Hi [[ session.user.profile.firstName ]]

Passwordless and cloud-based identity for the new era of work

In this the second webinar in the Passwordless Series, we will look at passwordless and cloud identity in the new era of work.

Where and how we work are forever changed. In a recent Entrust Datacard customer survey, 84% of respondents expect the recent shift to a sizeable remote workforce to be permanent. As perimeter-based security models give way to digital workforce identities, now is the time to make sure your authentication implementation is up to the challenge. In this webinar, session participants will learn best practices for a secure remote workforce including:
- High assurance credential-based authentication
- Passwordless authentication with enhanced SSO
- Cloud-based identity for flexible and scalable workforce security
Recorded Jul 22 2020 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jenn Markey - Product Marketing, Entrust Datacard
Presentation preview: Passwordless and cloud-based identity for the new era of work

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Sécuriser les vérifications de certificats OCSP Jun 29 2021 9:00 am UTC 60 mins
    Jean Julien Alvado, CEO à Evertrust Jérôme Béclin, Sales Engineering à Entrust, Data Protection Solutions
    Avec l’augmentation exponentielle de l’usage de certificats dans les environnements on prem et cloud, la vérification et la validation de certificats deviennent un enjeux majeur en termes de sécurité et surtout de performance.

    La confiance dans la réponse OCSP est donc primordiale dans le mécanisme de validation de certificats, puisque cette solution permet de créer des signers à clé logicielle ou matérielle.
    L´intégration native de l´OCSPd d´Evertrust aux HSM nShield d´Entrust, permet ainsi la sécurisation des clés privées des signers afin d´assurer une protection logique et physique des clés. Ainsi ce type d’intégration allie sécurité, fiabilité et performance de la réponse OCSP.

    Ne manquez pas ce webinar co-présenté par Jean Julien Alvado, CEO à Evertrust et Jérôme Béclin Sales Engineer à Entrust. C´est l´occasion d´en savoir plus sur la création et la protection des clés privées de signers au travers de cas clients et de démonstrations, mais aussi de poser toutes vos questions sur la sécurisation des certificats.

    Points clés du webinar

    • Les meilleures pratiques pour vérifier l´état de révocation de vos certificats
    • Démonstration d´une intégration OCSP sécurisée
    • Architecture de confiance : Cas clients dans les secteurs industrie et bancaire
  • How to Protect Critical Data in a Hybrid Cloud Environment Jun 24 2021 4:00 pm UTC 34 mins
    Wayne Lewandowski, VP of Global Sales HyTrust Sales & Mike Turner, VP, Sales Engineering & Evangelism
    Managing the security of workloads in a dynamic, virtualized environment is a time-consuming and complex challenge for administrators. Encrypting workloads helps enterprises to ensure their data is protected, even if the data falls into the wrong hands. However, managing the keys for tens of thousands of encrypted workloads is not trivial. To ensure strong data security, keys have to be rotated frequently, and transported and stored securely.

    We also know that now more than ever, when dealing with new working environments, vulnerability risks and other issues, data protection is essential. We are here to support and protect your business critical data in these challenging times.

    In this webinar you will learn how:
    • Businesses can easily manage encryption keys at scale using FIPS-140 compliant encryption
    • Our solution simplifies management of encrypted workloads by automating and simplifying the lifecycles of encryption keys.
    • HyTrust KeyControl manages the encryption keys for all your virtual machines and encrypted data stores and can scale to support thousands of encrypted workloads in large deployments
    • Organizations can retail full ownership of encryption keys with policy-based controls to protect data and meet compliance requirements.

    HyTrust KeyControl works with both HyTrust DataControl and third-party encryption solutions, such as VMware vSphere VM encryption and VMware vSAN data encryption.
  • Own your keys, not your HSM Recorded: Jun 24 2021 20 mins
    Iain Beveridge - Product Marketing Manager, Entrust
    nShield as a Service is a subscription-based cloud solution for generating, accessing, and protecting cryptographic key material, separately from sensitive data. The solution delivers the same functionality as on-premises HSMs and the benefits of a cloud service deployment, without the need to host and maintain the appliances. Because nShield as a Service benefits from the same unique Security World architecture as on-prem nShield deployments, you can easily migrate your cryptographic operations from on-prem to the cloud or use a hybrid approach, mixing both cloud-based and on-premises nShield HSMs.

