Hi [[ session.user.profile.firstName ]]

Il primo passo verso la conformità al Regolamento eIDAS

Il Regolamento eIDAS presenta opportunità significative per le aziende che gestiscono transazioni online con i cittadini europei. Al tempo stesso, introduce anche nuovi requisiti.

Gli hardware security module (HSM) nShield sono una componente fondamentale che contribuisce alla sicurezza delle soluzioni per l'emissione di certificati e firme digitali o di marcature temporali conformi al Regolamento eIDAS.

Partecipa a questo webcast in diretta per:

- capire in che modo un HSM nShield costituisce la root of trust dei sistemi di protezione dei dati crittografici utilizzati per la creazione e la gestione delle chiavi di crittografia e di firma, oltre che per l'esecuzione di codice sensibile;

- scoprire come i nostri HSM si integrano perfettamente con la tecnologia dei nostri partner, tra cui Cryptomathic, Intesi Group, Safelayer e Nexus, all'interno di prodotti e servizi che soddisfano i requisiti del Regolamento eIDAS;

-apprendere come i nostri clienti utilizzano gli HSM per offrire soluzioni conformi al Regolamento eIDAS, come certificati, passaporti e documenti di identità elettronici, l'autorizzazione delle transazioni e la PKI per i dispositivi mobili.

Ti aspettiamo.

Umberto Sansovini
Territory Sales Manager – Italy
Recorded Jun 10 2020 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Umberto Sansovini, Territory Sales Manager, nCipher Security and Serafini Claudio, Senior Sales Engineer, nCipher Security
Presentation preview: Il primo passo verso la conformità al Regolamento eIDAS

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Take control of encryption in Azure Cloud with Double Key Encryption Mar 24 2021 4:30 pm UTC 60 mins
    Benjy Levin, Microsoft, Redmond, USA, Neil Ginns, Entrust, Dubai, UAE, Iain Beveridge, Data Protection Solutions – Entrust,UK
    Join Microsoft & Entrust: Extend control and security over sensitive data in hybrid and cloud environments with Double Key Encryption

    Enterprises are increasingly migrating workloads to cloud services for convenience, flexibility, and cost effectiveness. However, this practice requires organizations to give up some control.

    To extend control and security over an organization's most sensitive data, double key encryption enables you to set additional levels of protection, control, and assurance.
    Microsoft Double Key Encryption helps enterprises protects their most sensitive content in the cloud using a secondary key - much like a safe deposit box in a bank.

    Top Takeaways:
    • Understand the principles of DKE and how organizations deploy it to protect their most valuable assets with Microsoft Information Protection
    • Discover how you can protect highly sensitive data with Azure Information Protection (AIP) with the assurance that it is completely isolated from third parties
    • Learn how to ensure keys are generated and managed from a trusted, high assurance source
    • Hear how Entrust can help you deploy your organization’s Microsoft DKE instantiation underpinned by nShield HSMs
  • Secure Identities for the New Normal Mar 24 2021 3:00 pm UTC 60 mins
    Alan Goode - CEO and Cheif Analyst of Goode Intelligence
    The new normal is rapidly taking shape. Accelerated by the pandemic, IT teams have enabled remote work, and expanded digital transactions for customers, healthcare delivery, remote government services and more. So what’s next? The new normal is hybrid – enabling access and security across our digital and physical worlds. This webinar will explore the challenges, demands, opportunities and use cases for secure identities across the hybrid workforce, consumers and citizens.

