Hi [[ session.user.profile.firstName ]]

Making Passwordless Work with your Existing IT Environment

In this the fifth webinar in the Passwordless Series, we will look at how to make Passwordless Work with your Existing IT Environment

Unless your business is brand new, you already have a considerable investment in IT. Costly upgrades and replacements should not be required to realize passwordless authentication or the associated benefits of improved workforce security and productivity. Participants in this session will learn:
- Key questions to ask passwordless vendors
- How to leverage existing Microsoft environments
- How to attain high assurance credential-based authentication with your existing PKI implementation
Live online Sep 30 3:00 pm UTC
or after on demand 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rajan Barara, Product Management Director-Entrust Datacard
Presentation preview: Making Passwordless Work with your Existing IT Environment

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best practices for verification to support reduced certificate lifetimes Oct 15 2020 4:00 pm UTC 34 mins
    Dathan Demone, Director Verification Services, Entrust Datacard
    Join us for our "Road to 398" webinar that discusses upcoming certificate lifetime reductions.

    During this 30-minute webinar, our verification expert will share tips, tools, and best practices for verification processes that support reduced TLS/SSL certificate lifetimes and maintain compliance.

    • Updates on CA/B Forum requirements for verification around shorter certificate lifetimes
    • Tools for renewing certificates in bulk with fewer touch points
    • Methodologies for streamlining certificate verification
    • Insights and best practices from some of our other customers
  • Managing secrets sprawl – 3 reasons why you need a root of trust Oct 14 2020 3:00 am UTC 60 mins
    Ian Christofis, Principal Managing Consultant, nCipher and David Wright, Partner Solution Architect, HashiCorp
    As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies that strengthen security and facilitate auditing and compliance.

    This webcast will look at the growing challenge faced when deploying centralized secrets management tools and how to mitigate risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.


    Join the webcast and learn:
    • What challenges secrets sprawl represents for organizations
    • How centralized key management ensures consistent policy
    • Why cloud, DevOps, and regulations require a focus approach

    This webinar is for you if you are responsible for:
    · Managing digital transformation and cloud migration
    · Overseeing security best practices in your organization
    · Auditing and ensuring your organizational compliance
  • Comment fermer votre coffre-fort à double tour: Hashicorp + nCipher Oct 8 2020 9:00 am UTC 60 mins
    Gauthier DONIKIAN, Solutions Engineer, Hashicorp and Jerome Beclin, Sales Engineer, nCipher Security
    Au fur et à mesure que les organisations migrent vers le cloud, le nombre de mots de passe, PIN, clés, jetons et autres secrets utilisés pour accéder aux plates-formes applications et aux données augmente de façon exponentielle. La gestion centralisée de répertoires de secrets permet aux organisations d'appliquer des politiques de protection cohérentes qui renforcent la sécurité et facilitent l'audit et la conformité.

    Ce Webinar présentera le défi croissant rencontré lors du déploiement d'outils de gestion centralisée des secrets et les solutions pour atténuer les risques associés à l'agrégation d'actifs sensibles. Nous examinerons le besoin d'une racine de confiance pour la migration vers le cloud, les DevOps et la conformité réglementaire et nous décrirons les meilleures pratiques pour déployer ces solutions.

    Rejoignez ce Webinar et découvrez:

    • Quels défis représente la multiplication des secrets pour les organisations
    • Comment la gestion centralisée des clés garantit une politique de sécurité cohérente
    • Pourquoi le cloud, les DevOps et les réglementations nécessitent une approche ciblée
    • Où une racine de confiance est-elle nécessaire pour garantir une sécurité élevée

    Ce webinaire est pour vous si vous êtes responsable de:

    • La gestion de la transformation numérique et de la migration vers le cloud
    • La mise en place des meilleures pratiques de sécurité dans votre organisation
    • Auditer et assurer la conformité de votre organisation
  • Countdown to PSD2 Compliance: Don't Forget your QWAC and Qseal Certificates Oct 7 2020 9:00 am UTC 60 mins
    Kevin Brown, Senior Product Manager, Entrust Datacard
    The European Banking Agency's new PSD2 deadline was set to 31 December 2020, and a major element of the Directive is the demand for Common and Secure Communication (CSC). If you are still unfamiliar with this requirement and how it realtes to QWACs and QSeal Certificates, now is the time to get your questions answered.

