Hi [[ session.user.profile.firstName ]]
Sort by:
    • Maintain regulatory compliance in a virtual infrastructure with SafeNet ProtectV
      Maintain regulatory compliance in a virtual infrastructure with SafeNet ProtectV Papi Menon, Product Management, SafeNet Recorded: Jun 26 2013 3:00 pm UTC 31 mins
    • The savings with virtualization and cloud are compelling – but not without risk. Deployed in virtually every large enterprise, virtualization technologies are now ubiquitous—but there are still a number of untapped opportunities that organizations can exploit by expanding their virtualization deployments. Often, it is security and regulatory compliance concerns that have inhibited more widespread usage of virtualization technologies.

      Learn how solutions from VMware and SafeNet enable enterprises to virtualize the infrastructure that houses the most business-critical and sensitive applications and assets, while at the same time maximizing compliance, availability and security.

      Join your fellow professionals for this technically focused webinar with the Product Line Manager for SafeNet ProtectV.

      Read more >
    • Vodafone and SafeNet Secure Cloud Access
      Vodafone and SafeNet Secure Cloud Access Jofre Palau, Principal Product Manager at Vodafone and Jason Hart, VP of Cloud Solutions at SafeNet Recorded: Feb 5 2013 9:10 pm UTC 4 mins
    • Security is no longer confined to an organization's perimeters.
      For years, user authentication has served a vital role in organizations security policies—securing access to their networks, protecting the identities of their users, and ensuring their users are who they claim to be. However, as new business environments emerge - like cloud and the increased use of mobile devices, organizations are finding they need to quickly adopt new models for authenticating their users in order to offset potential threats.

      In this webcast, Vodafone, and SafeNet will discuss:
      • Emerging authentication models organizations are adopting
      • New approaches to user authentication, as a result of demanding cloud and virtualized environments that are transforming traditional security paradigms
      • Intelligent authentication strategies that can drive value and cost savings
      • Methods to ensure these implementations will scale as business needs evolve and new environments emerge.

      Read more >
    • SafeNet & AWS:  Learn How to Build a Trusted and Compliant Cloud Environment
      SafeNet & AWS:  Learn How to Build a Trusted and Compliant Cloud Environment Ryan Holland, Solution Architect, AWS Imam Sheikh, Sr. Product Manager – Cloud and Compliance, SafeNet Recorded: May 23 2012 3:00 pm UTC 44 mins
    • As organisations increasingly leverage virtualisation and public cloud architectures with delivery models such as IaaS and PaaS, encryption is increasingly becoming a requirement to ensure sensitive assets remain secured in dynamic, multi-tenant environments.
      Join your fellow professionals from AWS & SafeNet  to understand what it means to offer a compliance ready infrastructure and then to hear live examples of cloud migration. Then discover how encryption plays a critical role, whether to combat increasingly sophisticated cyber attacks or to ensure compliance with internal policies or regulatory mandates, in order to maintain trust and ownership of your data in the cloud or virtualised environments.
      Ryan Holland, Solution Architect, AWS
      Ryan Holland brings over 15 years of IT industry experience to his role as Ecosystem Solutions Architect for Amazon Web Services where he focuses on enabling security partners.  Prior to joining AWS Ryan worked at Trend Micro where he managed technical business development for Cloud and Data Center Security and previously to that several roles in areas of data security and encryption technologies.  Ryan Holland holds a bachelors of science degree in computer engineering from the University of California at Irvine as well as a CCIE certification.
      Imam Sheikh, Sr. Product Manager—Cloud and Compliance, SafeNet
      Imam Sheikh is the product manager for virtualization and compliance products at SafeNet. He has more than 15 years of high-tech industry experience, specializing in security. During his career, he has held several technology leadership positions. Imam holds an MBA from Santa Clara University, and he has spent the last decade at SafeNet in technical and management roles.

      Read more >
    • Secure Enterprise & Cloud Applications w/ SafeNet Next Generation Authentication
      Secure Enterprise & Cloud Applications w/ SafeNet Next Generation Authentication Danna Bethlehem Recorded: Oct 29 2014 2:00 pm UTC 42 mins
    • The ability to access any corporate application, whether it resides on the network or in the cloud, ensures your employees have mobility and business agility. Anywhere, anytime remote access from any device however, increases management loads for IT professionals and obscures visibility into which employees are accessing what applications – and when.

      Next Generation Authentication from SafeNet offers frictionless authentication delivered from the cloud, combined with transparency, trust and control, allowing you to secure access to diverse applications and meet security regulations in a shifting IT landscape.

      Featuring fully automated processes and support for a broad IT eco-system, frictionless authentication empowers organizations to protect numerous applications with strong authentication. A broad range of authentication methods and form factors ensures optimal risk mitigation and end user satisfaction.

      Join us to find out how Next Generation Authentication from SafeNet let’s you more easily secure more applications, protect more identities - and adapt to changing IT environments – while achieving the right balance for your business and security needs.

      Read more >
    • The Cyber Security Playbook: Securing Budget and Forming Allies
      The Cyber Security Playbook: Securing Budget and Forming Allies SafeNet Recorded: Jan 20 2015 4:30 pm UTC 49 mins
    • As a defender of sensitive information, you are no stranger to the ever-changing breadth of security threats your organization faces. Not only are you expected to protect sensitive corporate and customer information from those threats, you are also expected to support massive IT infrastructure changes around where sensitive data is being stored and who and how it can be accessed. All of this with little internal enthusiasm for new projects and a stagnant security budget!

      Whether you are a CISO, CIO, or any employee responsible for protecting sensitive information it is time to fight for the resources you deserve!

      This session will reveal new strategies for:

      •Finding financial and operational support for information security initiatives across the organization;
      •Enlisting new, and at times, surprising allies for your information security projects;
      •Building a virtual team of ‘defenders’ across the organization.

      REGISTER TODAY for this insightful best practices session

      Read more >