    • Enabling access and security across digital & physical worlds in a hybrid workforce
    • Acceleration of innovations that enable and secure digital & physical identities
    • Discover insights of smart identity technology
  • Middle East Encryption Trends: Rapid adoption of Hardware Security Modules conti Mar 23 2021 10:00 am UTC 31 mins
    Hamid Qureshi - Middle East Territory Sales Manager
    The push to protect customer personal information, along with growing use of encryption for cloud, containers and the IoT, help drive unprecedented adoption of Hardware Security Modules (HSMs) in the Middle East.
    The 2020 Middle East Encryption Trends Study, conducted by the Ponemon Institute, is based on a survey of 342 IT professionals in the Middle East and highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.
    Join this webcast to find out more about the:
    - Growing use of encryption for emerging use cases like Docker containers and Internet of Things
    - Increasing adoption of the cloud and cloud data encryption
    - Continued pain associated with managing encryption keys
  • Sigma: Impressão de cartão Smart ID Mar 18 2021 5:00 pm UTC 60 mins
    Elizeu Queiroz, Account Manager Entrust
    Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
  • Switching Away From Paper Documents for Good Mar 18 2021 3:00 pm UTC 60 mins
    Robert Hann, PKI and Trust Services Director, Jordi Buch, PM Director - Entrust, André Lemos, Matthias Valvekens,- iText
    Create user-optimized, authenticated, tamper-proof pdfs with Entrust and iText. With the pandemic forcing the adoption of remote work, digital transformation has quickly made it to the top of the priority list for many organizations. Replacing paper documents with an electronic version is one of the many tasks you may be facing as part of this transformation.

    In this webinar, you’ll discover how easy it is to generate optimized, authenticated, tamper-proof PDF documents using iText 7 and Entrust Signing Automation Service.
    • Challenges of switching from paper to PDF
    • How iText can help (iText 7 Core)
    • How Entrust can help (Entrust Signing Automation Service)
    • Demo of how they work together
    • Q&A
  • Entrust Customer Update Session Riding the Digital Wave Mar 18 2021 12:00 pm UTC 60 mins
    NA
    As an existing Entrust customer we want to help keep you abreast of technology trends that can give you a competitive edge. With Digital Transformation accelerating at an unprecedented pace you are faced with a whole new set of challenges in securing your organization to meet demanding consumer requirements.

    We are hosting an informative 90 minute session on Thursday 11th March where we’ll take a look at how technologies such as encryption and identity can help build trust throughout your organization.

    Join the live event to:
    - Discover the Digital Transformation trends that are making the most impact and how they affect security
    - Meet Entrust PKIaaS: a secure, highly-available, highly-performant, turnkey PKI that supports pre-defined use-cases. Learn about our latest PKI offering that deploys within minutes, while still giving you high assurance
    - Learn best practices for a secure remote workforce incl. High assurance credential-based authentication, Passwordless access with enhanced SSO and Cloud-based identity for flexible and scalable workforce security
    - Learn how to unlock the maximum potential from trusted cryptography
    - Gain access to a whole host of further useful content on-demand. Whether you’re interested in moving workloads to the cloud, securing IoT, discovering unknown PKI, creating digital citizen identities or authenticating mobile banking we have something for you!
  • Protection des clés de chiffrement dans des environnements hybrides Mar 18 2021 9:00 am UTC 36 mins
    Jérôme Beclin – Sales Engineer Data Protection Solutions à Entrust
    Alors que la plupart des secteurs adoptent davantage de services basés dans le cloud afin de répondre au mieux aux exigences de leurs clients et gagner en souplesse, en efficacité et en rentabilité, ils doivent garder à l'esprit que la perte, le vol ou l'utilisation abusive d'une seule clé cryptographique critique suffit à avoir un impact significatif sur l'entreprise.
    Au sein d´un environnement hybride, les clés de chiffrement sont utilisées à la fois on-premise et dans le cloud de différents fournisseurs de cloud public, qui peuvent rendre la sécurité de vos clés vulnérable. Alors que votre transformation numérique est en marche, des bonnes pratiques pour assurer une gestion et une protection adéquates des clés de chiffrement sont primordiales.

    Participez à ce webinar et découvrez :
    - comment établir une racine de confiance qui protège centralement les clés de tous vos services et applications déployées dans un environnement cloud hybride.
    - à quel choix recourir : une plateforme de confiance as a service ou sur site ?
    - quelques cas pratiques d´utilisation de votre plateforme de confiance
  • Bring powerful cryptographic capabilities to your multi-cloud OpenShift projects Mar 17 2021 9:00 am UTC 55 mins
    Tony Crossman,Oli Wade - nCipher, Adam Young -Cloud Solutions Architect, Red Hat
    The Red Hat OpenShift Kubernetes orchestration platform is used to build and manage applications that run across any single or multi-cloud environment. The acceleration in the adoption of containerized applications means there is an ever increasing volume of data being processed by containers. This in turn drives the need for cryptographic processes to protect sensitive data.

