Hi [[ session.user.profile.firstName ]]

Post Quantum Series: I. What is the state of the quantum world?

Post quantum experts at Entrust Datacard have been working closely with think tanks and academic leaders who are doing advanced research on quantum computing.
We’re sharing our insights with IT professionals through our three-part post quantum webinar series.

Perhaps you’ve heard a little bit about quantum computing, but you’re not quite sure what to make of it? You’re not alone. Many IT professionals are still not clear on what it is or how it will impact their business.

Get a better understanding of quantum computing and find out what you need to know in the first session of our three-part webinar series:

• What common cryptographic protocols will need to be migrated to post quantum algorithms
• There is no 'one size fits all' – choosing PQ algorithms to fit your use cases
• How to determine the right time to deploy post quantum crypto for data with different "shelf-lives"
Recorded May 7 2020 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Gray, PKI Software Architect
Presentation preview: Post Quantum Series: I. What is the state of the quantum world?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Take control of encryption in Azure Cloud with Double Key Encryption Mar 24 2021 4:30 pm UTC 60 mins
    Benjy Levin, Microsoft, Redmond, USA, Neil Ginns, Entrust, Dubai, UAE, Iain Beveridge, Data Protection Solutions – Entrust,UK
    Join Microsoft & Entrust: Extend control and security over sensitive data in hybrid and cloud environments with Double Key Encryption

    Enterprises are increasingly migrating workloads to cloud services for convenience, flexibility, and cost effectiveness. However, this practice requires organizations to give up some control.

    To extend control and security over an organization's most sensitive data, double key encryption enables you to set additional levels of protection, control, and assurance.
    Microsoft Double Key Encryption helps enterprises protects their most sensitive content in the cloud using a secondary key - much like a safe deposit box in a bank.

    Top Takeaways:
    • Understand the principles of DKE and how organizations deploy it to protect their most valuable assets with Microsoft Information Protection
    • Discover how you can protect highly sensitive data with Azure Information Protection (AIP) with the assurance that it is completely isolated from third parties
    • Learn how to ensure keys are generated and managed from a trusted, high assurance source
    • Hear how Entrust can help you deploy your organization’s Microsoft DKE instantiation underpinned by nShield HSMs
  • Secure Identities for the New Normal Mar 24 2021 3:00 pm UTC 60 mins
    Alan Goode - CEO and Cheif Analyst of Goode Intelligence
    The new normal is rapidly taking shape. Accelerated by the pandemic, IT teams have enabled remote work, and expanded digital transactions for customers, healthcare delivery, remote government services and more. So what’s next? The new normal is hybrid – enabling access and security across our digital and physical worlds. This webinar will explore the challenges, demands, opportunities and use cases for secure identities across the hybrid workforce, consumers and citizens.

    • Enabling access and security across digital & physical worlds in a hybrid workforce
    • Acceleration of innovations that enable and secure digital & physical identities
    • Discover insights of smart identity technology
  • Middle East Encryption Trends: Rapid adoption of Hardware Security Modules conti Mar 23 2021 10:00 am UTC 31 mins
    Hamid Qureshi - Middle East Territory Sales Manager
    The push to protect customer personal information, along with growing use of encryption for cloud, containers and the IoT, help drive unprecedented adoption of Hardware Security Modules (HSMs) in the Middle East.
    The 2020 Middle East Encryption Trends Study, conducted by the Ponemon Institute, is based on a survey of 342 IT professionals in the Middle East and highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.
    Join this webcast to find out more about the:
    - Growing use of encryption for emerging use cases like Docker containers and Internet of Things
    - Increasing adoption of the cloud and cloud data encryption
    - Continued pain associated with managing encryption keys
  • Sigma: Impressão de cartão Smart ID Mar 18 2021 5:00 pm UTC 60 mins
    Elizeu Queiroz, Account Manager Entrust
    Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
  • Entrust Customer Update Session Riding the Digital Wave Mar 18 2021 12:00 pm UTC 60 mins
    As an existing Entrust customer we want to help keep you abreast of technology trends that can give you a competitive edge. With Digital Transformation accelerating at an unprecedented pace you are faced with a whole new set of challenges in securing your organization to meet demanding consumer requirements.