    This quick webinar will give you some insight into the PSD2 compliance requirement from a Common and Secure Communication perspective. you will learn about:
    -The context for this requirement
    -The roles of QWACs and QSeal Certificates
    -The available solutions at Entrust Datacard
  • Road to 398: Complying with reduced TLS/SSL certificate lifetimes Oct 6 2020 4:00 pm UTC 52 mins
    Chris Bailey, VP of Trust Services and Mark Giannotti, Manager, Technical Sales, Entrust Datacard
    Apple's decision to reduce certificate lifetimes to 398 days will take effect Sept. 1, 2020. Preparing your web properties for a seamless transition starts now.

    Join our TLS/SSL experts as they share some tips to avoid unexpected certificate lapses and simplify certificate management.

    Topics covered:

    • The details of the new CA/B Forum baseline requirements
    • The potential impact of shorter certificate lifetimes
    • How to use the Ansible Module to automate certificate deployment at scale
    • Other tools that can help simplify certificate lifetime management
  • Making Passwordless Work with your Existing IT Environment Sep 30 2020 3:00 pm UTC 45 mins
    Rajan Barara, Product Management Director-Entrust Datacard
    In this the fifth webinar in the Passwordless Series, we will look at how to make Passwordless Work with your Existing IT Environment

    Unless your business is brand new, you already have a considerable investment in IT. Costly upgrades and replacements should not be required to realize passwordless authentication or the associated benefits of improved workforce security and productivity. Participants in this session will learn:
    - Key questions to ask passwordless vendors
    - How to leverage existing Microsoft environments
    - How to attain high assurance credential-based authentication with your existing PKI implementation
  • 2020 Global Encryption Trends: Are you protecting what matters the most? Sep 30 2020 10:00 am UTC 60 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute; John Grimm, VP Strategy & Business Development, nCipher Security
    With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. And for the first time protecting customer data has become the number one priority.

    The 2020 Global Encryption Trends Study highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.

    Join Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, and John Grimm, VP of Strategy and Business Development at nCipher Security, as they review key insights and findings from this industry-leading study, and give advice on addressing encryption's top challenges. You'll take away:

    - Data to benchmark your encryption strategy by industry and by country
    - Where organizations are using Hardware Security Modules for increased trust and key protection
    - Features of encryption solutions that provide the most value
  • Is your PKI really a PKI ( Public Key Infrastructure)? Sep 29 2020 1:00 pm UTC 60 mins
    Luke Niemiec, Customer Success Manager, Entrust Datacard
    Many enterprises have taken advantage of ‘FREE’ certificate software and installed it in their environment in the belief that this will satisfy their PKI requirements … at no additional cost. But is this true?

    This webinar is designed to talk you through the differences, benefits and pitfalls of installing a FREE CA ( Certificate Authority) and having a fully compliant PKI in your business.

    You will learn:
    1. What a certificate policy/certificate practice statement is and why is it so vital
    2. Whether your PKI is compliant and how to rectify it if it isn’t
    3. What you should expect from your PKI provider
  • New top driver for encryption is revealed – it’s personal. Nordics and Baltics Sep 24 2020 1:00 pm UTC 60 mins
    John Grimm, Vice President of Strategy and Business Development at nCipher Security, an Entrust Datacard company
    With the explosion and proliferation of data that comes from new digital initiatives and increased mobility, most organizations are expanding their use of encryption. And for the first time protecting customer data has become the number one priority.

    The 2020 Nordic Encryption Trends Study highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.

    Join John Grimm, VP of Strategy and Magnus Frohm, Territory Sales Manager - Nordics/Baltics at nCipher Security, as they review key insights and findings from this industry-leading study, and give advice on addressing encryption's top challenges in the Nordics.

    You’ll learn about:

    • Data to benchmark your encryption strategy by industry in the Nordics
    • Where organizations are using Hardware Security Modules for increased trust and key protection
    • Features of encryption solutions that provide the most value
  • How PSD2 secure financial transactions while improving the consumer's experience Sep 23 2020 2:00 pm UTC 60 mins
    John Bejjani , Product Manager, Identity Enterprise at Entrust
    Open Banking and growing fintech solutions have made one thing clear - "Banks are not the place to store money anymore, banks are places to store data" (David Birch at the 2017 ISSE Conference in Brussels). COVID-19 accelerated digital transformation initiatives which have evolved the market space for advanced payment solutions. PSD2 aims to be the guiding principle for this change by-

    1.Facilitating innovation, competition and efficiency by providing consumers with choices in the EU retail payment market
    2.Ensuring consumer protection by mandating strong customer authentication

    Although, PSD2 has been there for some time, its implementation has been consistently delayed. The revised deadline for its enforcement across European financial institutions is 31st Dec,2020. Financial institutions are looking for guidance on not only different scenarios and available security solutions (PSD2 compliant), but they also need help to understand how PSD2 is going to impact their consumer transactions.