    Join our webinar to learn how easy it is to integrate your OpenShift projects with FIPS-certified nShield hardware security modules (HSMs). This powerful combination affords the same level of security to containerized apps that was previously only available with traditional development methods. As a result, organizations can build and deploy flexible, scalable applications with encrypt/decrypt, digital signing and other crypto capabilities.

    Based on examples and real-world scenarios, we will discuss:
    - Why developers prefer the OpenShift platform for enterprise deployments
    - Why HSMs are essential for protecting sensitive applications
    - How to tap into subscription-based or on-premises HSMs
  • SECURING IOT TECHNOLOGIES AS ADOPTION RISES Mar 16 2021 4:00 pm UTC 39 mins
    Divya Baranawal, Research Director Quadrant KS, Jon Ferguson, Product Management Director PKI and IoT Entrust
    IoT adoption has been on the rise for some time and has become the #1 driver for PKI deployments. Yet the conversation of IoT security has been challenging, as few have understood the issues around it.

    Join us as industry experts from Entrust and Quadrant discuss the dynamics around IoT security and what businesses should be doing today to ensure they are secure for tomorrow.

    Topics will include:

    A look at the IoT Identity and Access Management (IAM) market adoption and growth
    The increasing frequency and sophistication of IoT-based cybersecurity attacks
    A review of Quadrant's IoT IAM SPARX Matrix™ competitive assessment
    The need for organizations to adopt an IoT security strategy
  • Sécuriser les environnements Cloud et PKI Microsoft Mar 11 2021 3:00 pm UTC 41 mins
    Jérome Béclin, Ingénieur Commercial, Entrust et Quentin de Lil – Confiance Numérique à Magellan
    Davantage d´entreprises migrent leurs workloads vers des services cloud pour des raisons de commodité, de flexibilité et de rentabilité. Face aux exigences de conformité qui sans cesse évoluent, l’accessibilité des services et la variété des données utilisant ces mêmes services entrainent son lot de doutes concernant la cohérence avec les contraintes règlementaires, la protection des données critiques et racines, les services sécurisés dans le cloud, et la corrélation des solutions de chiffrement des services Cloud Microsoft et leurs fonctionnalités disponibles.
    Deux expertises se complètent lors de ce webinar, co-présenté par Entrust et son partenaire Magellan Sécurité, afin de lever les doutes non seulement sur les contraintes réglementaires mais aussi sur le niveau de sécurisation et de chiffrement à adopter pour les environnements cloud et PKI Microsoft. Vous obtiendrez des informations sur :

    • Les solutions de coffre-fort numérique 100% compatibles Microsoft
    • La manière dont ENTRUST protège votre socle de Confiance Numérique dont la PKI
    • L´intérêt d´intégrer un HSM à votre déploiement Microsoft Double Key Encryption (Chiffrement à double clé)
    • Des cas clients concrets dans les secteurs bancaire et énergie
  • How encryption enables the new banking security standard beyond PCI Mar 11 2021 9:00 am UTC 59 mins
    Ena Hurmola, nCipher Security
    The digital payment landscape evolved rapidly with the acceleration of digital transformation initiatives.