    Top takeaways:

    • Understand how you can advance your cloud-centric strategies with FIPS 140-2 Level 3 protection for your business-critical apps and data
    • Discover how our Security World architecture lets you scale HSM operations and access secure crypto functionality from anywhere
    • Learn how CodeSafe’s secure execution capability provides on-demand access to your organization's secure, sensitive code protected inside the HSM
    • Hear how you can benefit from no vendor lock in with the majors CSPs, have full control of your keys between multiple CSPs and repatriate keys/data back to on-premises HSMs
  • Digital identities for a digital future Recorded: Jun 23 2021 50 mins
    Jenn Markey, Product Marketing Director, Identity at Entrust
    Remember June 29th, 2007? That’s the day Apple launched the first iPhone putting in motion a chain of events that has transformed our daily lives – how we communicate, digest content, do our banking, and much much more. Mobile has been a real game changer, but we’ve only just begun. Smart phone biometrics and push notifications do provide a far better user experience than the easily forgotten password but imagine what’s possible when you are able to transform your mobile device into your trusted digital identity – consumer, workforce, and even citizen. Webinar participants will learn how to harness the real power of mobile for:

    - Secure transactions
    - Invisible security
    - Trusted digital identities
  • Protecting data in a multi-cloud world: 2021 Encryption Trends - Nordic & Baltic Recorded: Jun 23 2021 43 mins
    John Grimm, vice president of strategy and business development - Entrust
    The use of encryption to protect sensitive data has never been higher, but deployment and management challenges abound in today’s multi-cloud world. The 2021 Encryption Trends Study the most comprehensive encryption survey in the industry, highlights how organizations are managing encryption strategies in the face of changing regulations and evolving data security threats.

    Join John Grimm, vice president of strategy and business development with Entrust, for an overview of the Nordic and Baltic regional key highlights of this just-released research, including:
    • Trends in encryption adoption and deployment, like in container, multi-cloud, micro services and DevOps environments.
    • Evolving threats, drivers, and customer priorities
    • Methods of managing encryption and keys across multiple clouds and at scale
    • The increasing role of hardware security modules (HSMs)
  • 2021 Australia Encryption Trends Study Recorded: Jun 23 2021 38 mins
    Marc Airo-Farulla Data Protection Solutions Director, Oceania (AU, NZ & Pacific Islands), Entrust
    Organisations in Australia have expanded their use of encryption to protect cloud and on-premises data and applications, but what challenges are they facing? And what tools do they find most effective?

    The 2021 Australia Encryption Trends Study, conducted by the Ponemon Institute and sponsored by Entrust, will be released in May 2021. It highlights how leading organisations are applying encryption strategies with detailed insights into the use cases that are growing the fastest.

    Watch this webinar to learn about the key findings from this industry-leading study and how your peers are addressing their data protection challenges, including:

    - How your encryption strategy compares to others in Australia and across the world?
    - Which threats are causing the most concern
    - Trends in encryption adoption and deployment choices
    - How to strengthen encryption key management at scale across Cloud and mission-critical workloads
  • Solution Whiteboard Series: Microsoft Double Key Encryption Recorded: Jun 22 2021 19 mins
    Dave Low, VP of Professional Services, Entrust
    This session will discuss how Microsoft’s new Double Key Encryption (DKE) functionality works, and how you can implement that within your environment. The DKE solution allows enterprises to protect their Office 365 documents with both their Key(s) in the Azure environment, along with a key stored in their own environment (not shared with Microsoft) to secure their most sensitive documents.

    Key takeaways include:
    • Understanding of how Microsoft DKE can give you full control and protection of your most sensitive data
    • How your enterprise could deploy this solution
    • What value this solution can bring to your organization
  • Manage certificates simply and easily, and a PKI that's fast & scales on demand? Recorded: Jun 17 2021 52 mins
    Richard Meiling-Multipost Taha Hadreez-Entrust
    Join our webinar to find out how Entrust and Multipost can make this possible

    No clear ownership, insufficient resources, and skills are the top three challenges to enabling applications to use PKI according to the latest research from the Ponemon institute’s 2020 Global PKI & IoT Trends Study

    Discover how to find, control and automate your certificates from a single dashboard and learn the secret of how to make PKI straight forward and simple to use!

    Join Richard Meiling from Multipost and Taha Hadreez from Entrust on 17th June at our 4.00 pm webinar to learn more about protecting your business from outages and simplifying PKI

    • Do you have a lack of visibility on your certificate usage and
    • Have you suffered outages or service interruptions?
    • Are you sure you can meet your internal and external audit needs?
    • Are you struggling to scale your existing certificate solutions ?
  • Connecting the dots for CMMC Recorded: Jun 16 2021 31 mins
    Juan Asenjo, Director, Jim DeLorenzo, Senior Manager, Product and Solutions Marketing, Entrust
    Compliance (and reaching more customers) might be simpler than you think

    As cyberattacks continue to evolve, so do the cybersecurity frameworks designed to address them. The latest example is the Cybersecurity Maturity Model Certification (CMMC), which establishes security requirements for vendors who do business with the U.S. Department of Defense. But it’s not just DoD, as civilian agencies and even other governments are also planning to adopt this model.

