Hi [[ session.user.profile.firstName ]]
Sort by:
    • Briefing On Demand - Authentication in Healthcare - Six Ways to Improve Security
      Briefing On Demand - Authentication in Healthcare - Six Ways to Improve Security Mor Ahuvia, Product Marketing Mgr, Authentication; Brandon Dunlap, Moderator Recorded: May 22 2017 2:30 pm UTC 58 mins
    • Healthcare organizations are entrusted with securing sensitive patient records, which also happen to be high-worth targets for hackers and fraudsters. Suffering the highest cost per-breached-record across industries, the healthcare sector also contends with maintaining compliance with mandates such as HIPAA, EPCS, eIDAS, and HITECH (aka EHR Incentive programs). How can strong authentication help comply with these mandates, and what use cases does it address?
      Join Gemalto and (ISC)2 to learn:
      · Why electronic healthcare records are a prime target for both compliance fines and fraudsters
      · How do healthcare organizations comply with mandates such as HIPAA, HITECH, EPCS and eIDAS?
      · Who in the healthcare business chain has to comply with these mandates?
      · Six strong authentication use cases for improving security and compliance in healthcare organizations and their business associates

      Read more >
    • What’s in your Flask? Global Answers from Authentication Testing (NA)
      What’s in your Flask? Global Answers from Authentication Testing (NA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 4:30 pm UTC 55 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • What’s in your Flask? Global Answers from Authentication Testing (EMEA)
      What’s in your Flask? Global Answers from Authentication Testing (EMEA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 1:00 pm UTC 51 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • Multiple authentication solutions, but are they all equal?
      Multiple authentication solutions, but are they all equal? Jason Hart (VP - Cloud Services Architecture, Authentication), SafeNet Recorded: Jun 17 2014 6:00 am UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • Multiple authentication solutions, but are they all equal?
      Multiple authentication solutions, but are they all equal? Jason Hart, VP, Cloud Services Architecture, Authentication Recorded: May 8 2014 2:00 pm UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • Fulfilling the Promise of Voice Authentication: The Passive Approach
      Fulfilling the Promise of Voice Authentication: The Passive Approach Vipul Vyas, VP Solutions, Victrio; Joe Schmid, VP, Product Management of Authentication Solutions, Victrio Recorded: Apr 24 2013 6:00 pm UTC 47 mins
    • A new generation of voice biometrics is being deployed in call centers. Technological advancements now enable "passive" authentication with high levels of accuracy, which overcomes historical challenges to customer adoption of voice authentication.

      Participants in this webinar will learn about the new approach to caller authentication and fraud detection, and hear how major financial institutions are implementing passive voice biometrics in the call center.

      What you'll learn:
      * A primer on "passive voice biometrics" highlighting enrollment & verification
      * Underlying new technologies: Passive operation, dual screening, multi-factor analysis
      * Real-world field implementations showing business results and performance metrics

      Who should attend:
      * Executives and managers in customer care and call centers who want to know alternatives for strong, convenient user authentication
      * Experts in information security and access control<
      * Fraud and risk management specialists

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance
      Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 11 2013 1:00 pm UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance
      Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 10 2013 6:00 am UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience.

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Frictionless Authentication Anywhere and Everywhere
      Frictionless Authentication Anywhere and Everywhere Jon Speer, Sr. Product Manager, iovation Recorded: Nov 17 2015 6:00 pm UTC 44 mins
    • The enterprise-computing environment is rapidly transitioning to support an increasing demand for unmanaged mobile devices, remote workers, partners, and vendors to easily access corporate resources. With resources distributed in "the cloud,” traditional enterprise authentication methods are not effective for unmanaged devices, and passwords alone are insufficient as a security access control.

      Meanwhile, consumer-facing businesses are using device intelligence to implement strong authentication technologies without adding challenges to the user. Leveraging the same intelligence used to fight credit card fraud, account takeover and other fraudulent behaviors across the globe, iovation's device intelligence empowers organizations to make adaptive, real-time decisions using risk context, including:
      Has this device already been explicitly authorized for this account on a previous visit?
      Has this device been associated with cyber criminal activity or linked to other devices or users that have been?
      Is this device exhibiting anomalous behavior or other risk indicators that suggest the use of evasion techniques or existence of malware?
      Learn how to implement strong 2-factor authentication methods without giving your employees, partners, and vendors a poor user experience.

      Register today for this 45-minute webinar!

      Read more >
    • A Guide to Reducing Authentication TCO by 60%
      A Guide to Reducing Authentication TCO by 60% Jason Hart, Authentication and Cloud Visionary, SafeNet Recorded: Nov 22 2012 1:00 pm UTC 41 mins
    • Many organizations rarely look closely at the Total Cost of Operation of their authentication solution, and instead make a decision heavily driven by the up-front purchase price. This approach shows that infrastructure investments and management overheads dominate the total cost of the solution, therefore lowering these overheads would reduce Total Cost of Operation.

      Cloud-based authentication services achieve just that saving, while increasing flexibility:

      • Up to 60% savings in Total Cost of Operation
      • 99.999% service availability
      • More effective budget utilization and flexibility with OPEX pricing
      • Up to 90% reduction in administrative overhead costs

      Join your fellow professionals to compare the Total Cost of Opertation of an on-site authentication solutions vs. a cloud-based authentication service, and then further understand the business and technology benefits of cloud-based authentication when evaluating your authentication infrastructure.

      Read more >
    • The Authentication Service 30 minute challenge
      The Authentication Service 30 minute challenge Jason Hart, Authentication and Cloud Visionary Recorded: Oct 4 2012 1:00 pm UTC 48 mins
    • Can you move or add an Authentication Service in your lunch break?

      An increasingly mobile workforce, the ongoing trend of employee BYOD plus the move to the cloud and virtualised environments is blurring the boundaries of the traditional network security perimeter. Organizations are having difficulty affording, implementing and managing consistent, unified access policies to corporate resources, considering the actual costs of existing solutions is not simply the capex – but also the opex of running the service in deploying, managing and supporting tokens.

      Join your fellow professionals to understand how an Authentication Service can enable companies to pursue a consistent authentication policy across the organization with speed, ease and a significantly reduced spend, by automating and simplifying the deployment and management of a distributed estate of tokens.

      Read more >