    We are hosting an informative 90 minute session on Thursday 11th March where we’ll take a look at how technologies such as encryption and identity can help build trust throughout your organization.

    Join the live event to:
    - Discover the Digital Transformation trends that are making the most impact and how they affect security
    - Meet Entrust PKIaaS: a secure, highly-available, highly-performant, turnkey PKI that supports pre-defined use-cases. Learn about our latest PKI offering that deploys within minutes, while still giving you high assurance
    - Learn best practices for a secure remote workforce incl. High assurance credential-based authentication, Passwordless access with enhanced SSO and Cloud-based identity for flexible and scalable workforce security
    - Learn how to unlock the maximum potential from trusted cryptography
    - Gain access to a whole host of further useful content on-demand. Whether you’re interested in moving workloads to the cloud, securing IoT, discovering unknown PKI, creating digital citizen identities or authenticating mobile banking we have something for you!
  • Protection des clés de chiffrement dans des environnements hybrides Mar 18 2021 9:00 am UTC 36 mins
    Jérôme Beclin – Sales Engineer Data Protection Solutions à Entrust
    Alors que la plupart des secteurs adoptent davantage de services basés dans le cloud afin de répondre au mieux aux exigences de leurs clients et gagner en souplesse, en efficacité et en rentabilité, ils doivent garder à l'esprit que la perte, le vol ou l'utilisation abusive d'une seule clé cryptographique critique suffit à avoir un impact significatif sur l'entreprise.
    Au sein d´un environnement hybride, les clés de chiffrement sont utilisées à la fois on-premise et dans le cloud de différents fournisseurs de cloud public, qui peuvent rendre la sécurité de vos clés vulnérable. Alors que votre transformation numérique est en marche, des bonnes pratiques pour assurer une gestion et une protection adéquates des clés de chiffrement sont primordiales.

    Participez à ce webinar et découvrez :
    - comment établir une racine de confiance qui protège centralement les clés de tous vos services et applications déployées dans un environnement cloud hybride.
    - à quel choix recourir : une plateforme de confiance as a service ou sur site ?
    - quelques cas pratiques d´utilisation de votre plateforme de confiance
  • Bring powerful cryptographic capabilities to your multi-cloud OpenShift projects Mar 17 2021 9:00 am UTC 55 mins
    Tony Crossman,Oli Wade - nCipher, Adam Young -Cloud Solutions Architect, Red Hat
    The Red Hat OpenShift Kubernetes orchestration platform is used to build and manage applications that run across any single or multi-cloud environment. The acceleration in the adoption of containerized applications means there is an ever increasing volume of data being processed by containers. This in turn drives the need for cryptographic processes to protect sensitive data.

    Join our webinar to learn how easy it is to integrate your OpenShift projects with FIPS-certified nShield hardware security modules (HSMs). This powerful combination affords the same level of security to containerized apps that was previously only available with traditional development methods. As a result, organizations can build and deploy flexible, scalable applications with encrypt/decrypt, digital signing and other crypto capabilities.

    Based on examples and real-world scenarios, we will discuss:
    - Why developers prefer the OpenShift platform for enterprise deployments
    - Why HSMs are essential for protecting sensitive applications
    - How to tap into subscription-based or on-premises HSMs
  • Sécuriser les environnements Cloud et PKI Microsoft Mar 11 2021 3:00 pm UTC 41 mins
    Jérome Béclin, Ingénieur Commercial, Entrust et Quentin de Lil – Confiance Numérique à Magellan
    Davantage d´entreprises migrent leurs workloads vers des services cloud pour des raisons de commodité, de flexibilité et de rentabilité. Face aux exigences de conformité qui sans cesse évoluent, l’accessibilité des services et la variété des données utilisant ces mêmes services entrainent son lot de doutes concernant la cohérence avec les contraintes règlementaires, la protection des données critiques et racines, les services sécurisés dans le cloud, et la corrélation des solutions de chiffrement des services Cloud Microsoft et leurs fonctionnalités disponibles.
    Deux expertises se complètent lors de ce webinar, co-présenté par Entrust et son partenaire Magellan Sécurité, afin de lever les doutes non seulement sur les contraintes réglementaires mais aussi sur le niveau de sécurisation et de chiffrement à adopter pour les environnements cloud et PKI Microsoft. Vous obtiendrez des informations sur :

