Hi [[ session.user.profile.firstName ]]

Insights: Methodology for Cloud Certificate Lifecycle Management

Modern organizations need the ability to manage certificates and credentials throughout their lifecycle. The need for credentials and certificates is exploding and quickly becoming difficult to manage and it is creating a need for IT Organizations to become experts in areas they are not likely to be. During this presentation gain valuable insights into how adopting Entrust’s lifecycle methodology can provide valuable guidance regardless of the software or service you are currently using
Recorded May 21 2014 46 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Robert MacDonald, Entrust
Presentation preview: Insights: Methodology for Cloud Certificate Lifecycle Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Can a Certificate Improve Security? Recorded: Feb 24 2015 29 mins
    Mike Hathaway, Senior PM PKI Technologies, Entrust
    Security is a term commonly used in today's market place, but not all security is made equal. For many organizations, and for many vendors, security can mean many different things. Over the past few years a number of well-known brands and institutions have been breached despite having had a high level of assurance that their corporate security was more than good enough.

    So what's the answer? How can organizations prevent security breaches? Well while it may not be possible to completely prevent a breach, organizations can certainly make it difficult enough so that an attacker will go elsewhere. To that point, Public Key Infrastructure or PKI is an incredibly secure means of enhancing organizational security. Once considered by analysts as an obsolete technology, PKI is making a huge comeback, as we witness the huge rise in mobile workforces and the surge in IoT, PKI is a trusted solution proven over 20 years that can assure trust by assessing the authenticity of the multitude of devices that make up our interconnected world.

    Join us for this presentation where we will discuss the benefits of a PKI infrastructure, offer tips on considering how to implement one, and highlight areas where you can take advantage of PKI to greatly enhance the security of key corporate assets.
  • Leveraging Mobile for Advanced Threat Protection Recorded: Dec 18 2014 49 mins
    Chris Taylor, Senior Product Manager, Datacard-Entrust, Jason Soroko, Manager, Security Technologies, Datacard-Entrust
    Mobile has become the solution of choice for enterprise business needs. This presentation will take a case study approach to look at how mobile can be leveraged to provide protection against the ever increasing threat landscape.

    We will discuss the reality of mobile threats, how to protect your confidential data, and review a good mobile implementation.
  • Turning Mobile Devices from Security Liability to Security Asset Recorded: Nov 13 2014 40 mins
    Mike Moir, Product Marketing Manager and Chris Taylor, Senior Product Manager, Entrust
    There are clear benefits to adopting cloud based applications and mobile devices to improve your business and increase the productivity of your employees. However the number one reason given for not fully adopting a mobile-friendly work environment is concerns over security. This session will talk about how to turn your mobile device into a security asset rather than a potential liability.
  • Leveraging Mobile for Advanced Threat Protection Recorded: Sep 16 2014 49 mins
    Chris Taylor, Senior Product Manager, Datacard-Entrust, Jason Soroko, Manager, Security Technologies, Datacard-Entrust
    With the consumerization of mobile it is becoming the solution of choice particularly for financial institutions to address consumer and business banking needs. This presentation will take a case study approach to look at how mobile can be leveraged to provide protection against the ever increasing threat landscape.
  • Panel: Credential and Certificate Lifecycle Management from the Cloud Recorded: Jul 25 2014 62 mins
    Moderator: Frank Dickson, Frost &Sullivan, Panel: V.M.V Kumar, Jeff Kalwerisky, Davi Ottenheimer, Ed Haletky
    Modern organizations need the ability to manage certificates and credentials throughout their lifecycle. The need for credentials and certificates is exploding and quickly becoming difficult to manage and it creating a need for IT Organizations to become experts in areas they are not likely to be.
    This Round Table will provide thoughts around how to effectively asses, deploy, manage and build trust with respect to credentialing and certificates. Also learn questions to ask when looking for a vendor to support your organizational needs.
  • Insights: Methodology for Cloud Certificate Lifecycle Management Recorded: May 21 2014 46 mins
    Robert MacDonald, Entrust
    Modern organizations need the ability to manage certificates and credentials throughout their lifecycle. The need for credentials and certificates is exploding and quickly becoming difficult to manage and it is creating a need for IT Organizations to become experts in areas they are not likely to be. During this presentation gain valuable insights into how adopting Entrust’s lifecycle methodology can provide valuable guidance regardless of the software or service you are currently using
Entrust - Securing Digital Identities and Information
Entrust

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Insights: Methodology for Cloud Certificate Lifecycle Management
  • Live at: May 21 2014 5:00 pm
  • Presented by: Robert MacDonald, Entrust
  • From:
Your email has been sent.
or close