Hi [[ session.user.profile.firstName ]]
Sort by:
    • The Token is Dead. Long Live the Token The Token is Dead. Long Live the Token A Panel of Security Experts Recorded: Jul 20 2011 1:00 pm UTC 60 mins
    • Remember when strong authentication meant a “one-time password” hardware token for your VPN? Now, we’ve got a workforce full of road warriors, access control considerations for new Cloud-based applications, and executives coming out of the woodwork to get their shiny iPad2 on the network. Throw in the current “breach of the day” climate, and you have to think – what’s coming next for authentication?

      An insightful panel discussion between the security industry experts below:

      Mike Rothman, Analyst and President of Securosis Research
      Andrew Moloney, Independent Security Consultant
      Doron Cohen, VP Technology, Identity Protection, SafeNet
      Mike Smart, EMEA Solutions Director, SafeNet - Facilitator

      Read more >
    • The Token is dead. Long live the Token. The Token is dead. Long live the Token. Mike Rothman, Analyst and President of Securosis Research and Andrew Young, Vice President of Authentication at SafeNet Recorded: Jun 2 2011 6:00 pm UTC 58 mins
    • Remember when strong authentication meant a “one time password” hardware token for your VPN? Now, we’ve got a workforce full of road warriors, access control considerations for new Cloud-based applications, and executives coming out of the woodwork to get their shiny iPad2 on the network. Throw in the current “breach of the day” climate, and you have to think – what’s coming next for authentication?

      Join this expert webcast with Securosis and SafeNet, and get pragmatic advice from the best in the business – learn how to prepare and evolve your approach to authentication, and address users and data spilling not just over the four corners of the earth, but up into the Cloud as well.

      Topics we’ll cover:

      •Hardware or software: how do you choose, and why should you need to?
      •Authentication goes Cloud: extending identity federation and SSO to your SaaS applications
      •Don’t fear the iPad: credentialing and managing mobile devices without opening security holes
      •Controlling the chaos: best practices for striking the balance between security, ease of use, manageability and cost

      Read more >
    • Understanding Security Tokenization and PCI Compliance Understanding Security Tokenization and PCI Compliance Terence Spies, Chief Technologist, HP Security Voltage Recorded: Oct 20 2015 4:00 pm UTC 64 mins
    • Consumer-facing organizations of all types face increasing IT complexity and a future where more applications will have PANs, tokens, and payment tokens flowing in the system. Understanding tokenization is critical to the security of applications, and to having solid justification for reducing audit scope in a tokenized environment.

      With newer methods of tokenization such as Apple Pay gaining ground in the marketplace, there is a need to develop deeper technical and architectural understanding of the available methods of protecting PAN data, and how security tokenization fits from the perspective of the end-to-end architecture of payments ecosystems.

      In this session our experts will explain how the tokenization system is secured within the network and how it maps tokens into PANs. Attendees will learn:

      The latest on PCI 3.0 and updates related to SSL and TLS encryption protocols and vulnerabilities that can put payment data at risk,
      Security and PCI-related aspects of payment vs. security tokenization in user networks, and
      Gain a deeper understanding of standards and options for protecting PAN data in multi-platform enterprise environments.

      Read more >
    • DDoS: Aged Protocols are Fuelling Attacks DDoS: Aged Protocols are Fuelling Attacks Martin McKeay, Security Advocate, Akamai Technologies Recorded: Sep 15 2015 9:00 am UTC 36 mins
    • They say old protocols never die. Okay, no one really says that, but it’s what happens in reality. If you look around a little, you can still find organisations with token ring networks while dial-up modems still account for a small, but significant part of Internet usage worldwide. And then there are the current protocols that simply never get updated. DNS and NTP are staples of the Internet that are absolutely necessary.

      Martin McKeay, Akamai’s Security Advocate for EMEA, will explore the dangers of some of the outdated and unpatched protocols on the Internet today. These antiquated communication methods are being used and abused by malicious actors to send traffic and attacks against your network. Explore how to protect yourself, and learn good network hygiene practices to make sure your organisation is not part of the problem.