    This session, which is 2nd in our series of webinars for financial institutions, we aim to address -
    • PSD2 innovating the Payments market
    • Shifting nature of Fraud
    • User stories
    • Holistic Banking experience - Creating trusted digital identities | Securing financial transactions | Mobile as foundation

    To view the first webinar to this series, please visit:
    https://www.brighttalk.com/webcast/17380/418337
  • 製造業などの企業の、実際の在宅勤務の運用はどうやっているのか? ~緊急事態宣言下の事業継続の実態は?~ Recorded: Sep 11 2020 53 mins
    佐藤 公理 シニアテクニカルセールスコンサルタント(CISSP、CISA、CISM) エントラストジャパン株式会社
    日本においても、緊急事態宣言が発令され、企業活動においても、在宅勤務が強く求められています。既に一部のIT企業などからは、全面的な在宅勤務への移行が発表されています。

    しかし、製造業などの企業においては、
    ・ノートPCを支給していない社員が多い。PCはどうすればよいのか?私用のを使ってもよいのか?
    ・ITリテラシーの高い社員ばかりではない。
    ・全員在宅勤務の状況において、どのように情報を伝達すればよいのか?
    ・会社のネットワークに家からアクセスしてもセキュリティを保つには?

    といった課題があると思います。
    本セミナーでは、(セキュリティソフトウェアをご提供するIT企業ですが)キャッシュカードやクレジットカードのカード発行機などを製造・販売する、製造業としての側面を持つ、エントラスト・データカード社が、緊急事態宣言のもと、どのような在宅勤務のオペレーションを行っているのかについて、具体的に解説します。

    *ノートPCを持っていない社員はどうするのか?
    *VDI(デスクトップ仮想化)は使うのか?どう使うのか?
    *どのようなツール、サービス(SaaS)を使うのか?禁止するのか?
    *会社(経営や、人事、情シス)からの連絡はどうするのか?(どのような内容?依頼すること/禁止すること。頻度は?)
    *どうやってセキュリティを担保するのか?
  • IoTセキュリティのために、IoTデバイス向け証明書を大量発行し、証明書のライフサイクルを管理する Recorded: Sep 9 2020 60 mins
    佐藤 公理 シニアテクニカルセールスコンサルタント(CISSP、CISA、CISM) エントラストジャパン株式会社
    あらゆるデバイスがネットにつながる時代となり、IoTのセキュリティリスクが増大しています。IoTデバイスによっては、IDパスワードがファームウェアに書き込まれて簡単に変更できないものや、医療機器など人命にかかわる機器は、パスワード変更を推奨していないものもあり、セキュリティ担保が難しいケースも多くみられます。これらを解決する方法としてPKI(デジタル証明書)の導入が注目されています。IoTデバイスの場合、証明書の有効性は以前から言われていましたが、大量に発行しなければならず、コスト面の課題がありました。マネージドPKIを使えば、安価に大量の電子証明書を発行し、組み入れることができます。また、例えばPOSの場合、POS出荷時に製造元の証明を行うために証明書を使うというだけではなく、コンビニなどの店舗に設置した段階で証明書をインストールするなど、どの時点で何を、いつまで証明するか、などのライフサイクルマネージメントが重要です。この課題も解決することが可能です。

    本セミナーでは今後更に増大するIoTのセキュリティリスクに対応するために、IoTデバイスのセキュリティをどのように向上すればよいのか、そのポイントと事例について解説します。


