Hi [[ session.user.profile.firstName ]]
Sort by:
    • Implementing Virtualized Network Encryption to Secure SD-WANs
      Implementing Virtualized Network Encryption to Secure SD-WANs Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas Recorded: Jun 21 2018 3:00 pm UTC 60 mins
    • Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.

      In this webinar you will learn about:
      •What is the best network fit for virtualized encryption
      •How to implement a virtual network encryption appliance in software-defined network
      •What are the cost, operational and performance benefits of virtual encryption
      •What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4

      Read more >
    • McAfee Endpoint Encryption: What's New Webcast for Existing Customers
      McAfee Endpoint Encryption: What's New Webcast for Existing Customers Pat Correia, Product Marketing Manager, Endpoint Encryption, McAfee & Deepak Kolingivadi, Product Manager, Management Busines Recorded: Nov 20 2013 6:00 pm UTC 20 mins
    • As an existing McAfee Endpoint Encryption customer, see what’s new in the encryption product line and what products are available to you! This webcast is provided as a 30 minute overview and includes 5 minutes of Q & A. Prior products that apply to this webcast: (1) McAfee Total Protection for Data (TDA), (2) McAfee Drive Encryption (DED) AKA EEPC, EEMAC and Endpoint Encryption for PCs and Macs, (3) McAfee File & Removable Media Protection (DFF) AKA Files & Folders, EEFF, EERM.

      Join this webinar on Endpoint Encryption and learn about:
      • McAfee Complete Data Protection Suites – New
      • How these new suites are becoming available to you
      • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
      • Use cases on leveraging the synergy between Intel® vPro™ and McAfee Data Protection technologies
      • Management of Native Encryption v1.0
      • Reference material available to you at the Endpoint Encryption Community site

      Pat Correia is responsible for Endpoint Encryption Product Marketing at McAfee. Previous to Intel, Pat held various technical and product marketing positions at Intel for 15 years, driving many key projects in Pentium chipset, Pentium and Xeon processors, industry platform initiatives including PCI Express and Ultra Mobile PC, and corporate brand campaigns for Core 2 Duo based multi-core platforms and software, all targeted to OEMs and ODMs world-wide.
      Deepak Kolingivadi is a Product Manager in the Management Business Unit at McAfee and responsible for formulating the strategy for products like McAfee ePO Deep Command and McAfee Risk Advisor. Deepak has 15 years of industry experience, of which 11 years have been in the field of Digital Security. Deepak is experienced in developing product strategy and roadmap for security products as well as conceptualizing and engineering them.

      Read more >
    • Homomorphic Encryption for Your Business: Fact, Fiction, and Hype
      Homomorphic Encryption for Your Business: Fact, Fiction, and Hype Harold Byun, VP Products, Baffle Upcoming: Sep 12 2018 6:00 pm UTC 60 mins
    • In recent years, cryptographic researchers have theorized that secure computation — the ability to perform mathematical operations on encrypted data — was still decades from being realized in practice.

      This webinar will show how that timeline has been leapfrogged using a variety of cryptographic approaches to enable secure computation for real world applications today, which enable operations such as sort, search and mathematical computation. The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.

      Join this webinar to learn about the following:

      - Alternative cryptographic approaches that can enable secure computation
      - How to preserve application functionality to drive increased business user satisfaction
      - General performance impact and ranges for various techniques
      - Business use case scenarios that expose different methods to manage and secure data access

      Read more >
    • Simple Facts About Encryption
      Simple Facts About Encryption Andy Nieto Recorded: Jun 14 2018 3:10 pm UTC 48 mins
    • Between Edward Snowden, the NSA, and the FBI we’ve all been hearing the term “encryption” thrown around a lot. But what do you really know about encryption? And as a business, what do you need to know? How does it work, and what are your options?
      In this 60 minute session, Andy Nieto, IT Strategist for DataMotion, provides a clear, simple overview of encryption, and will include plenty of time for questions, Topics include:

      The who, what, where, why, when, and how’s of encryption
      The difference between proprietary and open source encryption
      Encrypting data at rest
      Encrypting data in motion
      Key management
      Mobile devices and encryption

      Read more >
    • Law Enforcement Data On the Move: Don’t make CJI a Crime
      Law Enforcement Data On the Move: Don’t make CJI a Crime Stan Mesceda, Encryption Expert at Gemalto Recorded: Jul 20 2017 3:00 pm UTC 57 mins
    • Law enforcement and defense organizations need secure access to sensitive data, and to provide services and to collaborate with others, while protecting the public, and any confidential information. Faced with these challenges, meeting compliance regulations such as Criminal Justice Information Services Security Policy (CJIS-SP) , is a priority for most organizations, especially as audits draw near.
      Did you know that the Criminal Justice Information Services Security Policy (CJIS-SP) requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency
      “When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via cryptographic mechanisms (encryption)”

      Join us for an informative webinar where you will learn how to secure your data in transit as it moves across your internal and external network, to help ensure compliance with the FBI mandate.
      Attendee takeaways:
      •Overview of CJIS-SP mandate
      Network vulnerabilities and how Ethernet encryption can help secure data in motion
      •Use cases – hear how various agencies have successfully deployed network encryption to secure their data and meet audit requirements
      •Mapping solutions to the needs of your organization

      For more information on dealing with multi-factor authentication in the CJIS audit, check our part one in the series: https://www.brighttalk.com/webcast/2037/258091

      Read more >
    • Data Encryption for the Cloud-First Era
      Data Encryption for the Cloud-First Era Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc. Recorded: May 18 2017 5:00 pm UTC 58 mins
    • The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

      About the presenter:

      Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

      Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 

      Read more >
    • GDPR: Encryption - How do I best ensure sensitive data is protected?
      GDPR: Encryption - How do I best ensure sensitive data is protected? Nathan Turajski, Data Security PMM Lead, Micro Focus Recorded: Mar 29 2018 7:50 pm UTC 16 mins
    • You need a proven, standards-based approach that meets GDPR criteria for the use of encryption and pseudonymisation to protect personal data, without breaking existing business process.

      To effectively address the GDPR, you need an integrated strategy that can address the complete information lifecycle—from data discovery and classification to enforcing reliable data protection. Encryption, tokenisation and data masking are proven tools for risk exposure reduction that can help you to meet your GDPR anonymisation and pseudonymisation data privacy requirements.

      Join this webinar, to learn more about Voltage SecureData, and the Micro Focus Data Security portfolio with technologies that include format preserving encryption (FPE), tokenization and key management and how data privacy can be enforced on your most sensitive data for compliance with privacy mandates.

      Read more >