    • Les solutions de coffre-fort numérique 100% compatibles Microsoft
    • La manière dont ENTRUST protège votre socle de Confiance Numérique dont la PKI
    • L´intérêt d´intégrer un HSM à votre déploiement Microsoft Double Key Encryption (Chiffrement à double clé)
    • Des cas clients concrets dans les secteurs bancaire et énergie
  • How encryption enables the new banking security standard beyond PCI Mar 11 2021 9:00 am UTC 59 mins
    Ena Hurmola, nCipher Security
    The digital payment landscape evolved rapidly with the acceleration of digital transformation initiatives.

    Not only with the requirement for PCI DSS, but also Open Banking, PSD2 compliance, and GDPR – all requiring banks to have controlled, automated, and secure IT infrastructure in order to keep up with new applications and market opportunities.
    We will look into trends in the modern payment market such as open banking, fintech, blockchain and mobile technologies, that will impact your business and security strategy to enable next generation payment solutions, whilst protecting customers and enterprise data against insider and outsider attacks.
    Join this session to discover:
    • new opportunities and security requirements for banks
    • threats in modern payment system environments
    • encryption strategies, data integrity and key management best practice for banking environment
    • challenges and solutions from real customer stories
  • Modern Identities for the Digital First World Mar 9 2021 4:00 pm UTC 45 mins
    Jenn Markey, Product Marketing Director, Entrust
    The way we work, run errands, socialize, and even how we see the doctor has all changed, supported by an unprecedented level of digital transformation. From financial fraud to medical identity theft to ransomware attacks, this massive transformation has also injected many new threats into our daily lives. Today’s digital world demands a modern approach to identity and access management (IAM). Worker, consumer, and citizen identities must be protected to help ensure secure access, communications, and data. But organizations also need to consider the user experience as too much friction directly translates into lost business, decreased productivity, and poor user compliance.

    Topics will include:
    - Insights into current IAM priorities from Entrust’s own customer base
    - Your IAM best practices checklist
    - A look at the importance of IAM within the larger cybersecurity ecosystem
  • Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés Mar 9 2021 9:00 am UTC 46 mins
    Benoit Simon, Fornetix, Jérôme Beclin, Entrust Data Protection Solutions
    Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés de chiffrement

    Aujourd’hui, notre environnement informatique dispose de plus en plus de technologies pour chiffrer nos données. La généralisation de cette pratique est salutaire pour en assurer leur confidentialité et leur intégrité. Mais elle n’est pas suffisante !

    En effet, elle crée de nouveaux défis :
    -Comment protéger les clés dispersées dans l’entreprise ?
    -Comment établir une racine de confiance pour ces clés ?
    -Comment automatiser le cycle de vie des clés ?
    -Comment centraliser les règles de sécurité ?
    -Comment contrôler qui est autorisé à accéder à quelles données ?

    Rejoignez-nous dans ce webinaire organisé conjointement par Fornetix et Entrust Data Protection Solutions pour obtenir les réponses à ces questions.
  • Encryption is Worthless Without Protecting Your Keys Mar 4 2021 9:00 am UTC 53 mins
    Simon Taylor, Channel Manager, nCipher Security
    Did you know that....

    Cryptographic keys stored in software are not hard to find?
    On average, a hacker has 160 days before they are detected in your network?
    Modern encryption solutions cannot be decrypted through deciphering techniques?
    View this webinar as we discuss why it's important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more.

