Hi [[ session.user.profile.firstName ]]
Sort by:
    • Briefing On Demand - Authentication in Healthcare - Six Ways to Improve Security
      Briefing On Demand - Authentication in Healthcare - Six Ways to Improve Security Mor Ahuvia, Product Marketing Mgr, Authentication; Brandon Dunlap, Moderator Recorded: May 22 2017 2:30 pm UTC 58 mins
    • Healthcare organizations are entrusted with securing sensitive patient records, which also happen to be high-worth targets for hackers and fraudsters. Suffering the highest cost per-breached-record across industries, the healthcare sector also contends with maintaining compliance with mandates such as HIPAA, EPCS, eIDAS, and HITECH (aka EHR Incentive programs). How can strong authentication help comply with these mandates, and what use cases does it address?
      Join Gemalto and (ISC)2 to learn:
      · Why electronic healthcare records are a prime target for both compliance fines and fraudsters
      · How do healthcare organizations comply with mandates such as HIPAA, HITECH, EPCS and eIDAS?
      · Who in the healthcare business chain has to comply with these mandates?
      · Six strong authentication use cases for improving security and compliance in healthcare organizations and their business associates

      Read more >
    • What’s in your Flask? Global Answers from Authentication Testing (NA)
      What’s in your Flask? Global Answers from Authentication Testing (NA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 4:30 pm UTC 55 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • What’s in your Flask? Global Answers from Authentication Testing (EMEA)
      What’s in your Flask? Global Answers from Authentication Testing (EMEA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 1:00 pm UTC 51 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • Multiple authentication solutions, but are they all equal?
      Multiple authentication solutions, but are they all equal? Jason Hart (VP - Cloud Services Architecture, Authentication), SafeNet Recorded: Jun 17 2014 6:00 am UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • Multiple authentication solutions, but are they all equal?
      Multiple authentication solutions, but are they all equal? Jason Hart, VP, Cloud Services Architecture, Authentication Recorded: May 8 2014 2:00 pm UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • GlobalProtect Best Practices:  Authentication
      GlobalProtect Best Practices: Authentication Siva Rajaskaran, Sr. Technical Marketing Engineer & Brian Tokuyoshi, Sr. Product Marketing Manager Recorded: Nov 9 2017 6:00 pm UTC 62 mins
    • If you are planning to deploy GlobalProtect, attend this webinar and get an overview on important authentication use cases and integrations. This is an architect-level technical deep dive into GlobalProtect functionality, straight from the product experts. Join us and bring your technical questions for a Q&A session direct with the GlobalProtect product managers and technical engineers.

      In this session, learn about how to deploy GlobalProtect with:

      1.Two Factor Authentication (2FA) with RADIUS or SAML for On-Demand Remote Access VPN
      2.Two Factor Authentication (2FA) with RADIUS or SAML and client certificate for Always-On VPN
      3.MFA (Multi Factor Authentication) for privileged resource access
      4.Transparent authentication for user-id with Internal Gateway
      5.Group Mapping and User-ID for Security Policy and Visibility

      Read more >
    • Fulfilling the Promise of Voice Authentication: The Passive Approach
      Fulfilling the Promise of Voice Authentication: The Passive Approach Vipul Vyas, VP Solutions, Victrio; Joe Schmid, VP, Product Management of Authentication Solutions, Victrio Recorded: Apr 24 2013 6:00 pm UTC 47 mins
    • A new generation of voice biometrics is being deployed in call centers. Technological advancements now enable "passive" authentication with high levels of accuracy, which overcomes historical challenges to customer adoption of voice authentication.

      Participants in this webinar will learn about the new approach to caller authentication and fraud detection, and hear how major financial institutions are implementing passive voice biometrics in the call center.

      What you'll learn:
      * A primer on "passive voice biometrics" highlighting enrollment & verification
      * Underlying new technologies: Passive operation, dual screening, multi-factor analysis
      * Real-world field implementations showing business results and performance metrics

      Who should attend:
      * Executives and managers in customer care and call centers who want to know alternatives for strong, convenient user authentication
      * Experts in information security and access control<
      * Fraud and risk management specialists

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance
      Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 11 2013 1:00 pm UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance
      Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 10 2013 6:00 am UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience.

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Frictionless Authentication Anywhere and Everywhere
      Frictionless Authentication Anywhere and Everywhere Jon Speer, Sr. Product Manager, iovation Recorded: Nov 17 2015 6:00 pm UTC 44 mins
    • The enterprise-computing environment is rapidly transitioning to support an increasing demand for unmanaged mobile devices, remote workers, partners, and vendors to easily access corporate resources. With resources distributed in "the cloud,” traditional enterprise authentication methods are not effective for unmanaged devices, and passwords alone are insufficient as a security access control.

