Hi [[ session.user.profile.firstName ]]
Sort by:
    • Briefing On Demand - Authentication in Healthcare - Six Ways to Improve Security
      Briefing On Demand - Authentication in Healthcare - Six Ways to Improve Security Mor Ahuvia, Product Marketing Mgr, Authentication; Brandon Dunlap, Moderator Recorded: May 22 2017 2:30 pm UTC 58 mins
    • Healthcare organizations are entrusted with securing sensitive patient records, which also happen to be high-worth targets for hackers and fraudsters. Suffering the highest cost per-breached-record across industries, the healthcare sector also contends with maintaining compliance with mandates such as HIPAA, EPCS, eIDAS, and HITECH (aka EHR Incentive programs). How can strong authentication help comply with these mandates, and what use cases does it address?
      Join Gemalto and (ISC)2 to learn:
      · Why electronic healthcare records are a prime target for both compliance fines and fraudsters
      · How do healthcare organizations comply with mandates such as HIPAA, HITECH, EPCS and eIDAS?
      · Who in the healthcare business chain has to comply with these mandates?
      · Six strong authentication use cases for improving security and compliance in healthcare organizations and their business associates

      Read more >
    • What’s in your Flask? Global Answers from Authentication Testing (NA)
      What’s in your Flask? Global Answers from Authentication Testing (NA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 4:30 pm UTC 55 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • What’s in your Flask? Global Answers from Authentication Testing (EMEA)
      What’s in your Flask? Global Answers from Authentication Testing (EMEA) Amanda Capes-Davis, Chair Person - International Cell Line Authentication Committee (ICLAC) Recorded: Oct 6 2015 1:00 pm UTC 51 mins
    • Cell culture underpins research throughout the life sciences. Continuous cell lines have been used as culture models for many cell types, and assembled into panels for drug discovery and development. However, problems like cross-contamination are quite common and can render some cell lines unsuitable as research models. Authentic cells are typically overgrown by the contaminant over several passages to give a misidentified or false cell line.

      Misidentified cell lines can be detected through authentication testing. Short tandem repeat (STR) profiling was subsequently introduced as an international reference method, and a consensus standard for human cell line authentication published by the American National Standards Institute (ANSI). International agreement has allowed all laboratories to compare their cell line stocks, resulting in a new wave of misidentified cell lines being discovered.

      Funding bodies and journals are moving to set requirements for reporting of preclinical research. A good understanding of cell line provenance is also essential.

      Read more >
    • Cloud Security: Identity Attacks That Exploit Your Broken Authentication
      Cloud Security: Identity Attacks That Exploit Your Broken Authentication Teju Shyamsundar, Okta, Sr. Product Marketing Manager Upcoming: Oct 24 2018 6:00 pm UTC 60 mins
    • It’s no secret that today’s hackers are smarter than ever before - a motivated hacker can use a variety of different methods to steal passwords from unsuspecting users.

      While two-factor authentication solutions have been around for a while, they're no longer comprehensive enough to defend the new perimeter. Join us to learn the anatomy of common identity attacks, and how to keep hackers out of your organization.

      We’ll discuss:

      Identity attacks that exploit insecure methods of authentication
      How to add a smart layer of security over your critical apps, services, and devices
      What to look for in a multi-factor authentication solution

      Speaker: Teju Shyamsundar, Okta, Sr. Product Marketing Manager

      Bio: Teju is a Product Marketing Manager on Okta's product team, focusing on integrations across Okta's set of core products. She is responsible for driving the value of the integrations across not just Okta's products, but also integrations with the vendors that Okta partners with. Prior to Okta, Teju was a field engineer at Microsoft, focusing on getting customers setup with enterprise mobility deployments.

      Read more >
    • Multiple authentication solutions, but are they all equal?
      Multiple authentication solutions, but are they all equal? Jason Hart (VP - Cloud Services Architecture, Authentication), SafeNet Recorded: Jun 17 2014 6:00 am UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • Multiple authentication solutions, but are they all equal?
      Multiple authentication solutions, but are they all equal? Jason Hart, VP, Cloud Services Architecture, Authentication Recorded: May 8 2014 2:00 pm UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • GlobalProtect Best Practices:  Authentication
      GlobalProtect Best Practices: Authentication Siva Rajaskaran, Sr. Technical Marketing Engineer & Brian Tokuyoshi, Sr. Product Marketing Manager Recorded: Nov 9 2017 6:00 pm UTC 62 mins
    • If you are planning to deploy GlobalProtect, attend this webinar and get an overview on important authentication use cases and integrations. This is an architect-level technical deep dive into GlobalProtect functionality, straight from the product experts. Join us and bring your technical questions for a Q&A session direct with the GlobalProtect product managers and technical engineers.