    The good news for vendors is that they have likely already taken steps to address many of the CMMC’s requirements. Join us for our webinar as we look under the hood and discuss what makes up the CMMC domains. There’s a good chance your ongoing security investments put you in position for compliance.

    In this webinar we’ll examine:
    • What standards and frameworks are built into CMMC
    • How you can leverage your existing security practices in your CMMC program
    • Where to find useful resources to position you for more business
  • Which encryption technologies are making a difference? Recorded: Jun 16 2021 42 mins
    Hamid Qureshi, Senior Executive, Entrust
    As sensitive data proliferates across new environments and applications, most organisations are expanding their use of encryption. But what are the top priorities for enterprises in the Middle East?

    Analysts Ponemon Institute conducted a survey of over 300 IT professionals based in the Middle East to create the 2021 Middle East Encryption Trends Study - the most comprehensive encryption survey in the industry.

    Join Hamid Qureshi, Senior Executive, Entrust Data Protection Solutions, for this informative webinar to learn about the key insights and findings from this industry-leading study, and receive advice on addressing encryption’s top challenges.

    You will learn:
    • How your encryption strategy compares to others in the region
    • Which threats are causing the most concern
    • Trends driving encryption adoption and deployment choices; including multi-cloud encryption
    • The growing importance of Hardware Security Modules (HSMs)

    You can also read the full report here: https://www.entrust.com/lp/en/middle-east-encryption-trends-study
  • 2021 Global Encryption Trends: Protecting data in a multi-cloud world Recorded: Jun 10 2021 61 mins
    John Grimm, VP Strategy & Business Development; Dr. Larry Ponemon, Chairman & Founder
    The use of encryption to protect sensitive data has never been higher, but deployment and management challenges abound in today’s multi-cloud world. The 2021 Global Encryption Trends Study, the most comprehensive encryption survey in the industry, highlights how organizations are managing encryption strategies in the face of changing regulations and evolving data security threats.

    Join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, and John Grimm, vice president of strategy and business development with Entrust, for an overview of key highlights of this just-released research, including:
    • Trends in encryption adoption and deployment
    • Evolving threats, drivers, and customer priorities
    • Methods of managing encryption and keys across multiple clouds
    • The increasing role of hardware security modules (HSMs)
  • Higher Education: Converging Campus Identities from Physical to Digital Recorded: Jun 10 2021 54 mins
    ID Issuance leaders
    Attend our credential issuance forum to meet SIGMA, the world’s most advanced instant issuance system! We will show you how the new Sigma card printer is simple, secure and smart!
    Join us as we discuss:
    • Mobile identification, from enrollment to issuance
    • The convergence of mobile and physical identity on campus
  • Application-level data protection: confusion, challenges and solutions Recorded: Jun 9 2021 51 mins
    Jim DeLorenzo, Solutions Marketing Manager, Entrust, Justin Teitt, CMO & COO, PrimeFactors
    As the amount of data collected and stored by organization continues to accelerate, most organizations struggle in one important area: protecting data at the application level. A recent survey of 600 information technology professionals revealed that, while most plan to enhance their data security, numerous misperceptions and complexities stand in the way of implementing a data security strategy that properly protects data-in-use.
    Join us for this informative webinar, where we’ll dig into the survey findings to highlight the areas of confusion and how traditional data protection strategies fall short once data leaves its storage location.
    You will learn:
    - Which challenges cause the most confusion when applying data security strategies
    - Why application-level data protection has long been perceived as being too complex to be practicable
    - How to implement a security strategy that protects data from the point of capture
  • Retail: Food Labeling Solution Recorded: Jun 8 2021 48 mins
    ID Issuance leaders
    Attend our credential issuance forum to meet SIGMA, the world’s most advanced instant issuance system! We will show you how the new Sigma card printer is simple, secure and smart!
    In this session we’ll review topics including:
    • Food label solutions that are safe and compliant
    • Print on-demand with high-resolution food label printers, keeping up with price fluctuations and changing labeling requirements
  • Public Transportation Recorded: Jun 3 2021 55 mins
    ID Issuance leaders
    Attend our credential issuance forum to meet SIGMA, the world’s most advanced instant issuance system! We will show you how the new Sigma card printer is simple, secure and smart!
    In this session we’ll review topics including:
    • Moving towards a contactless ticketing and open payment
    • Helping transport operators to transform their ticketing office
  • Healthcare & Mobile Identity Recorded: Jun 1 2021 54 mins
    ID Issuance leaders
    Attend our credential issuance forum to meet SIGMA, the world’s most advanced instant issuance system! We will show you how the new Sigma card printer is simple, secure and smart!
    In this session we’ll review topics including:
    • Securing identities of patients and health professional employees
    • Simplifying the process of credential issuing for hospitals
  • Take control of encryption in Azure Cloud with Double Key Encryption Recorded: May 27 2021 64 mins
    Benjy Levin, Microsoft, Redmond, USA, Neil Ginns, Entrust, Dubai, UAE, Iain Beveridge, Data Protection Solutions – Entrust,UK
    Extend control and security over sensitive data in hybrid and cloud environments with Double Key Encryption