    *PKI(デジタル証明書)は、IoTデバイスのセキュリティ対策に有効
    *マネージドPKIで、安価に大量の証明書を発行可能に
    *証明書のライフサイクルマネジメントも重要
    *PKIで、IoTデバイスのセキュリティを向上するポイントと事例を解説
  • リモートワーク定着のために、認証とID管理はどうあるべきか? VPNやVDIの認証強化と、リモートワークが「当たり前」の社会におけるアクセス管理 Recorded: Sep 9 2020 78 mins
    佐藤 公理 シニアテクニカルセールスコンサルタント(CISSP、CISA、CISM) エントラストジャパン株式会社
    緊急事態宣言は解除されましたが、新型コロナウィルスの第2波、第3波の感染拡大も懸念される中、引き続きリモートワーク/テレワークが推奨されます。多くの企業では緊急事態宣言の中、急遽VPNやVDIなどリモートワークの環境を整備しましたが、セキュリティ対策が十分でないケースも多いようです。今後はリモートワークを定着させるため、そのセキュリティを強化する必要があります。どのような観点で、どのようにセキュリティを強化するべきなのでしょうか。また、今後はリモートワークが「当たり前」の社会になります。そうなると、アクセス元として考えなければならないクライアントデバイスが急増します。その時にアクセス管理、及び認証、ID管理はどう考えるべきでしょうか。

    本Webセミナーでは、リモートワークのセキュリティ強化や、リモートワークが「当たり前」の社会におけるアクセス管理について解説すると共に、参加者も含めてリモートワークのセキュリティについて考えていきます。

    *引き続きリモートワークは推奨
    *VPNやVDIのセキュリティ強化が必要
    *リモートワークが「当たり前」の社会において、アクセス管理はどうするべきか?
  • Security Manager 10: Next Generation PKI Recorded: Sep 3 2020 60 mins
    Paul McBride, Senior PKI Product Manager, Entrust Datacard
    Entrust Datacard Security Manager is the world's leading public key infrastructure (PKI), trusted for over 25 years by organizations and governments with the most demanding security environments. Its latest release, Security Manager 10, was designed to meet the demanding needs of encryption everywhere.

    Join the webinar to hear more about why we’re calling it next-gen PKI including:
    • High availability (near-zero downtime)
    • Significantly increased throughput
    • Horizontal scalability
    • REST API configurations
  • Managing secrets sprawl – 3 reasons why you need a root of trust Recorded: Aug 31 2020 58 mins
    John Boero, Sr. Solutions Engineer, HashiCorp and Juan C. Asenjo, Ph.D., CISSP, nCipher Security
    As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially. Maintaining centralized repositories of secrets enables organizations to apply consistent protection policies that strengthen security and facilitate auditing and compliance.

    This webcast will look at the growing challenge faced when deploying centralized secrets management tools and how to mitigate risks associated with aggregation of sensitive assets. Our speakers will examine how cloud migration, DevOps, and regulatory compliance require a root of trust, and will describe best practices for deploying these solutions.

    Join the webcast and learn:
    • What challenges secrets sprawl represents for organizations
    • How centralized key management ensures consistent policy
    • Why cloud, DevOps, and regulations require a focus approach
    • Where is a root of trust required for high assurance security

    This webinar is for you if you are responsible for:
    1. Managing digital transformation and cloud migration
    2. Overseeing security best practices in your organization
    3. Auditing and ensuring your organizational compliance
  • Enabling Digital Life: Working Remote Recorded: Aug 27 2020 44 mins
    Beth Klehr|CHRO|EDC, Jenn Markey|Product Marketing Director|EDC, Peter Galvin|Chief Strategy&Marketing Officer|nCipher
    Unlock strategic and technical insights you can build around .

    When the pandemic hit, many organizations scrambled to adopt remote work strategies that would allow them to avoid costly shutdowns. As the dust settles, however, lingering concerns about these radical shifts in workflow have emerged—including loss of productivity, IT security and the blurring of work-life responsibilities.

    Now is the time to shore up your remote work strategy with innovative best practices that move beyond survival—empowering your remote workforce to thrive wherever their “office” might be located.

    In this webinar roundtable, an experienced panel of c -level and technical experts will discuss:
    • Emerging remote work trends resulting from the COVID-19 pandemic
    • Key security challenges associated with a remote workforce
    • Tips to remove digital friction and protect remote workstation security
  • Sicherheitsstrategien für die Cloud Recorded: Aug 27 2020 62 mins
    Matthias Partl Cloud Solution Architect (Azure) Microsoft Identity & Security and Bernd Stamp Technical Lead - DACH nCipher
    Praktiken zur Absicherung Ihrer Cloud Ressourcen und Daten.
    Cloud Sicherheit zu verstehen ist mehr denn je essentiell - gerade in der heutigen Zeit, in der Sie die neuen Rahmenbedingungen zwingen, die Digitale Transformation so schnell wie möglich umzusetzen.
    Dabei sind Sie und der Cloud Service Provider gemeinsam für die Sicherheit Ihrer Cloud basierten Daten verantwortlich.

