Hi [[ session.user.profile.firstName ]]

Meeting Demand for Telemedicine with Secure IoT Solutions

Learn how healthcare providers & hospitals can leverage IoT technology to deliver safe routine care.

As front-line healthcare workers address the novel coronavirus pandemic, optimization of healthcare resources has become critical. In parallel, healthcare professionals delivering routine care must continue to treat their patients with existing conditions. The current situation is testing telemedicine’s ability to deliver safe and secure routine medical care.

Telemedicine, along with remote monitoring and diagnostic capabilities, enable the delivery of routine care, particularly during times when face-to-face appointments are not always possible or deemed essential. Being able deliver these services safely and securely is critical.

This webinar will explore how healthcare service providers and hospitals can leverage telemedicine and IoT technology to help tackle resource constraints and continue to deliver safe routine care.

Telemedicine and the deployment of connected/IoT medical devices enables doctors to continue to deliver care remotely. Ensuring the safety and security of this delivery method relies on the privacy and integrity of data collected from patients.

Before the pandemic, Forbes had predicted that approximately 161 million connected medical devices were going to be deployed in hospitals, clinics, and medical offices by 2020. However, along with the growing digitization of medical records and services comes rising cybersecurity threats. Not only is privacy a concern, but integrity is paramount in order to ensure patient safety and trust.

Join this webcast to learn how:
• Technology can help healthcare practitioners deliver routine care at a time when people can’t or don’t want to visit a doctors’ office
• Telemedicine platform/service providers can enhance security with trusted device authentication and data protection
• Secure IoT can deliver more comprehensive and safe telemedicine services
Recorded Jun 3 2020 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Penney and Julio Merette, Device Authority and Juan Asenjo, nCipher Security
Presentation preview: Meeting Demand for Telemedicine with Secure IoT Solutions

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Secure Identities for the New Normal Mar 24 2021 3:00 pm UTC 60 mins
    Alan Goode - CEO and Cheif Analyst of Goode Intelligence
    The new normal is rapidly taking shape. Accelerated by the pandemic, IT teams have enabled remote work, and expanded digital transactions for customers, healthcare delivery, remote government services and more. So what’s next? The new normal is hybrid – enabling access and security across our digital and physical worlds. This webinar will explore the challenges, demands, opportunities and use cases for secure identities across the hybrid workforce, consumers and citizens.

    • Enabling access and security across digital & physical worlds in a hybrid workforce
    • Acceleration of innovations that enable and secure digital & physical identities
    • Discover insights of smart identity technology
  • Middle East Encryption Trends: Rapid adoption of Hardware Security Modules conti Mar 23 2021 10:00 am UTC 31 mins
    Hamid Qureshi - Middle East Territory Sales Manager
    The push to protect customer personal information, along with growing use of encryption for cloud, containers and the IoT, help drive unprecedented adoption of Hardware Security Modules (HSMs) in the Middle East.
    The 2020 Middle East Encryption Trends Study, conducted by the Ponemon Institute, is based on a survey of 342 IT professionals in the Middle East and highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.
    Join this webcast to find out more about the:
    - Growing use of encryption for emerging use cases like Docker containers and Internet of Things
    - Increasing adoption of the cloud and cloud data encryption
    - Continued pain associated with managing encryption keys
  • Sigma: Impressão de cartão Smart ID Mar 18 2021 5:00 pm UTC 60 mins
    Elizeu Queiroz, Account Manager Entrust
    Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
  • Protection des clés de chiffrement dans des environnements hybrides Mar 18 2021 9:00 am UTC 36 mins
    Jérôme Beclin – Sales Engineer Data Protection Solutions à Entrust
    Alors que la plupart des secteurs adoptent davantage de services basés dans le cloud afin de répondre au mieux aux exigences de leurs clients et gagner en souplesse, en efficacité et en rentabilité, ils doivent garder à l'esprit que la perte, le vol ou l'utilisation abusive d'une seule clé cryptographique critique suffit à avoir un impact significatif sur l'entreprise.
    Au sein d´un environnement hybride, les clés de chiffrement sont utilisées à la fois on-premise et dans le cloud de différents fournisseurs de cloud public, qui peuvent rendre la sécurité de vos clés vulnérable. Alors que votre transformation numérique est en marche, des bonnes pratiques pour assurer une gestion et une protection adéquates des clés de chiffrement sont primordiales.

