Sigma: nova geração em impressão segura de cartões de identificação
Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
RecordedFeb 25 202159 mins
Your place is confirmed, we'll send you email reminders
Benjy Levin, Microsoft, Redmond, USA, Neil Ginns, Entrust, Dubai, UAE, Iain Beveridge, Data Protection Solutions – Entrust,UK
Join Microsoft & Entrust: Extend control and security over sensitive data in hybrid and cloud environments with Double Key Encryption
Enterprises are increasingly migrating workloads to cloud services for convenience, flexibility, and cost effectiveness. However, this practice requires organizations to give up some control.
To extend control and security over an organization's most sensitive data, double key encryption enables you to set additional levels of protection, control, and assurance.
Microsoft Double Key Encryption helps enterprises protects their most sensitive content in the cloud using a secondary key - much like a safe deposit box in a bank.
Top Takeaways:
• Understand the principles of DKE and how organizations deploy it to protect their most valuable assets with Microsoft Information Protection
• Discover how you can protect highly sensitive data with Azure Information Protection (AIP) with the assurance that it is completely isolated from third parties
• Learn how to ensure keys are generated and managed from a trusted, high assurance source
• Hear how Entrust can help you deploy your organization’s Microsoft DKE instantiation underpinned by nShield HSMs
Alan Goode - CEO and Cheif Analyst of Goode Intelligence
The new normal is rapidly taking shape. Accelerated by the pandemic, IT teams have enabled remote work, and expanded digital transactions for customers, healthcare delivery, remote government services and more. So what’s next? The new normal is hybrid – enabling access and security across our digital and physical worlds. This webinar will explore the challenges, demands, opportunities and use cases for secure identities across the hybrid workforce, consumers and citizens.
• Enabling access and security across digital & physical worlds in a hybrid workforce
• Acceleration of innovations that enable and secure digital & physical identities
• Discover insights of smart identity technology
Charlotte Pommier ,Product Marketing Manager, Entrust Datacard
Avec la COVID-19 qui encourage le travail à domicile, les employés sont devenus la première menace pour les données sensibles et confidentielles. La réduction des interactions en face à face et la grande dépendance aux communications virtuelles et des appareils mobiles, a multiplié les vecteurs d´attaque avec des tactiques de plus en plus sophistiquées, ciblant les nouveaux espaces de travail.
Quelle que soit la taille d’une entreprise, l’absence d’une stratégie appropriée de sécurité de la messagerie électronique peut coûter des millions aux entreprises. Les pertes ne sont pas seulement financières, mais la réputation est également heurtée.
Lors de ce webinar, nous verrons quelles sont les solutions Entrust de chiffrement de la messagerie électronique et des signatures numériques, permettant aux organisations de se prémunir des erreurs humaines.
Ce que vous allez apprendre :
1. Comment vous pouvez désormais sécuriser votre entreprise contre les menaces inoculées par la messagerie électronique
2. Comment l’automatisation supprime les erreurs et les problèmes liés au déploiement manuel de S/MIME
3. Comment mettre en place une messagerie électronique signée et chiffrée numériquement en quelques minutes, et non en quelques jours
4. Comment rester en phase avec vos obligations de conformité
Debido a que COVID-19 está fomentando el teletrabajo, los empleados se han convertido en la principal amenaza en lo que a los datos confidenciales de una empresa se refiere. El hecho de tener menos contacto cara a cara y depender más de las comunicaciones virtuales y los dispositivos móviles ha creado un vector de ataque perfecto para que los ciberdelincuentes aprovechen el nuevo espacio de trabajo utilizando tácticas sofisticadas.
Independientemente del tamaño de las organizaciones, las consecuencias de no contar con la estrategia de seguridad de correo electrónico adecuada pueden costarles millones. Las pérdidas no son solo económicas, sino también de reputación.
