption happens without involvement from IT.
This round table session will discuss how enterprises can approach securing the Internet of Things in their environments and how they can adjust their security programs to ensure that the environment stays protected going forward.
Scott Morrison, Senior Vice President and a Distinguished Engineer at CA Technologies
Chris Poulin, Research Strategist, X-Force at IBM
Gunnar Petersen, Founder/Principle Arctec Group & Visiting Scientist @ Carnegie Mellon
Russell Miller, Director, Security Solutions & Carol Alexander, Head of Product Marketing for Authenticat
Strong authentication and Single Sign-On can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during the session?
Please join Carol Alexander, Director, Authentication Solutions and Russ Miller, Director, Security Solutions to learn how Intelligent Authentication and Single Sign-On including Risk-Aware Session Management can help improve session security.
Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.