    Participez à ce webinar et découvrez :
    - comment établir une racine de confiance qui protège centralement les clés de tous vos services et applications déployées dans un environnement cloud hybride.
    - à quel choix recourir : une plateforme de confiance as a service ou sur site ?
    - quelques cas pratiques d´utilisation de votre plateforme de confiance
  • Bring powerful cryptographic capabilities to your multi-cloud OpenShift projects Mar 17 2021 9:00 am UTC 55 mins
    Tony Crossman,Oli Wade - nCipher, Adam Young -Cloud Solutions Architect, Red Hat
    The Red Hat OpenShift Kubernetes orchestration platform is used to build and manage applications that run across any single or multi-cloud environment. The acceleration in the adoption of containerized applications means there is an ever increasing volume of data being processed by containers. This in turn drives the need for cryptographic processes to protect sensitive data.

    Join our webinar to learn how easy it is to integrate your OpenShift projects with FIPS-certified nShield hardware security modules (HSMs). This powerful combination affords the same level of security to containerized apps that was previously only available with traditional development methods. As a result, organizations can build and deploy flexible, scalable applications with encrypt/decrypt, digital signing and other crypto capabilities.

    Based on examples and real-world scenarios, we will discuss:
    - Why developers prefer the OpenShift platform for enterprise deployments
    - Why HSMs are essential for protecting sensitive applications
    - How to tap into subscription-based or on-premises HSMs
  • Sécuriser les environnements Cloud et PKI Microsoft Mar 11 2021 3:00 pm UTC 41 mins
    Jérome Béclin, Ingénieur Commercial, Entrust et Quentin de Lil – Confiance Numérique à Magellan
    Davantage d´entreprises migrent leurs workloads vers des services cloud pour des raisons de commodité, de flexibilité et de rentabilité. Face aux exigences de conformité qui sans cesse évoluent, l’accessibilité des services et la variété des données utilisant ces mêmes services entrainent son lot de doutes concernant la cohérence avec les contraintes règlementaires, la protection des données critiques et racines, les services sécurisés dans le cloud, et la corrélation des solutions de chiffrement des services Cloud Microsoft et leurs fonctionnalités disponibles.
    Deux expertises se complètent lors de ce webinar, co-présenté par Entrust et son partenaire Magellan Sécurité, afin de lever les doutes non seulement sur les contraintes réglementaires mais aussi sur le niveau de sécurisation et de chiffrement à adopter pour les environnements cloud et PKI Microsoft. Vous obtiendrez des informations sur :

    • Les solutions de coffre-fort numérique 100% compatibles Microsoft
    • La manière dont ENTRUST protège votre socle de Confiance Numérique dont la PKI
    • L´intérêt d´intégrer un HSM à votre déploiement Microsoft Double Key Encryption (Chiffrement à double clé)
    • Des cas clients concrets dans les secteurs bancaire et énergie
  • How encryption enables the new banking security standard beyond PCI Mar 11 2021 9:00 am UTC 59 mins
    Ena Hurmola, nCipher Security
    The digital payment landscape evolved rapidly with the acceleration of digital transformation initiatives.

    Not only with the requirement for PCI DSS, but also Open Banking, PSD2 compliance, and GDPR – all requiring banks to have controlled, automated, and secure IT infrastructure in order to keep up with new applications and market opportunities.
    We will look into trends in the modern payment market such as open banking, fintech, blockchain and mobile technologies, that will impact your business and security strategy to enable next generation payment solutions, whilst protecting customers and enterprise data against insider and outsider attacks.
    Join this session to discover:
    • new opportunities and security requirements for banks
    • threats in modern payment system environments
    • encryption strategies, data integrity and key management best practice for banking environment
    • challenges and solutions from real customer stories
  • Modern Identities for the Digital First World Mar 9 2021 4:00 pm UTC 45 mins
    Jenn Markey, Product Marketing Director, Entrust
    The way we work, run errands, socialize, and even how we see the doctor has all changed, supported by an unprecedented level of digital transformation. From financial fraud to medical identity theft to ransomware attacks, this massive transformation has also injected many new threats into our daily lives. Today’s digital world demands a modern approach to identity and access management (IAM). Worker, consumer, and citizen identities must be protected to help ensure secure access, communications, and data. But organizations also need to consider the user experience as too much friction directly translates into lost business, decreased productivity, and poor user compliance.