    Not only with the requirement for PCI DSS, but also Open Banking, PSD2 compliance, and GDPR – all requiring banks to have controlled, automated, and secure IT infrastructure in order to keep up with new applications and market opportunities.
    We will look into trends in the modern payment market such as open banking, fintech, blockchain and mobile technologies, that will impact your business and security strategy to enable next generation payment solutions, whilst protecting customers and enterprise data against insider and outsider attacks.
    Join this session to discover:
    • new opportunities and security requirements for banks
    • threats in modern payment system environments
    • encryption strategies, data integrity and key management best practice for banking environment
    • challenges and solutions from real customer stories
  • Modern Identities for the Digital First World Mar 9 2021 4:00 pm UTC 45 mins
    Jenn Markey, Product Marketing Director, Entrust
    The way we work, run errands, socialize, and even how we see the doctor has all changed, supported by an unprecedented level of digital transformation. From financial fraud to medical identity theft to ransomware attacks, this massive transformation has also injected many new threats into our daily lives. Today’s digital world demands a modern approach to identity and access management (IAM). Worker, consumer, and citizen identities must be protected to help ensure secure access, communications, and data. But organizations also need to consider the user experience as too much friction directly translates into lost business, decreased productivity, and poor user compliance.

    Topics will include:
    - Insights into current IAM priorities from Entrust’s own customer base
    - Your IAM best practices checklist
    - A look at the importance of IAM within the larger cybersecurity ecosystem
  • Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés Mar 9 2021 9:00 am UTC 46 mins
    Benoit Simon, Fornetix, Jérôme Beclin, Entrust Data Protection Solutions
    Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés de chiffrement

    Aujourd’hui, notre environnement informatique dispose de plus en plus de technologies pour chiffrer nos données. La généralisation de cette pratique est salutaire pour en assurer leur confidentialité et leur intégrité. Mais elle n’est pas suffisante !

    En effet, elle crée de nouveaux défis :
    -Comment protéger les clés dispersées dans l’entreprise ?
    -Comment établir une racine de confiance pour ces clés ?
    -Comment automatiser le cycle de vie des clés ?
    -Comment centraliser les règles de sécurité ?
    -Comment contrôler qui est autorisé à accéder à quelles données ?

    Rejoignez-nous dans ce webinaire organisé conjointement par Fornetix et Entrust Data Protection Solutions pour obtenir les réponses à ces questions.
  • Encryption is Worthless Without Protecting Your Keys Recorded: Mar 4 2021 53 mins
    Simon Taylor, Channel Manager, nCipher Security
    Did you know that....

    Cryptographic keys stored in software are not hard to find?
    On average, a hacker has 160 days before they are detected in your network?
    Modern encryption solutions cannot be decrypted through deciphering techniques?
    View this webinar as we discuss why it's important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more.

    We will also discuss why nCipher's general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market. Crypto keys are everywhere: we directly integrate with F5, Palo Alto, CyberArk, Gigamon and HashiCorp, just to name a few.
  • Stop Card-Not-Present Fraud while Complying with PSD2 Recorded: Mar 3 2021 61 mins
    John Bejjani: Entrust, Martina Forster: Netcetera, Tanja Steinhoff: Netcetera
    Stop Card-Not-Present Fraud while Complying with PSD2
    While in-store purchase volume continues to shift to Card-Not-Present (CNP) channels at an exponential rate, there remains considerable fraud risk associated with CNP payments. To help address this risk, PSD2 requires 3 Domain Secure (3DS) compliance for CNP payments. Entrust has partnered with Netcetera to provide an integrated 3DS solution to prevent CNP fraud by requiring a one-click step-up authentication for consumers prior to completing a CNP transaction. Join us to learn more about:

    - PSD2 requirements for CNP transactions
    - The 3DS specification, including 3DS 2.0 compliance
    - Our integrated Entrust Identity – Netcetera 3DS solution with associated benefits for banks and consumers
  • Sigma: nova geração em impressão segura de cartões de identificação Recorded: Feb 25 2021 59 mins
    Elizeu Queiroz, Account Manager Entrust
    Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
  • Sicherheitsstrategien für die Cloud Recorded: Feb 25 2021 61 mins
    Matthias Partl Cloud Solution Architect (Azure) Microsoft Identity & Security and Bernd Stamp Technical Lead - DACH nCipher
    Praktiken zur Absicherung Ihrer Cloud Ressourcen und Daten.
    Cloud Sicherheit zu verstehen ist mehr denn je essentiell - gerade in der heutigen Zeit, in der Sie die neuen Rahmenbedingungen zwingen, die Digitale Transformation so schnell wie möglich umzusetzen.
    Dabei sind Sie und der Cloud Service Provider gemeinsam für die Sicherheit Ihrer Cloud basierten Daten verantwortlich.