    We will also discuss why nCipher's general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market. Crypto keys are everywhere: we directly integrate with F5, Palo Alto, CyberArk, Gigamon and HashiCorp, just to name a few.
  • Stop Card-Not-Present Fraud while Complying with PSD2 Mar 3 2021 2:00 pm UTC 60 mins
    John Bejjani: Entrust, Martina Forster: Netcetera, Tanja Steinhoff: Netcetera
    Stop Card-Not-Present Fraud while Complying with PSD2
    While in-store purchase volume continues to shift to Card-Not-Present (CNP) channels at an exponential rate, there remains considerable fraud risk associated with CNP payments. To help address this risk, PSD2 requires 3 Domain Secure (3DS) compliance for CNP payments. Entrust has partnered with Netcetera to provide an integrated 3DS solution to prevent CNP fraud by requiring a one-click step-up authentication for consumers prior to completing a CNP transaction. Join us to learn more about:

    - PSD2 requirements for CNP transactions
    - The 3DS specification, including 3DS 2.0 compliance
    - Our integrated Entrust Identity – Netcetera 3DS solution with associated benefits for banks and consumers
  • Sigma: nova geração em impressão segura de cartões de identificação Recorded: Feb 25 2021 59 mins
    Elizeu Queiroz, Account Manager Entrust
    Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
  • Sicherheitsstrategien für die Cloud Recorded: Feb 25 2021 61 mins
    Matthias Partl Cloud Solution Architect (Azure) Microsoft Identity & Security and Bernd Stamp Technical Lead - DACH nCipher
    Praktiken zur Absicherung Ihrer Cloud Ressourcen und Daten.
    Cloud Sicherheit zu verstehen ist mehr denn je essentiell - gerade in der heutigen Zeit, in der Sie die neuen Rahmenbedingungen zwingen, die Digitale Transformation so schnell wie möglich umzusetzen.
    Dabei sind Sie und der Cloud Service Provider gemeinsam für die Sicherheit Ihrer Cloud basierten Daten verantwortlich.

    In diesem Experten-Video erfahren Sie, welche Sicherheitsgrundlagen Microsoft Azure für das Hosten Ihrer Infrastruktur, Anwendungen und Daten in der Cloud bietet; wie die hochsicheren nShield HSMs von Ncipher Security Ihnen ermöglichen von der Flexibilität und Wirtschaftlichkeit der Cloud Dienste zu profitieren und gleichzeitig die Sicherheit Ihres Encryption Key Managments zu stärken indem sie die Kontrolle über Ihre Schlüssel behalten.

    Highlights aus der Agenda:
    • Azure Secure Foundation (Sicherheitsgrundlagen)
    • Bring Your Own Key (BYOK) für Microsoft Azure Key Vault
    • Hold your own Key (HYOK) für Azure Information Protection
    • Schutzen Sie Ihre Encryption Keys (Verschlüsselungsschlüssel ?) in einer FIPS 140-2 zertifizierten HSM (Hardware Security Module)
    • Sellen Sie sicher, dass die Schlüssel nie für Anwendungen in der Cloud sichtbar sind
    • Trennen Sie Anwendungen und Key Management Funktionen

    Wir freuen uns auf Ihre Teilnahme!
  • How much do you know about end-to-end encryption? Recorded: Feb 25 2021 60 mins
    Joseph Ling, Chief Solutions Architect, Greater China Region, Data Protection Solutions, Entrust
    From WhatsApp to Signal, have you ever worried about the security of your own messages? Even for companies that have implemented end-to-end encryption, public concerns still exist around data protection. Have you ever imagined it could happen to your company as well? Having enabled Hong Kong apps and websites with end-to-end encryption and robust secure key management for many years, Entrust will reveal and analyse the risks of mobile and web applications, and tell you why properly implementing end-to-end encryption should be your top priority.