    Topics will include:
    - Insights into current IAM priorities from Entrust’s own customer base
    - Your IAM best practices checklist
    - A look at the importance of IAM within the larger cybersecurity ecosystem
  • Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés Mar 9 2021 9:00 am UTC 46 mins
    Benoit Simon, Fornetix, Jérôme Beclin, Entrust Data Protection Solutions
    Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés de chiffrement

    Aujourd’hui, notre environnement informatique dispose de plus en plus de technologies pour chiffrer nos données. La généralisation de cette pratique est salutaire pour en assurer leur confidentialité et leur intégrité. Mais elle n’est pas suffisante !

    En effet, elle crée de nouveaux défis :
    -Comment protéger les clés dispersées dans l’entreprise ?
    -Comment établir une racine de confiance pour ces clés ?
    -Comment automatiser le cycle de vie des clés ?
    -Comment centraliser les règles de sécurité ?
    -Comment contrôler qui est autorisé à accéder à quelles données ?

    Rejoignez-nous dans ce webinaire organisé conjointement par Fornetix et Entrust Data Protection Solutions pour obtenir les réponses à ces questions.
  • Encryption is Worthless Without Protecting Your Keys Mar 4 2021 9:00 am UTC 53 mins
    Simon Taylor, Channel Manager, nCipher Security
    Did you know that....

    Cryptographic keys stored in software are not hard to find?
    On average, a hacker has 160 days before they are detected in your network?
    Modern encryption solutions cannot be decrypted through deciphering techniques?
    View this webinar as we discuss why it's important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more.

    We will also discuss why nCipher's general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market. Crypto keys are everywhere: we directly integrate with F5, Palo Alto, CyberArk, Gigamon and HashiCorp, just to name a few.
  • Stop Card-Not-Present Fraud while Complying with PSD2 Mar 3 2021 2:00 pm UTC 60 mins
    John Bejjani: Entrust, Martina Forster: Netcetera, Tanja Steinhoff: Netcetera
    Stop Card-Not-Present Fraud while Complying with PSD2
    While in-store purchase volume continues to shift to Card-Not-Present (CNP) channels at an exponential rate, there remains considerable fraud risk associated with CNP payments. To help address this risk, PSD2 requires 3 Domain Secure (3DS) compliance for CNP payments. Entrust has partnered with Netcetera to provide an integrated 3DS solution to prevent CNP fraud by requiring a one-click step-up authentication for consumers prior to completing a CNP transaction. Join us to learn more about:

    - PSD2 requirements for CNP transactions
    - The 3DS specification, including 3DS 2.0 compliance
    - Our integrated Entrust Identity – Netcetera 3DS solution with associated benefits for banks and consumers
  • Sigma: nova geração em impressão segura de cartões de identificação Recorded: Feb 25 2021 59 mins
    Elizeu Queiroz, Account Manager Entrust
    Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
  • Sicherheitsstrategien für die Cloud Recorded: Feb 25 2021 61 mins
    Matthias Partl Cloud Solution Architect (Azure) Microsoft Identity & Security and Bernd Stamp Technical Lead - DACH nCipher
    Praktiken zur Absicherung Ihrer Cloud Ressourcen und Daten.
    Cloud Sicherheit zu verstehen ist mehr denn je essentiell - gerade in der heutigen Zeit, in der Sie die neuen Rahmenbedingungen zwingen, die Digitale Transformation so schnell wie möglich umzusetzen.
    Dabei sind Sie und der Cloud Service Provider gemeinsam für die Sicherheit Ihrer Cloud basierten Daten verantwortlich.

    In diesem Experten-Video erfahren Sie, welche Sicherheitsgrundlagen Microsoft Azure für das Hosten Ihrer Infrastruktur, Anwendungen und Daten in der Cloud bietet; wie die hochsicheren nShield HSMs von Ncipher Security Ihnen ermöglichen von der Flexibilität und Wirtschaftlichkeit der Cloud Dienste zu profitieren und gleichzeitig die Sicherheit Ihres Encryption Key Managments zu stärken indem sie die Kontrolle über Ihre Schlüssel behalten.