      In this session, learn about how to deploy GlobalProtect with:

      1.Two Factor Authentication (2FA) with RADIUS or SAML for On-Demand Remote Access VPN
      2.Two Factor Authentication (2FA) with RADIUS or SAML and client certificate for Always-On VPN
      3.MFA (Multi Factor Authentication) for privileged resource access
      4.Transparent authentication for user-id with Internal Gateway
      5.Group Mapping and User-ID for Security Policy and Visibility

      Read more >
    • Fulfilling the Promise of Voice Authentication: The Passive Approach
      Fulfilling the Promise of Voice Authentication: The Passive Approach Vipul Vyas, VP Solutions, Victrio; Joe Schmid, VP, Product Management of Authentication Solutions, Victrio Recorded: Apr 24 2013 6:00 pm UTC 47 mins
    • A new generation of voice biometrics is being deployed in call centers. Technological advancements now enable "passive" authentication with high levels of accuracy, which overcomes historical challenges to customer adoption of voice authentication.

      Participants in this webinar will learn about the new approach to caller authentication and fraud detection, and hear how major financial institutions are implementing passive voice biometrics in the call center.

      What you'll learn:
      * A primer on "passive voice biometrics" highlighting enrollment & verification
      * Underlying new technologies: Passive operation, dual screening, multi-factor analysis
      * Real-world field implementations showing business results and performance metrics

      Who should attend:
      * Executives and managers in customer care and call centers who want to know alternatives for strong, convenient user authentication
      * Experts in information security and access control<
      * Fraud and risk management specialists

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance
      Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 11 2013 1:00 pm UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Next Gen Authentication: Walk the security tightrope without losing your balance
      Next Gen Authentication: Walk the security tightrope without losing your balance Jason Hart, SafeNet, VP of Cloud and Authentication Solutions Recorded: Jul 10 2013 6:00 am UTC 45 mins
    • Achieving the Convenience /Security Balance with Next Generation Authentication:

      A recent SafeNet IT security survey shows a clear trend toward the broader adoption of two-factor authentication and its implementation across a wider range of use cases. This trend reflects acknowledgement among IT professionals that secure access to enterprise and cloud resources is a number one priority. The challenge for IT is balancing security necessities with the need to keep costs down, and making sure that users are not overburdened with inconvenient security routines.

      Join your fellow professionals for an IT best practices session on Next Generation Authentication in which we will discuss how you can walk this security tightrope without losing the balance between security and the user experience.

      Then we will discuss how the latest innovations in two factor authentication can help you successfully traverse the convenience / security balancing act and still come out ahead on cost, without having to compromise between security or convenience.

      Read more >
    • Frictionless Authentication Anywhere and Everywhere
      Frictionless Authentication Anywhere and Everywhere Jon Speer, Sr. Product Manager, iovation Recorded: Nov 17 2015 6:00 pm UTC 44 mins
    • The enterprise-computing environment is rapidly transitioning to support an increasing demand for unmanaged mobile devices, remote workers, partners, and vendors to easily access corporate resources. With resources distributed in "the cloud,” traditional enterprise authentication methods are not effective for unmanaged devices, and passwords alone are insufficient as a security access control.

      Meanwhile, consumer-facing businesses are using device intelligence to implement strong authentication technologies without adding challenges to the user. Leveraging the same intelligence used to fight credit card fraud, account takeover and other fraudulent behaviors across the globe, iovation's device intelligence empowers organizations to make adaptive, real-time decisions using risk context, including:
      Has this device already been explicitly authorized for this account on a previous visit?
      Has this device been associated with cyber criminal activity or linked to other devices or users that have been?
      Is this device exhibiting anomalous behavior or other risk indicators that suggest the use of evasion techniques or existence of malware?
      Learn how to implement strong 2-factor authentication methods without giving your employees, partners, and vendors a poor user experience.

