With the consumerization of mobile it is becoming the solution of choice particularly for financial institutions to address consumer and business banking needs. This presentation will take a case study approach to look at how mobile can be leveraged to provide protection against the ever increasing threat landscape.
RecordedSep 16 201449 mins
Your place is confirmed, we'll send you email reminders
Mike Hathaway, Senior PM PKI Technologies, Entrust
Security is a term commonly used in today's market place, but not all security is made equal. For many organizations, and for many vendors, security can mean many different things. Over the past few years a number of well-known brands and institutions have been breached despite having had a high level of assurance that their corporate security was more than good enough.
So what's the answer? How can organizations prevent security breaches? Well while it may not be possible to completely prevent a breach, organizations can certainly make it difficult enough so that an attacker will go elsewhere. To that point, Public Key Infrastructure or PKI is an incredibly secure means of enhancing organizational security. Once considered by analysts as an obsolete technology, PKI is making a huge comeback, as we witness the huge rise in mobile workforces and the surge in IoT, PKI is a trusted solution proven over 20 years that can assure trust by assessing the authenticity of the multitude of devices that make up our interconnected world.
Join us for this presentation where we will discuss the benefits of a PKI infrastructure, offer tips on considering how to implement one, and highlight areas where you can take advantage of PKI to greatly enhance the security of key corporate assets.
Chris Taylor, Senior Product Manager, Datacard-Entrust, Jason Soroko, Manager, Security Technologies, Datacard-Entrust
Mobile has become the solution of choice for enterprise business needs. This presentation will take a case study approach to look at how mobile can be leveraged to provide protection against the ever increasing threat landscape.
We will discuss the reality of mobile threats, how to protect your confidential data, and review a good mobile implementation.
Mike Moir, Product Marketing Manager and Chris Taylor, Senior Product Manager, Entrust
There are clear benefits to adopting cloud based applications and mobile devices to improve your business and increase the productivity of your employees. However the number one reason given for not fully adopting a mobile-friendly work environment is concerns over security. This session will talk about how to turn your mobile device into a security asset rather than a potential liability.
Chris Taylor, Senior Product Manager, Datacard-Entrust, Jason Soroko, Manager, Security Technologies, Datacard-Entrust
With the consumerization of mobile it is becoming the solution of choice particularly for financial institutions to address consumer and business banking needs. This presentation will take a case study approach to look at how mobile can be leveraged to provide protection against the ever increasing threat landscape.
Moderator: Frank Dickson, Frost &Sullivan, Panel: V.M.V Kumar, Jeff Kalwerisky, Davi Ottenheimer, Ed Haletky
Modern organizations need the ability to manage certificates and credentials throughout their lifecycle. The need for credentials and certificates is exploding and quickly becoming difficult to manage and it creating a need for IT Organizations to become experts in areas they are not likely to be.
This Round Table will provide thoughts around how to effectively asses, deploy, manage and build trust with respect to credentialing and certificates. Also learn questions to ask when looking for a vendor to support your organizational needs.
Modern organizations need the ability to manage certificates and credentials throughout their lifecycle. The need for credentials and certificates is exploding and quickly becoming difficult to manage and it is creating a need for IT Organizations to become experts in areas they are not likely to be. During this presentation gain valuable insights into how adopting Entrust’s lifecycle methodology can provide valuable guidance regardless of the software or service you are currently using
Leveraging Mobile for Advanced Threat ProtectionChris Taylor, Senior Product Manager, Datacard-Entrust, Jason Soroko, Manager, Security Technologies, Datacard-Entrust[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]49 mins
Share with your team
(they'll receive one email invite and nothing else)
[[ email ]]
Leveraging Mobile for Advanced Threat ProtectionChris Taylor, Senior Product Manager, Datacard-Entrust, Jason Soroko, Manager, Security Technologies, Datacard-Entrust[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]49 mins