    Enterprises are increasingly migrating workloads to cloud services for convenience, flexibility, and cost effectiveness. However, this practice requires organizations to give up some control. To extend control and security over an organization's most sensitive data, double key encryption enables you to set additional levels of protection, control, and assurance.

    Join us in this webinar to find out how to protects your most sensitive content in the cloud using a secondary key - much like a safe deposit box in a bank.

    Top Takeaways:
    • Understand the principles of DKE and how organizations deploy it to protect their most valuable assets with Microsoft Information Protection
    • Discover how you can protect highly sensitive data with Azure Information Protection (AIP) with the assurance that it is completely isolated from third parties
    • Learn how to ensure keys are generated and managed from a trusted, high assurance source
    • Hear how Entrust can help you deploy your organization’s Microsoft DKE instantiation underpinned by nShield HSMs
  • Is Identity at a Crossroads? Recorded: May 26 2021 37 mins
    Jenn Markey, Product Marketing Director, Identity at Entrust Jay Bretzmann, Program Director, Cybersecurity Products at IDC
    With the shift to work-at-home, the new normal for security teams has changed. In a word, identity has risen into a pivotal security technology. Yet many organizations struggle to answer the identity ROI question, and handle the question of moving to the cloud. Yet the steady march towards Identity-as-a-Service (IdaaS) continues, according to IDC.

    Join Jay Bretzmann, Program Director, Cybersecurity Products at IDC and Jenn Markey, Product Marketing Director, Identity at Entrust, as they explore these issues and identify potential solutions.
  • Secure your clouds by securing your keys Recorded: May 25 2021 32 mins
    Iain Beveridge - Product Marketing Manager, Entrust Sean Cannon - General Manager, Sycomp
    Entrust Data Protection Solutions are proud to introduce our new partner within EMEA - Sycomp, a global provider of innovative data centre, cloud and security services. This extended partnership will enable Sycomp to provide their customers across EMEA with an added level of security to protect critical business data and help meet compliance mandates.

    With Covid-19 being a catalyst for most companies to adopt a more cloud-first approach we chose this as our first joint webcast topic. We all know the cloud offers the benefits of agility and scalability - but these benefits don’t come without their security challenges.

    Join Entrust and Sycomp live on May 25 where we will provide a brief 101 on Hardware Security Modules (HSMs) and then discuss the top 6 use cases that are helping our customers secure both their journey to the cloud and their cloud data while maintaining control of all encryption keys:

    • BYOK – Bring your own key to maintain control with Cloud Service Providers
    • DKE - Double Key Encryption to protect your most sensitive Microsoft O365 assets
    • Migrating data to the clouds, including using multiple cloud service providers
    • Managing the proliferation of information silos, credentials and secrets using ready-made integrations for CyberArk, BeyondTrust, HashiCorp and Thycotic
    • Deploying containers at scale utilizing high assurance crypto
    • Encrypting virtualized workloads – but what do I do with all the keys?
  • Government: Keeping Security a #1 Priority Recorded: May 20 2021 52 mins
    ID Issuance leaders
    Attend our credential issuance forum to meet SIGMA, the world’s most advanced instant issuance system! We will show you how the new Sigma card printer is simple, secure and smart!
    In this session we’ll review topics including:
    • Security
    • Social effects of identity programs
    • Beyond government security: local-level programs such as library cards, employee cards, hunting/fishing licenses, social benefits programs, medical marijuana, and more
Securing the world in motion.
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Passwordless and cloud-based identity for the new era of work
  • Live at: Jul 22 2020 3:00 pm
  • Presented by: Jenn Markey - Product Marketing, Entrust Datacard
  • From:
Your email has been sent.
or close