    In diesem Experten-Video erfahren Sie, welche Sicherheitsgrundlagen Microsoft Azure für das Hosten Ihrer Infrastruktur, Anwendungen und Daten in der Cloud bietet; wie die hochsicheren nShield HSMs von Ncipher Security Ihnen ermöglichen von der Flexibilität und Wirtschaftlichkeit der Cloud Dienste zu profitieren und gleichzeitig die Sicherheit Ihres Encryption Key Managments zu stärken indem sie die Kontrolle über Ihre Schlüssel behalten.

    Highlights aus der Agenda:
    • Azure Secure Foundation (Sicherheitsgrundlagen)
    • Bring Your Own Key (BYOK) für Microsoft Azure Key Vault
    • Hold your own Key (HYOK) für Azure Information Protection
    • Schutzen Sie Ihre Encryption Keys (Verschlüsselungsschlüssel ?) in einer FIPS 140-2 zertifizierten HSM (Hardware Security Module)
    • Sellen Sie sicher, dass die Schlüssel nie für Anwendungen in der Cloud sichtbar sind
    • Trennen Sie Anwendungen und Key Management Funktionen

    Wir freuen uns auf Ihre Teilnahme!
  • How much do you know about end-to-end encryption? Recorded: Feb 25 2021 60 mins
    Joseph Ling, Chief Solutions Architect, Greater China Region, Data Protection Solutions, Entrust
    From WhatsApp to Signal, have you ever worried about the security of your own messages? Even for companies that have implemented end-to-end encryption, public concerns still exist around data protection. Have you ever imagined it could happen to your company as well? Having enabled Hong Kong apps and websites with end-to-end encryption and robust secure key management for many years, Entrust will reveal and analyse the risks of mobile and web applications, and tell you why properly implementing end-to-end encryption should be your top priority.

    Top 3 Takeaways
    • You will understand end-to-end encryption and how it mitigates risks
    • You will know what you should be aware of when implementing end-to-end encryption
    • You will learn how to tell your customers that their data is well protected

    Language: Cantonese
  • How to use encryption to protect customer & enterprise assets Recorded: Feb 24 2021 41 mins
    Pali Surdhar, Chief Security Officer, Entrust
    The attacks targeting financial services organizations continue to increase in both volume and sophistication.
    Security-conscious enterprises need to prepare for threats that emanate from external cybercriminals as well as employee errors and malicious insiders.
    While detection, threat intelligence and other techniques have come into vogue in recent years, encryption continues to play a foundational role in protecting sensitive customer data and enterprise assets.
    Join this session to learn:
    • the role that encryption plays in defending financial institutions’ sensitive data
    • the strategies for implementing strong encryption
    • Real-world case studies to address financial institutions’ challenges
  • SECURING IOT TECHNOLOGIES AS ADOPTION RISES Recorded: Feb 23 2021 40 mins
    Divya Baranawal, Research Director Quadrant KS, Jon Ferguson, Product Management Director PKI and IoT Entrust
    IoT adoption has been on the rise for some time and has become the #1 driver for PKI deployments. Yet the conversation of IoT security has been challenging, as few have understood the issues around it.

    Join us as industry experts from Entrust and Quadrant discuss the dynamics around IoT security and what businesses should be doing today to ensure they are secure for tomorrow.

    Topics will include:

    A look at the IoT Identity and Access Management (IAM) market adoption and growth
    The increasing frequency and sophistication of IoT-based cybersecurity attacks
    A review of Quadrant's IoT IAM SPARX Matrix™ competitive assessment
    The need for organizations to adopt an IoT security strategy
Securing the world in motion.
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Il primo passo verso la conformità al Regolamento eIDAS
  • Live at: Jun 10 2020 12:00 pm
  • Presented by: Umberto Sansovini, Territory Sales Manager, nCipher Security and Serafini Claudio, Senior Sales Engineer, nCipher Security
  • From:
Your email has been sent.
or close