Entrust puede ayudar a las organizaciones a proteger su información ofreciendo cifrado de correo electrónico y firmas digitales. La solución S/MIME de Entrust y Sixscape añade una capa más de protección que ayuda a los empleados a identificar si un correo electrónico procede de una fuente legítima. Ofrece integridad, seguridad, prevención de “phishing”, prevención de ataques BEC, logro y mantenimiento del cumplimiento, y cifrado. Seguridad de clave privada con custodia de clave para disfrutar de una total tranquilidad y lograr el cumplimiento
En este seminario conocerá más acerca de:
• Cómo puede proteger ahora su empresa contra las amenazas basadas en el correo electrónico
• Cómo la automatización elimina los errores y la fricción asociados a la implementación manual
de S/MIME
• Cómo implementar correos electrónicos cifrados y firmados digitalmente a escala en cuestión
de minutos, en lugar de días
• Cómo mantenerse al frente de sus obligaciones de cumplimiento
Hamid Qureshi - Middle East Territory Sales Manager
The push to protect customer personal information, along with growing use of encryption for cloud, containers and the IoT, help drive unprecedented adoption of Hardware Security Modules (HSMs) in the Middle East.
The 2020 Middle East Encryption Trends Study, conducted by the Ponemon Institute, is based on a survey of 342 IT professionals in the Middle East and highlights how leading organizations are applying their encryption strategies, with detailed insights into the use cases that are growing the fastest.
Join this webcast to find out more about the:
- Growing use of encryption for emerging use cases like Docker containers and Internet of Things
- Increasing adoption of the cloud and cloud data encryption
- Continued pain associated with managing encryption keys
Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
Robert Hann, PKI and Trust Services Director, Jordi Buch, PM Director - Entrust, André Lemos, Matthias Valvekens,- iText
Create user-optimized, authenticated, tamper-proof pdfs with Entrust and iText. With the pandemic forcing the adoption of remote work, digital transformation has quickly made it to the top of the priority list for many organizations. Replacing paper documents with an electronic version is one of the many tasks you may be facing as part of this transformation.
In this webinar, you’ll discover how easy it is to generate optimized, authenticated, tamper-proof PDF documents using iText 7 and Entrust Signing Automation Service.
• Challenges of switching from paper to PDF
• How iText can help (iText 7 Core)
• How Entrust can help (Entrust Signing Automation Service)
• Demo of how they work together
• Q&A
As an existing Entrust customer we want to help keep you abreast of technology trends that can give you a competitive edge. With Digital Transformation accelerating at an unprecedented pace you are faced with a whole new set of challenges in securing your organization to meet demanding consumer requirements.
We are hosting an informative 90 minute session on Thursday 11th March where we’ll take a look at how technologies such as encryption and identity can help build trust throughout your organization.
Join the live event to:
- Discover the Digital Transformation trends that are making the most impact and how they affect security
- Meet Entrust PKIaaS: a secure, highly-available, highly-performant, turnkey PKI that supports pre-defined use-cases. Learn about our latest PKI offering that deploys within minutes, while still giving you high assurance
- Learn best practices for a secure remote workforce incl. High assurance credential-based authentication, Passwordless access with enhanced SSO and Cloud-based identity for flexible and scalable workforce security
- Learn how to unlock the maximum potential from trusted cryptography
- Gain access to a whole host of further useful content on-demand. Whether you’re interested in moving workloads to the cloud, securing IoT, discovering unknown PKI, creating digital citizen identities or authenticating mobile banking we have something for you!
Jérôme Beclin – Sales Engineer Data Protection Solutions à Entrust
Alors que la plupart des secteurs adoptent davantage de services basés dans le cloud afin de répondre au mieux aux exigences de leurs clients et gagner en souplesse, en efficacité et en rentabilité, ils doivent garder à l'esprit que la perte, le vol ou l'utilisation abusive d'une seule clé cryptographique critique suffit à avoir un impact significatif sur l'entreprise.
Au sein d´un environnement hybride, les clés de chiffrement sont utilisées à la fois on-premise et dans le cloud de différents fournisseurs de cloud public, qui peuvent rendre la sécurité de vos clés vulnérable. Alors que votre transformation numérique est en marche, des bonnes pratiques pour assurer une gestion et une protection adéquates des clés de chiffrement sont primordiales.
Participez à ce webinar et découvrez :
- comment établir une racine de confiance qui protège centralement les clés de tous vos services et applications déployées dans un environnement cloud hybride.
- à quel choix recourir : une plateforme de confiance as a service ou sur site ?
- quelques cas pratiques d´utilisation de votre plateforme de confiance
Tony Crossman,Oli Wade - nCipher, Adam Young -Cloud Solutions Architect, Red Hat
The Red Hat OpenShift Kubernetes orchestration platform is used to build and manage applications that run across any single or multi-cloud environment. The acceleration in the adoption of containerized applications means there is an ever increasing volume of data being processed by containers. This in turn drives the need for cryptographic processes to protect sensitive data.
