Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.
In this webinar you will learn about:
•What is the best network fit for virtualized encryption
•How to implement a virtual network encryption appliance in software-defined network
•What are the cost, operational and performance benefits of virtual encryption
•What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
We will discuss our views on homomorphic encryption for voice, and blockchain and "Blockchain zero knowledge proofs." We will cover use cases for Homomorphic encryption (HE) that is applicable in secure voice conferencing for untrusted environments such as cloud applications. The thinking is that not having a central decryption point, cyber based cached attacks such as TLBleed would not be able to have any effect. This can secure voice in tactical environments. We define tactical as any environment that has limited computing resources, rapidly changing mission requirements, limited connectivity, and high stress. Such environments are typically tactical military deployments, public safety, or government field offices.Read more >
Security and risk management professionals face ever-increasing needs to encrypt various types of sensitive data stored on-premises, in private and public clouds and in hybrid environments in order to protect their organizations in the event of a data breach. Compliance mandates, internal security audits, data residency issues and threats of hackers are driving the requirements for enterprises to develop a centralized enterprise-wide encryption strategy to prioritize sensitive data protection. In addition, regulations, such as the EU General Data Protection Regulation (GDPR), have dramatically increased pressure on security professional leaders to review and revamp their approach to encryption key management.
To meet these needs, security professionals are using a growing number of encryption tools to protect data within a variety of data storage environments. These may be located within local and external IT environments and systems, such as file stores, databases, big data platforms or various clouds. However, encrypting data in each of these environment results in the creation of islands of encryption and diverse key management platforms which increases complexity, costs and risk of data loss.
In this webinar, you will:
• Gain insight into trends that are driving the digital cloud transformation and how key management plays a role
• Understand the importance of developing a centralized approach to encryption key management
• Examine where and when you should encrypt your organization’s data and typical key management use cases
• Learn how to implement an enterprise-wide key management operational model that can reduce cost of ownership and minimize overall risks
As an existing McAfee Endpoint Encryption customer, see what’s new in the encryption product line and what products are available to you! This webcast is provided as a 30 minute overview and includes 5 minutes of Q & A. Prior products that apply to this webcast: (1) McAfee Total Protection for Data (TDA), (2) McAfee Drive Encryption (DED) AKA EEPC, EEMAC and Endpoint Encryption for PCs and Macs, (3) McAfee File & Removable Media Protection (DFF) AKA Files & Folders, EEFF, EERM.
Join this webinar on Endpoint Encryption and learn about:
• McAfee Complete Data Protection Suites – New
• How these new suites are becoming available to you
• How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
• Use cases on leveraging the synergy between Intel® vPro™ and McAfee Data Protection technologies
• Management of Native Encryption v1.0
• Reference material available to you at the Endpoint Encryption Community site
Pat Correia is responsible for Endpoint Encryption Product Marketing at McAfee. Previous to Intel, Pat held various technical and product marketing positions at Intel for 15 years, driving many key projects in Pentium chipset, Pentium and Xeon processors, industry platform initiatives including PCI Express and Ultra Mobile PC, and corporate brand campaigns for Core 2 Duo based multi-core platforms and software, all targeted to OEMs and ODMs world-wide.
Deepak Kolingivadi is a Product Manager in the Management Business Unit at McAfee and responsible for formulating the strategy for products like McAfee ePO Deep Command and McAfee Risk Advisor. Deepak has 15 years of industry experience, of which 11 years have been in the field of Digital Security. Deepak is experienced in developing product strategy and roadmap for security products as well as conceptualizing and engineering them.
In recent years, cryptographic researchers have theorized that secure computation — the ability to perform mathematical operations on encrypted data — was still decades from being realized in practice.
This webinar will show how that timeline has been leapfrogged using a variety of cryptographic approaches to enable secure computation for real world applications today, which enable operations such as sort, search and mathematical computation. The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.
Join this webinar to learn about the following:
- Alternative cryptographic approaches that can enable secure computation
- How to preserve application functionality to drive increased business user satisfaction
- General performance impact and ranges for various techniques
- Business use case scenarios that expose different methods to manage and secure data access
In today’s environment data protection is more critical than ever and businesses are responding. This 13th edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Thales eSecurity, reveals how increased cloud use and accelerated compliance initiatives are driving adoption of new encryption strategies. Join Dr. Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:
• Growth in encryption and Hardware Security Module (HSM) usage
• The importance of performance, scalability and consistent policy enforcement across enterprise and cloud use cases for encryption solutions
• Trends in encryption deployment across multiple vertical markets and geographies that are useful for benchmarking
From the physical and virtual data center to the cloud, Gemalto's SafeNet encryption and tokenization solutions help organizations remain protected, compliant, and in control. Gemalto's solutions enable organizations to secure sensitive data in databases, applications, storage systems, virtualized platforms, and cloud environments.Read more >
Law enforcement and defense organizations need secure access to sensitive data, and to provide services and to collaborate with others, while protecting the public, and any confidential information. Faced with these challenges, meeting compliance regulations such as Criminal Justice Information Services Security Policy (CJIS-SP) , is a priority for most organizations, especially as audits draw near.
Did you know that the Criminal Justice Information Services Security Policy (CJIS-SP) requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency
“When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via cryptographic mechanisms (encryption)”
Join us for an informative webinar where you will learn how to secure your data in transit as it moves across your internal and external network, to help ensure compliance with the FBI mandate.