    Top 3 Takeaways
    • You will understand end-to-end encryption and how it mitigates risks
    • You will know what you should be aware of when implementing end-to-end encryption
    • You will learn how to tell your customers that their data is well protected

    Language: Cantonese
  • How to use encryption to protect customer & enterprise assets Recorded: Feb 24 2021 41 mins
    Pali Surdhar, Chief Security Officer, Entrust
    The attacks targeting financial services organizations continue to increase in both volume and sophistication.
    Security-conscious enterprises need to prepare for threats that emanate from external cybercriminals as well as employee errors and malicious insiders.
    While detection, threat intelligence and other techniques have come into vogue in recent years, encryption continues to play a foundational role in protecting sensitive customer data and enterprise assets.
    Join this session to learn:
    • the role that encryption plays in defending financial institutions’ sensitive data
    • the strategies for implementing strong encryption
    • Real-world case studies to address financial institutions’ challenges
    Divya Baranawal, Research Director Quadrant KS, Jon Ferguson, Product Management Director PKI and IoT Entrust
    IoT adoption has been on the rise for some time and has become the #1 driver for PKI deployments. Yet the conversation of IoT security has been challenging, as few have understood the issues around it.

    Join us as industry experts from Entrust and Quadrant discuss the dynamics around IoT security and what businesses should be doing today to ensure they are secure for tomorrow.

    Topics will include:

    A look at the IoT Identity and Access Management (IAM) market adoption and growth
    The increasing frequency and sophistication of IoT-based cybersecurity attacks
    A review of Quadrant's IoT IAM SPARX Matrix™ competitive assessment
    The need for organizations to adopt an IoT security strategy
  • Fight fraud, delight customers & boost cyber security in the Financial Industry Recorded: Feb 17 2021 46 mins
    Jenn Markey - Product Marketing Director, Entrust
    Pre-COVID, the 2020’s were already being positioned as the decade of digital banking transformation, we just didn’t know it would all happen in the first year! Well not quite all, but banks had to adopt a digital first mindset to survive 2020. It was a year that included exponential growth in digital transactions, closed branches replaced with a remote workforce, and an intensifying threat landscape across a much larger attack surface. As we look forward, financial institutions need to adopt a modern identity approach to be able to address security risks and delight customers. Join this webinar to learn how to accomplish both with:

    - Digital identity verification
    - Transaction risk-based analysis
    - Continuous identity assurance and behavioral biometrics
    - Passwordless options for staff and consumers
    - … and much more
  • Come massimizzare la sicurezza nella Gestione Accessi Privilegiati (PAM) Recorded: Feb 16 2021 21 mins
    Claudio Serafini, Sales Engineering Manager - Entrust Data Protection Solution
    Le minacce informatiche moderne sfruttano il furto delle credenziali privilegiate (ad es. System administrator) per arrivare al cuore dell'azienda.
    La protezione da simili attacchi è una una vera a propria sfida, poiché sono difficili da rilevare prima che inizino a causare danni irreparabili.
    CyberArk ha per prima aperto la strada a una nuova categoria di soluzioni di sicurezza mirate alla protezione preventiva da questo tipo di minacce informatiche.
    Data la necessità delle organizzazioni di gestire e proteggere gli account privilegiati, la custodia delle chiavi crittografiche più sensibili è critica: per questo tra i suoi requisiti minimi Cyberark consiglia di utilizzare un HSM per proteggere la chiave operatore.

    ENTRUST, insieme al suo technology alliance partner CyberArk, aiuta le organizzazioni con una soluzione combinata ad affrontare le minacce verso le credenziali privilegiate.

    Guarda il nostro webinar on-demand per scoprire:

    • Come massimizzare la sicurezza nella gestione delle chiavi di crittografia utilizzate per gestire l’accesso alle credenziali all'interno di CyberArk con Entrust nShield HSM
    • In che modo CyberArk Privileged Access Manager si integra con Entrust nShield HSM
    • Perché utilizzare gli HSM Entrust nShield con la soluzione CyberArk Privileged Access Security
Securing the world in motion.
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Post Quantum Series: I. What is the state of the quantum world?
  • Live at: May 7 2020 8:40 am
  • Presented by: John Gray, PKI Software Architect
  • From:
Your email has been sent.
or close