Join our webinar to learn how easy it is to integrate your OpenShift projects with FIPS-certified nShield hardware security modules (HSMs). This powerful combination affords the same level of security to containerized apps that was previously only available with traditional development methods. As a result, organizations can build and deploy flexible, scalable applications with encrypt/decrypt, digital signing and other crypto capabilities.
Based on examples and real-world scenarios, we will discuss:
- Why developers prefer the OpenShift platform for enterprise deployments
- Why HSMs are essential for protecting sensitive applications
- How to tap into subscription-based or on-premises HSMs
Divya Baranawal, Research Director Quadrant KS, Jon Ferguson, Product Management Director PKI and IoT Entrust
IoT adoption has been on the rise for some time and has become the #1 driver for PKI deployments. Yet the conversation of IoT security has been challenging, as few have understood the issues around it.
Join us as industry experts from Entrust and Quadrant discuss the dynamics around IoT security and what businesses should be doing today to ensure they are secure for tomorrow.
Topics will include:
A look at the IoT Identity and Access Management (IAM) market adoption and growth
The increasing frequency and sophistication of IoT-based cybersecurity attacks
A review of Quadrant's IoT IAM SPARX Matrix™ competitive assessment
The need for organizations to adopt an IoT security strategy
Jérome Béclin, Ingénieur Commercial, Entrust et Quentin de Lil – Confiance Numérique à Magellan
Davantage d´entreprises migrent leurs workloads vers des services cloud pour des raisons de commodité, de flexibilité et de rentabilité. Face aux exigences de conformité qui sans cesse évoluent, l’accessibilité des services et la variété des données utilisant ces mêmes services entrainent son lot de doutes concernant la cohérence avec les contraintes règlementaires, la protection des données critiques et racines, les services sécurisés dans le cloud, et la corrélation des solutions de chiffrement des services Cloud Microsoft et leurs fonctionnalités disponibles.
Deux expertises se complètent lors de ce webinar, co-présenté par Entrust et son partenaire Magellan Sécurité, afin de lever les doutes non seulement sur les contraintes réglementaires mais aussi sur le niveau de sécurisation et de chiffrement à adopter pour les environnements cloud et PKI Microsoft. Vous obtiendrez des informations sur :
• Les solutions de coffre-fort numérique 100% compatibles Microsoft
• La manière dont ENTRUST protège votre socle de Confiance Numérique dont la PKI
• L´intérêt d´intégrer un HSM à votre déploiement Microsoft Double Key Encryption (Chiffrement à double clé)
• Des cas clients concrets dans les secteurs bancaire et énergie
The digital payment landscape evolved rapidly with the acceleration of digital transformation initiatives.
Not only with the requirement for PCI DSS, but also Open Banking, PSD2 compliance, and GDPR – all requiring banks to have controlled, automated, and secure IT infrastructure in order to keep up with new applications and market opportunities.
We will look into trends in the modern payment market such as open banking, fintech, blockchain and mobile technologies, that will impact your business and security strategy to enable next generation payment solutions, whilst protecting customers and enterprise data against insider and outsider attacks.
Join this session to discover:
• new opportunities and security requirements for banks
• threats in modern payment system environments
• encryption strategies, data integrity and key management best practice for banking environment
• challenges and solutions from real customer stories
The way we work, run errands, socialize, and even how we see the doctor has all changed, supported by an unprecedented level of digital transformation. From financial fraud to medical identity theft to ransomware attacks, this massive transformation has also injected many new threats into our daily lives. Today’s digital world demands a modern approach to identity and access management (IAM). Worker, consumer, and citizen identities must be protected to help ensure secure access, communications, and data. But organizations also need to consider the user experience as too much friction directly translates into lost business, decreased productivity, and poor user compliance.
Topics will include:
- Insights into current IAM priorities from Entrust’s own customer base
- Your IAM best practices checklist
- A look at the importance of IAM within the larger cybersecurity ecosystem
Benoit Simon, Fornetix, Jérôme Beclin, Entrust Data Protection Solutions
Chiffrer vos données ne sert à rien si vous ne sécurisez pas vos clés de chiffrement
Aujourd’hui, notre environnement informatique dispose de plus en plus de technologies pour chiffrer nos données. La généralisation de cette pratique est salutaire pour en assurer leur confidentialité et leur intégrité. Mais elle n’est pas suffisante !