    In diesem Experten-Video erfahren Sie, welche Sicherheitsgrundlagen Microsoft Azure für das Hosten Ihrer Infrastruktur, Anwendungen und Daten in der Cloud bietet; wie die hochsicheren nShield HSMs von Ncipher Security Ihnen ermöglichen von der Flexibilität und Wirtschaftlichkeit der Cloud Dienste zu profitieren und gleichzeitig die Sicherheit Ihres Encryption Key Managments zu stärken indem sie die Kontrolle über Ihre Schlüssel behalten.

    Highlights aus der Agenda:
    • Azure Secure Foundation (Sicherheitsgrundlagen)
    • Bring Your Own Key (BYOK) für Microsoft Azure Key Vault
    • Hold your own Key (HYOK) für Azure Information Protection
    • Schutzen Sie Ihre Encryption Keys (Verschlüsselungsschlüssel ?) in einer FIPS 140-2 zertifizierten HSM (Hardware Security Module)
    • Sellen Sie sicher, dass die Schlüssel nie für Anwendungen in der Cloud sichtbar sind
    • Trennen Sie Anwendungen und Key Management Funktionen

    Wir freuen uns auf Ihre Teilnahme!
  • Healthcare Goes Passwordless and Touchless Recorded: Aug 26 2020 43 mins
    Jenn Markey - leads product marketing for Entrust Datacard’s authentication business segment
    In this the fourth webinar in the Passwordless Series, we will look at Passwordless and Cloud-based Identities for Healthcare Workers

    As we all prepare for a new era of work, there are some workforce authentication considerations specific to healthcare environments. Healthcare workers often access patient records and medical systems on shared workstations. As well, many employees work across multiple locations. This makes using a physical authenticator like a smart card a risk factor for surface transmission. Session participants will hear about:

    - The unique authentication challenges and requirements for healthcare workers
    - The importance of credential-based touchless authentication
    - The real-world touchless identity case study of a critical care hospital network
  • Beware the dark side,use trusted machines & HSMs to support critical business Recorded: Aug 18 2020 47 mins
    Paul Cleary,Senior Solutions Engineer-Venafi and Juan Asenjo,Director of Products,Solutions and Partner Marketing-nCipher
    As organizations deploy more automated systems to run critical business, the demand for device and application (machine) identities is rapidly increasing. Protecting machine identities is critical to ensure integrity of operations and the security of data processed by machines.

    This webcast will examine the growing challenges faced by organizations when managing increasing volumes of machine identities. Our speakers will discuss how to implement automated orchestration of keys and certificates, describe best practices, and explain why a root of trust is vital for security and regulatory compliance.

    Join the webcast and learn:
    • What are the main challenges managing machine identities
    • How to enable trust in machines supporting critical business
    • Why a root of trust is required for high assurance security

    This webinar is for you if you are responsible for:
    • Managing digital transformation and cloud migration
    • Overseeing security best practices in your organization
    • Auditing and ensuring your organizational compliance
  • Credential-based Passwordless Authentication for Secure Workforce Identities Recorded: Aug 12 2020 30 mins
    Rajan Barara, Product Management Director-Entrust Datacard
    In this the third webinar in the Passwordless Series, we will look at Credential-based Passwordless Authentication for Secure Workforce Identities

    From an IT perspective, passwords are inherently insecure. From a user perspective, passwords are annoying. Going passwordless is intended to address both of these concerns. Be forewarned, however, that not all passwordless solutions are created equal. Webinar participants will learn:

    - How to build their internal case to go passwordless
    - Key questions to ask different passwordless vendors
    - Importance of credential-based passwordless authentication for high assurance use cases
nCipher, an Entrust Datacard company
Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates and secure communications.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Making Passwordless Work with your Existing IT Environment
  • Live at: Sep 30 2020 3:00 pm
  • Presented by: Rajan Barara, Product Management Director-Entrust Datacard
  • From:
Your email has been sent.
or close