    Highlights aus der Agenda:
    • Azure Secure Foundation (Sicherheitsgrundlagen)
    • Bring Your Own Key (BYOK) für Microsoft Azure Key Vault
    • Hold your own Key (HYOK) für Azure Information Protection
    • Schutzen Sie Ihre Encryption Keys (Verschlüsselungsschlüssel ?) in einer FIPS 140-2 zertifizierten HSM (Hardware Security Module)
    • Sellen Sie sicher, dass die Schlüssel nie für Anwendungen in der Cloud sichtbar sind
    • Trennen Sie Anwendungen und Key Management Funktionen

    Wir freuen uns auf Ihre Teilnahme!
  • How much do you know about end-to-end encryption? Recorded: Feb 25 2021 60 mins
    Joseph Ling, Chief Solutions Architect, Greater China Region, Data Protection Solutions, Entrust
    From WhatsApp to Signal, have you ever worried about the security of your own messages? Even for companies that have implemented end-to-end encryption, public concerns still exist around data protection. Have you ever imagined it could happen to your company as well? Having enabled Hong Kong apps and websites with end-to-end encryption and robust secure key management for many years, Entrust will reveal and analyse the risks of mobile and web applications, and tell you why properly implementing end-to-end encryption should be your top priority.

    Top 3 Takeaways
    • You will understand end-to-end encryption and how it mitigates risks
    • You will know what you should be aware of when implementing end-to-end encryption
    • You will learn how to tell your customers that their data is well protected

    Language: Cantonese
  • How to use encryption to protect customer & enterprise assets Recorded: Feb 24 2021 41 mins
    Pali Surdhar, Chief Security Officer, Entrust
    The attacks targeting financial services organizations continue to increase in both volume and sophistication.
    Security-conscious enterprises need to prepare for threats that emanate from external cybercriminals as well as employee errors and malicious insiders.
    While detection, threat intelligence and other techniques have come into vogue in recent years, encryption continues to play a foundational role in protecting sensitive customer data and enterprise assets.
    Join this session to learn:
    • the role that encryption plays in defending financial institutions’ sensitive data
    • the strategies for implementing strong encryption
    • Real-world case studies to address financial institutions’ challenges
    Divya Baranawal, Research Director Quadrant KS, Jon Ferguson, Product Management Director PKI and IoT Entrust
    IoT adoption has been on the rise for some time and has become the #1 driver for PKI deployments. Yet the conversation of IoT security has been challenging, as few have understood the issues around it.

    Join us as industry experts from Entrust and Quadrant discuss the dynamics around IoT security and what businesses should be doing today to ensure they are secure for tomorrow.

    Topics will include:

    A look at the IoT Identity and Access Management (IAM) market adoption and growth
    The increasing frequency and sophistication of IoT-based cybersecurity attacks
    A review of Quadrant's IoT IAM SPARX Matrix™ competitive assessment
    The need for organizations to adopt an IoT security strategy
  • Fight fraud, delight customers & boost cyber security in the Financial Industry Recorded: Feb 17 2021 46 mins
    Jenn Markey - Product Marketing Director, Entrust
    Pre-COVID, the 2020’s were already being positioned as the decade of digital banking transformation, we just didn’t know it would all happen in the first year! Well not quite all, but banks had to adopt a digital first mindset to survive 2020. It was a year that included exponential growth in digital transactions, closed branches replaced with a remote workforce, and an intensifying threat landscape across a much larger attack surface. As we look forward, financial institutions need to adopt a modern identity approach to be able to address security risks and delight customers. Join this webinar to learn how to accomplish both with:

    - Digital identity verification
    - Transaction risk-based analysis
    - Continuous identity assurance and behavioral biometrics
    - Passwordless options for staff and consumers
    - … and much more
  • Come massimizzare la sicurezza nella Gestione Accessi Privilegiati (PAM) Recorded: Feb 16 2021 21 mins
    Claudio Serafini, Sales Engineering Manager - Entrust Data Protection Solution
    Le minacce informatiche moderne sfruttano il furto delle credenziali privilegiate (ad es. System administrator) per arrivare al cuore dell'azienda.
    La protezione da simili attacchi è una una vera a propria sfida, poiché sono difficili da rilevare prima che inizino a causare danni irreparabili.
    CyberArk ha per prima aperto la strada a una nuova categoria di soluzioni di sicurezza mirate alla protezione preventiva da questo tipo di minacce informatiche.
    Data la necessità delle organizzazioni di gestire e proteggere gli account privilegiati, la custodia delle chiavi crittografiche più sensibili è critica: per questo tra i suoi requisiti minimi Cyberark consiglia di utilizzare un HSM per proteggere la chiave operatore.

    ENTRUST, insieme al suo technology alliance partner CyberArk, aiuta le organizzazioni con una soluzione combinata ad affrontare le minacce verso le credenziali privilegiate.

    Guarda il nostro webinar on-demand per scoprire:

    • Come massimizzare la sicurezza nella gestione delle chiavi di crittografia utilizzate per gestire l’accesso alle credenziali all'interno di CyberArk con Entrust nShield HSM
    • In che modo CyberArk Privileged Access Manager si integra con Entrust nShield HSM
    • Perché utilizzare gli HSM Entrust nShield con la soluzione CyberArk Privileged Access Security
  • Comment fermer votre coffre-fort à double tour: Hashicorp + nCipher Recorded: Feb 16 2021 44 mins
    Gauthier DONIKIAN, Solutions Engineer, Hashicorp and Jerome Beclin, Sales Engineer, nCipher Security
    Au fur et à mesure que les organisations migrent vers le cloud, le nombre de mots de passe, PIN, clés, jetons et autres secrets utilisés pour accéder aux plates-formes applications et aux données augmente de façon exponentielle. La gestion centralisée de répertoires de secrets permet aux organisations d'appliquer des politiques de protection cohérentes qui renforcent la sécurité et facilitent l'audit et la conformité.

    Ce Webinar présentera le défi croissant rencontré lors du déploiement d'outils de gestion centralisée des secrets et les solutions pour atténuer les risques associés à l'agrégation d'actifs sensibles. Nous examinerons le besoin d'une racine de confiance pour la migration vers le cloud, les DevOps et la conformité réglementaire et nous décrirons les meilleures pratiques pour déployer ces solutions.

    Rejoignez ce Webinar et découvrez:

    • Quels défis représente la multiplication des secrets pour les organisations
    • Comment la gestion centralisée des clés garantit une politique de sécurité cohérente
    • Pourquoi le cloud, les DevOps et les réglementations nécessitent une approche ciblée
    • Où une racine de confiance est-elle nécessaire pour garantir une sécurité élevée

    Ce webinaire est pour vous si vous êtes responsable de:

    • La gestion de la transformation numérique et de la migration vers le cloud
    • La mise en place des meilleures pratiques de sécurité dans votre organisation
    • Auditer et assurer la conformité de votre organisation
  • Australia Encryption Trends Study – Are you protecting what matters the most? Recorded: Feb 14 2021 60 mins
    James Cook, Regional Sales Director Australia & Jay Schiavo, VP of Certificate Solutions Products and Markets, EDC
    With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. But what are the top priorities for Australian organisations?

    The Australia edition of the Global Encryption Trends Study, conducted by the Ponemon Institute and sponsored by nCipher, will highlight how leading organisations are applying encryption strategies with detailed insights into the use cases that are growing the fastest.

    Join us for this webinar to learn about the key insights and findings from this industry-leading study and receive advice on addressing encryption’s top challenges.

    You'll take away:
    1.Data to benchmark your encryption strategy, comparing Australia vs. global trends
    2.Which data types are most often encrypted by Australian enterprises
    3.How to strengthen encryption key management at scale for mission-critical workloads
    4.Where organizations are using hardware security modules (HSM) for increased trust and key protection
    5.How to protect identities with cryptographic automation, document signing and code signing solutions
Securing the world in motion.
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Meeting Demand for Telemedicine with Secure IoT Solutions
  • Live at: Jun 3 2020 3:00 pm
  • Presented by: James Penney and Julio Merette, Device Authority and Juan Asenjo, nCipher Security
  • From:
Your email has been sent.
or close