      Register today for this 45-minute webinar!

      Read more >
    • Transforming Financial Services IAM with Biometric Authentication
      Transforming Financial Services IAM with Biometric Authentication John Spencer, Chief Product Officer, Veridium | Ross Penny, Global Head of Sales Engineering, Veridium Recorded: Jun 21 2018 5:00 pm UTC 60 mins
    • Financial services have always done identity management. It began as the teller or manager knowing each customer. Next came signature matching, passbooks, and – if you had a lock box in a vault – a key. These systems were inflexible and inconvenient on purpose. With the advent of the computer age, these organizations simply adopted the digital analogs of these physical systems: PINs and passwords. These increased flexibility – a customer or employee could access an account at any time from practically anywhere – but sacrificed security for the sake of convenience. To be secure, PINs and passwords need to be long, complex, and changed regularly: Three things customers have no interest in.

      Today, identity management is undergoing a revolutionary change as biometrics allow companies to combine the convenience people want with the security that both people and organizations need. Learn how three financial services companies from across the world, a private investment firm, a prominent Swiss bank, and a major trading organization, have deployed a biometric authentication platform as part of their identity and access management strategy. Veridium’s Chief Product Officer, John Spencer, will explore the key factors that make up a secure biometric authentication platform, and Global Head of Sales Engineering, Ross Penny, will discuss the details of deploying within different environments.

      In this webinar we’ll discuss:
      • Using enterprise-ready solutions to replace passwords with multi-factor biometric authentication – including 4 Fingers TouchlessID, face recognition, and touch recognition – for employee and customer access.
      • Maintaining a highly secure-yet-convenient user experience across any channel: ATM, app, and personal computer.
      • Providing users with fast, easy, and seamless enrollment and verification.

      Read more >
    • A look at frictionless authentication
      A look at frictionless authentication Chris Ryan - Experian, Mike Gross - Experian, & Frances Zelazny - BioCatch Upcoming: Nov 1 2018 6:00 pm UTC 105 mins
    • The paradigm for identity risk management and authentication is changing. In the new paradigm, context and data available for a specific type of interaction must drive analytics. Instead of just looking for commonality, we need to make better use of data that is unique.

      - Consumer/business interactions vary widely in terms of the amount of data they provide to drive risk assessment.
      - The amount and range of data available to assess identity risk is now so rich and varied across interactions that the analytical approach must also change.

      Frictionless authentication: The “passive” use case focuses provides a completely frictionless experience for the end user, while thoroughly authenticating the user’s identity as a background process; usually requires a higher level of confidence driven by the transaction value.

      -Built around the use of passive authentication methods, especially behavioral biometrics(BioCatch), and device intelligence using Danal and FraudNet.
      - New, unique data and a new approach to analytics and machine learning to make informed identity decisions to the right level of confidence.

      Read more >
    • Authentication 2023: What Logging On Will Look Like 5 Years From Now
      Authentication 2023: What Logging On Will Look Like 5 Years From Now Jeff Carpenter, Director of Identity and Access Management Solutions, Crossmatch Upcoming: Nov 14 2018 8:00 pm UTC 45 mins
    • Passwords are passé. Two-factor is cumbersome and unwieldy. The bad guys are relentless and cunning. Yet, the future of authentication has never looked brighter. With new advances in biometrics, behavioral, risk-based technology and AI, organizations are turning back the tide of breaches.

      In this session, IAM and biometric identity expert Jeff Carpenter looks at what authentication security looks like in the year 2023. How the act of merely approaching your PC or device will provide all the necessary behavioral, location and biometric data needed to successfully authenticate you. The trend toward more convenient, frictionless methods will continue to its logical conclusion. Learn how to get ready for this identity sea change.

      About the presenter:

      Jeff Carpenter is Director of Identity and Access Management solutions at Crossmatch, part of HID Global. He has held positions with top-tier cybersecurity and technology companies, most recently with RSA, a Dell Technologies company in 2017 before joining Crossmatch. Jeff has a passion for technology, passwords, biometrics and the future of enterprise authentication.

      He holds both a Certified Information Systems Security Professional (CISSP) and a Certified Cloud Security Professional (CCSP) designation.

      Read more >