      Read more >
    • An Introduction and Demo of Ethan Group's Ethoria Cloud Authentication An Introduction and Demo of Ethan Group's Ethoria Cloud Authentication Alex McEwan, Business Development Manager & Guest Presenter Andrew Younger, Senior Security Consultant, CISSP Recorded: Dec 10 2013 12:00 am UTC 60 mins
    • Ethoria Cloud Authentication Can Save RSA SecurID Customers up to 60% of Token Management Costs:

      Ethan Group's Ethoria Cloud Service is a fully managed service, hosted in Australia and built on SafeNet Authentication Services technology. This enables businesses to extend the use of Two-Factor Authentication to the cloud while reducing token management and ensuring an excellent user experience.

      The challenge is how to continuing using your RSA SecurID tokens while reducing administration costs. With Ethoria Cloud Services your RSA tokens will continue to work until they expire, but with no need for you to manage ACE server and Databases!

      Join us along with SafeNet’s Senior Engineer Andrew Younger for a "Live" demonstration and session on Ethoria Cloud Authentication in which we will show how you can achieve the “balance”. In this session you will learn:

      •How Ethoria Cloud Authentication will save you time and money managing your two-factor authentication.
      •How existing RSA tokens will continue to work.
      •How to broaden your use-cases to include cloud applications like Google apps or Salesforce.com.
      •See all of the automation functions in action.

      Read more >
    • Sales Essentials:  How to Sell One Time Password Sales Essentials: How to Sell One Time Password Johan Dalnert, McAfee, Senior Product Marketing Manager Recorded: Dec 16 2013 3:15 pm UTC 21 mins
    • McAfee One Time Password enables rapid deployment of two-factor authentication, including soft tokens, ensuring secure access for remote and mobile users, while maintaining compliance. The solution is designed to minimize acquisition costs and operational overhead through competitive price, automation, and self-help capabilities. Mobile tokens and short message service (SMS) offers significantly lower costs than hardware tokens. With ready-to use integrations to leading VPNs, remote access solutions, and web portals, the solution is easy to deploy, scale, and maintain.

      Learn how to sell McAfee One Time Password; including how to qualify an opportunity, handle customer objections and counter the competition.

      Read more >
    • What does reporting season tell us about future income and growth? What does reporting season tell us about future income and growth? Dr Don Hamson Recorded: Sep 16 2014 1:00 am UTC 21 mins
    • 61% of the ASX/S&P300 by market capitalisation reported earnings in August. In income terms it was a strong reporting period with the average dividends increasing 12.5% versus last year.

      During our 15 minute webinar Dr Don Hamson (MD of the Plato Income Fund) will discuss the latest reporting season, in particular focusing on the income opportunities.

      Specifically the webinar will discuss:
      Token Telstra buy-back not so super, leave it to the pension investors.
      Suncorp's special dividend & what it means for investors.
      Wesfarmer's capital return, how much do you get?
      What companies increased/decreased their dividends & what is their outlook?
      Are there more buybacks to come?
      What companies are dividend traps?

      The webinar will be followed by a live Q&A session.

      Read more >
    • Multiple authentication solutions, but are they all equal? Multiple authentication solutions, but are they all equal? Jason Hart (VP - Cloud Services Architecture, Authentication), SafeNet Recorded: Jun 17 2014 6:00 am UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >
    • Multiple authentication solutions, but are they all equal? Multiple authentication solutions, but are they all equal? Jason Hart, VP, Cloud Services Architecture, Authentication Recorded: May 8 2014 2:00 pm UTC 42 mins
    • How to map the Ideal Authentication Solution to your IT Environment

      Today’s IT environments have become the sum of multiples: Multiple applications to protect; multiple identities to manage and multiple endpoints to secure. Doing the math about how you secure access to numerous applications, the time you spend on provisioning tokens and the overhead invested in managing users may lead you to re-calculate how you would ideally like to run your authentication environment.

      Join your fellow professionals to understand how you can map the Next Generation Authentication solution to your IT environment, equating the key factors that determine your authentication needs with the ideal authentication solution.

      Then we will discuss:

      •Current market trends around collaboration, cloud and security
      •Vulnerabilities associated with unsecured file sharing tools
      •The role of strong authentication in securing collaboration and file sharing tools
      •Authentication Case study

      Read more >