En effet, elle crée de nouveaux défis :
-Comment protéger les clés dispersées dans l’entreprise ?
-Comment établir une racine de confiance pour ces clés ?
-Comment automatiser le cycle de vie des clés ?
-Comment centraliser les règles de sécurité ?
-Comment contrôler qui est autorisé à accéder à quelles données ?
Rejoignez-nous dans ce webinaire organisé conjointement par Fornetix et Entrust Data Protection Solutions pour obtenir les réponses à ces questions.
Cryptographic keys stored in software are not hard to find?
On average, a hacker has 160 days before they are detected in your network?
Modern encryption solutions cannot be decrypted through deciphering techniques?
View this webinar as we discuss why it's important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more.
We will also discuss why nCipher's general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market. Crypto keys are everywhere: we directly integrate with F5, Palo Alto, CyberArk, Gigamon and HashiCorp, just to name a few.
John Bejjani: Entrust, Martina Forster: Netcetera, Tanja Steinhoff: Netcetera
Stop Card-Not-Present Fraud while Complying with PSD2
While in-store purchase volume continues to shift to Card-Not-Present (CNP) channels at an exponential rate, there remains considerable fraud risk associated with CNP payments. To help address this risk, PSD2 requires 3 Domain Secure (3DS) compliance for CNP payments. Entrust has partnered with Netcetera to provide an integrated 3DS solution to prevent CNP fraud by requiring a one-click step-up authentication for consumers prior to completing a CNP transaction. Join us to learn more about:
- PSD2 requirements for CNP transactions
- The 3DS specification, including 3DS 2.0 compliance
- Our integrated Entrust Identity – Netcetera 3DS solution with associated benefits for banks and consumers
Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo. Este webinar destacará os recursos simples e fáceis de usar do Sigma.
Matthias Partl Cloud Solution Architect (Azure) Microsoft Identity & Security and Bernd Stamp Technical Lead - DACH nCipher
Praktiken zur Absicherung Ihrer Cloud Ressourcen und Daten.
Cloud Sicherheit zu verstehen ist mehr denn je essentiell - gerade in der heutigen Zeit, in der Sie die neuen Rahmenbedingungen zwingen, die Digitale Transformation so schnell wie möglich umzusetzen.
Dabei sind Sie und der Cloud Service Provider gemeinsam für die Sicherheit Ihrer Cloud basierten Daten verantwortlich.
In diesem Experten-Video erfahren Sie, welche Sicherheitsgrundlagen Microsoft Azure für das Hosten Ihrer Infrastruktur, Anwendungen und Daten in der Cloud bietet; wie die hochsicheren nShield HSMs von Ncipher Security Ihnen ermöglichen von der Flexibilität und Wirtschaftlichkeit der Cloud Dienste zu profitieren und gleichzeitig die Sicherheit Ihres Encryption Key Managments zu stärken indem sie die Kontrolle über Ihre Schlüssel behalten.
Highlights aus der Agenda:
• Azure Secure Foundation (Sicherheitsgrundlagen)
• Bring Your Own Key (BYOK) für Microsoft Azure Key Vault
• Hold your own Key (HYOK) für Azure Information Protection
• Schutzen Sie Ihre Encryption Keys (Verschlüsselungsschlüssel ?) in einer FIPS 140-2 zertifizierten HSM (Hardware Security Module)
• Sellen Sie sicher, dass die Schlüssel nie für Anwendungen in der Cloud sichtbar sind
• Trennen Sie Anwendungen und Key Management Funktionen
Joseph Ling, Chief Solutions Architect, Greater China Region, Data Protection Solutions, Entrust
From WhatsApp to Signal, have you ever worried about the security of your own messages? Even for companies that have implemented end-to-end encryption, public concerns still exist around data protection. Have you ever imagined it could happen to your company as well? Having enabled Hong Kong apps and websites with end-to-end encryption and robust secure key management for many years, Entrust will reveal and analyse the risks of mobile and web applications, and tell you why properly implementing end-to-end encryption should be your top priority.
Top 3 Takeaways
• You will understand end-to-end encryption and how it mitigates risks
• You will know what you should be aware of when implementing end-to-end encryption
• You will learn how to tell your customers that their data is well protected
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.
Sigma: nova geração em impressão segura de cartões de identificaçãoElizeu Queiroz, Account Manager Entrust[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]59 mins