•Overview of CJIS-SP mandate
Network vulnerabilities and how Ethernet encryption can help secure data in motion
•Use cases – hear how various agencies have successfully deployed network encryption to secure their data and meet audit requirements
•Mapping solutions to the needs of your organization
For more information on dealing with multi-factor authentication in the CJIS audit, check our part one in the series: https://www.brighttalk.com/webcast/2037/258091
How do you prevent the loss of secure or confidential information of your organisation to an untrusted environment or user?
Have you met various regulatory requirements regarding financial, health or personal Identifiable Information to avoid risk of massive fines if a breach occurs?
Join Rahul Kumar, Country Manager India, WinMagic, for a 30 min webinar and ask him why Encryption should be an important pillar of your data security strategy.
Between Edward Snowden, the NSA, and the FBI we’ve all been hearing the term “encryption” thrown around a lot. But what do you really know about encryption? And as a business, what do you need to know? How does it work, and what are your options?
In this 60 minute session, Andy Nieto, IT Strategist for DataMotion, provides a clear, simple overview of encryption, and will include plenty of time for questions, Topics include:
The who, what, where, why, when, and how’s of encryption
The difference between proprietary and open source encryption
Encrypting data at rest
Encrypting data in motion
Mobile devices and encryption
This session will cover one of the more important aspects of GDPR: Encryption and Tokenization. In this session you will learn the relevance of Encryption and Tokenization as it applies to GDPR and what is the difference between the two security methods.Read more >
In this webinar, we’ll explore the Policy Based Encryptions service – highlighting how it works, how to trigger a policy, and the user experience. We’ll also cover advanced features and industry best practices to equip you with the tools needed to protect your organization.Read more >
Encryption has long been used to help secure corporate data at the endpoint, to protect company information from unauthorized access by would-be bad actors. As more and more corporations are moving data and solutions to the cloud as a way of reducing costs, there are often questions about how encryption and digital forensics might work in a virtual environment. During this webinar, we’ll discuss the role of encryption in forensics, and how it can be adopted in cloud-based solutions, as well to ensure data security as your data moves. no matter where your data resides.Read more >
Attribute Based Encryption (ABE) bundles strong confidentiality with very flexible access control policies. Here, we present the ABE toolkit developed in ETSI TC CYBER through the standards ETSI TS 103 458 and ETSI TS 103 532. This webinar will introduce the challenges related to access control and protection of personal data and describe the ABE toolkit in detail. It will also provide real-world scenarios as example and an outlook on future developments of the toolkit.Read more >
Fintech startup companies are disrupting the financial services industry, raising more than $120 billion over the last three years. Although these new entrants are changing how money and markets operate, they must still do business within the realities of regulations like GDPR and Australia's Notifiable Data Breaches scheme that the rest of the financial industry must operate. This means that data security and trust are just as important to Fintech companies as it is to traditional banks.
Fintech companies are unique because of their agility, lean operations and that most are built using the cloud and digital technologies that banks are just now adopting. While this makes Fintech companies more nimble and they can enter new markets faster, it also presents more complexities for how Fintech companies need to manage security and meet compliance mandates.
In this webinar you will learn about:
•Fintech compliance and regulation from a data protection perspective.
•How to build a secure the breach strategy using a case study from the physical world
•Understand key elements for building cloud-based data security strategy that fits the needs of Fintech companies
Learn some practical steps for implementing encryption to reduce your organization’s HIPAA compliance risk.
In this webinar renowned security and privacy expert, Chris Apgar, CISSP, discusses options for protecting PHI data at rest, what steps to take and how to implement them. Andy Nieto, Health IT Strategist, will cover the role encryption and secure messaging can play in protecting PHI data in motion. Together, they’ll offer best practices you can follow to lower your risk, including:
•How to get started – assessing your risk
•What your options are – how to protect PHI
•What’s the budget – dispelling the cost myth
•Using encryption appropriately – balancing the need to encrypt
with getting work done
•Maintaining ease of use and efficient workflow
•Mobile devices and encryption
(Note video voice starts at 40 seconds)
This twelfth installment of the Ponemon Global Encryption Trends study, sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies. Although compliance remains a top driver for encryption, the gap has narrowed as organizations move to protect sensitive IP and customer information from both external and internal threats. Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:
• Variation in encryption and key management trends across multiple vertical industries
• Attitudes regarding protection of sensitive data and control of keys in the cloud
• Types of data most commonly encrypted, and associated applications that perform the encryption
• The role of Hardware Security Modules (HSMs) in addressing cloud and enterprise encryption and key management use cases.
The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.
About the presenter:
Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.
Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst.
Supporting more business operations at a faster pace with a lower total cost of ownership with higher levels of security is a request that is likely familiar to many IT leaders today. Luckily, these demands are attainable via a hyperconverged infrastructure which allows data-at-rest encryption natively. Fornetix and Nutanix have partnered to create an integration that allows for flexibility without compromising security.
During this webcast, attendees will learn about:
1) Boosting security on your Nutanix-powered infrastructure with Fornetix Key Orchestration
2) Leverage industry standards to enable a trusted and regulated communication channel between technology providers
3) Unifying encryption key management across your organization for heightened governance and control