      Meanwhile, consumer-facing businesses are using device intelligence to implement strong authentication technologies without adding challenges to the user. Leveraging the same intelligence used to fight credit card fraud, account takeover and other fraudulent behaviors across the globe, iovation's device intelligence empowers organizations to make adaptive, real-time decisions using risk context, including:
      Has this device already been explicitly authorized for this account on a previous visit?
      Has this device been associated with cyber criminal activity or linked to other devices or users that have been?
      Is this device exhibiting anomalous behavior or other risk indicators that suggest the use of evasion techniques or existence of malware?
      Learn how to implement strong 2-factor authentication methods without giving your employees, partners, and vendors a poor user experience.

      Register today for this 45-minute webinar!

      Read more >
    • Transforming Financial Services IAM with Biometric Authentication
      Transforming Financial Services IAM with Biometric Authentication John Spencer, Chief Product Officer, Veridium | Ross Penny, Global Head of Sales Engineering, Veridium Recorded: Jun 21 2018 5:00 pm UTC 60 mins
    • Financial services have always done identity management. It began as the teller or manager knowing each customer. Next came signature matching, passbooks, and – if you had a lock box in a vault – a key. These systems were inflexible and inconvenient on purpose. With the advent of the computer age, these organizations simply adopted the digital analogs of these physical systems: PINs and passwords. These increased flexibility – a customer or employee could access an account at any time from practically anywhere – but sacrificed security for the sake of convenience. To be secure, PINs and passwords need to be long, complex, and changed regularly: Three things customers have no interest in.

      Today, identity management is undergoing a revolutionary change as biometrics allow companies to combine the convenience people want with the security that both people and organizations need. Learn how three financial services companies from across the world, a private investment firm, a prominent Swiss bank, and a major trading organization, have deployed a biometric authentication platform as part of their identity and access management strategy. Veridium’s Chief Product Officer, John Spencer, will explore the key factors that make up a secure biometric authentication platform, and Global Head of Sales Engineering, Ross Penny, will discuss the details of deploying within different environments.

      In this webinar we’ll discuss:
      • Using enterprise-ready solutions to replace passwords with multi-factor biometric authentication – including 4 Fingers TouchlessID, face recognition, and touch recognition – for employee and customer access.
      • Maintaining a highly secure-yet-convenient user experience across any channel: ATM, app, and personal computer.
      • Providing users with fast, easy, and seamless enrollment and verification.

      Read more >
    • A Guide to Reducing Authentication TCO by 60%
      A Guide to Reducing Authentication TCO by 60% Jason Hart, Authentication and Cloud Visionary, SafeNet Recorded: Nov 22 2012 1:00 pm UTC 41 mins
    • Many organizations rarely look closely at the Total Cost of Operation of their authentication solution, and instead make a decision heavily driven by the up-front purchase price. This approach shows that infrastructure investments and management overheads dominate the total cost of the solution, therefore lowering these overheads would reduce Total Cost of Operation.

      Cloud-based authentication services achieve just that saving, while increasing flexibility:

      • Up to 60% savings in Total Cost of Operation
      • 99.999% service availability
      • More effective budget utilization and flexibility with OPEX pricing
      • Up to 90% reduction in administrative overhead costs

      Join your fellow professionals to compare the Total Cost of Opertation of an on-site authentication solutions vs. a cloud-based authentication service, and then further understand the business and technology benefits of cloud-based authentication when evaluating your authentication infrastructure.

      Read more >
    • The Authentication Service 30 minute challenge
      The Authentication Service 30 minute challenge Jason Hart, Authentication and Cloud Visionary Recorded: Oct 4 2012 1:00 pm UTC 48 mins
    • Can you move or add an Authentication Service in your lunch break?

      An increasingly mobile workforce, the ongoing trend of employee BYOD plus the move to the cloud and virtualised environments is blurring the boundaries of the traditional network security perimeter. Organizations are having difficulty affording, implementing and managing consistent, unified access policies to corporate resources, considering the actual costs of existing solutions is not simply the capex – but also the opex of running the service in deploying, managing and supporting tokens.

      Join your fellow professionals to understand how an Authentication Service can enable companies to pursue a consistent authentication policy across the organization with speed, ease and a significantly reduced spend, by automating and simplifying the deployment and management of a distributed estate of tokens.

      Read more >