Hi [[ session.user.profile.firstName ]]
Sort by:
    • What’s in your Flask? Global Answers from Authentication Testing (NA) What’s in your Flask? Global Answers from Authentication Testing (NA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 4:30 pm UTC 55 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • What’s in your Flask? Global Answers from Authentication Testing (EMEA) What’s in your Flask? Global Answers from Authentication Testing (EMEA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 1:00 pm UTC 51 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • Multiple authentication solutions, but are they all equal? Multiple authentication solutions, but are they all equal? Jason Hart (VP - Cloud Services Architecture, Authentication), SafeNet Recorded: Jun 17 2014 6:00 am UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • Multiple authentication solutions, but are they all equal? Multiple authentication solutions, but are they all equal? Jason Hart, VP, Cloud Services Architecture, Authentication Recorded: May 8 2014 2:00 pm UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 11 2013 1:00 pm UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 10 2013 6:00 am UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience.

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Frictionless Authentication Anywhere and Everywhere Frictionless Authentication Anywhere and Everywhere Jon Speer, Sr. Product Manager, iovation Recorded: Nov 17 2015 6:00 pm UTC 44 mins
    • The enterprise-computing environment is rapidly transitioning to support an increasing demand for unmanaged mobile devices, remote workers, partners, and vendors to easily access corporate resources. With resources distributed in "the cloud,” traditional enterprise authentication methods are not effective for unmanaged devices, and passwords alone are insufficient as a security access control.

      Meanwhile, consumer-facing businesses are using device intelligence to implement strong authentication technologies without adding challenges to the user. Leveraging the same intelligence used to fight credit card fraud, account takeover and other fraudulent behaviors across the globe, iovation's device intelligence empowers organizations to make adaptive, real-time decisions using risk context, including:
      Has this device already been explicitly authorized for this account on a previous visit?
      Has this device been associated with cyber criminal activity or linked to other devices or users that have been?
      Is this device exhibiting anomalous behavior or other risk indicators that suggest the use of evasion techniques or existence of malware?
      Learn how to implement strong 2-factor authentication methods without giving your employees, partners, and vendors a poor user experience.

      Register today for this 45-minute webinar!

      Read more >
    • A Guide to Reducing Authentication TCO by 60% A Guide to Reducing Authentication TCO by 60% Jason Hart, Authentication and Cloud Visionary, SafeNet Recorded: Nov 22 2012 1:00 pm UTC 41 mins
    • Many organizations rarely look closely at the Total Cost of Operation of their authentication solution, and instead make a decision heavily driven by the up-front purchase price. This approach shows that infrastructure investments and management overheads dominate the total cost of the solution, therefore lowering these overheads would reduce Total Cost of Operation.

      Cloud-based authentication services achieve just that saving, while increasing flexibility:

      • Up to 60% savings in Total Cost of Operation
      • 99.999% service availability
      • More effective budget utilization and flexibility with OPEX pricing
      • Up to 90% reduction in administrative overhead costs

      Join your fellow professionals to compare the Total Cost of Opertation of an on-site authentication solutions vs. a cloud-based authentication service, and then further understand the business and technology benefits of cloud-based authentication when evaluating your authentication infrastructure.

      Read more >
    • The Authentication Service 30 minute challenge The Authentication Service 30 minute challenge Jason Hart, Authentication and Cloud Visionary Recorded: Oct 4 2012 1:00 pm UTC 48 mins
    • Can you move or add an Authentication Service in your lunch break?

      An increasingly mobile workforce, the ongoing trend of employee BYOD plus the move to the cloud and virtualised environments is blurring the boundaries of the traditional network security perimeter. Organizations are having difficulty affording, implementing and managing consistent, unified access policies to corporate resources, considering the actual costs of existing solutions is not simply the capex – but also the opex of running the service in deploying, managing and supporting tokens.

      Join your fellow professionals to understand how an Authentication Service can enable companies to pursue a consistent authentication policy across the organization with speed, ease and a significantly reduced spend, by automating and simplifying the deployment and management of a distributed estate of tokens.

      Read more >