Hi [[ session.user.profile.firstName ]]

Which encryption technologies are making a difference?

As sensitive data proliferates across new environments and applications, most organisations are expanding their use of encryption. But what are the top priorities for enterprises in the Middle East?

Analysts Ponemon Institute conducted a survey of over 300 IT professionals based in the Middle East to create the 2021 Middle East Encryption Trends Study - the most comprehensive encryption survey in the industry.

Join Hamid Qureshi, Senior Executive, Entrust Data Protection Solutions, for this informative webinar to learn about the key insights and findings from this industry-leading study, and receive advice on addressing encryption’s top challenges.

You will learn:
• How your encryption strategy compares to others in the region
• Which threats are causing the most concern
• Trends driving encryption adoption and deployment choices; including multi-cloud encryption
• The growing importance of Hardware Security Modules (HSMs)

You can also read the full report here: https://www.entrust.com/lp/en/middle-east-encryption-trends-study
Recorded Jun 16 2021 42 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hamid Qureshi, Senior Executive, Entrust
Presentation preview: Which encryption technologies are making a difference?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Multi-Cloud Secrets-Management:Bewahren Sie Ihre Geheimnisse sicher Aug 26 2021 8:00 am UTC 47 mins
    Volker Semmelmann, Senior Technical Sales Consultant - Entrust, Lieuwe Helmus, Regional Manager - HashiCorp
    Dieses Webinar behandelt die wachsenden Herausforderungen, die beim Implementieren von zentralisierten Secrets-Management-Anwendungen auftreten und wie Risiken beim Aggregieren von sensiblen Daten verringert werden können.

    Unsere Sprecher begutachten weshalb Cloud-Migrationen, DevOps und regulatorische Compliance einen Vertrauensanker benötigen und beschreiben bewährte Verfahren für das Deployment für diese Lösungen.
    Tagesordnung:

    Hauptvorteile durch das Verknüpfen von Vault und nShield HSM
    Die Bestandteile "Allgemeine Architektur"
    Was passiert beim Verbinden von Vault und nShield HSM?
    Erstellung, Verwaltung und Schutz des Master-Keys welcher das HashiCorp Vault Enterprise sichert
    Zugriff auf Anwendungen erteilen, erneuern und aufheben
    Verschlüsselung und Entschlüsselung von Daten, die von Anwendungen benutzt werden
  • Securing the Future of Payments Aug 12 2021 6:00 pm UTC 60 mins
    Andy Cease, Product Marketing Manager, Instant Issuance, Entrust
    The way the world pays continues to evolve – from magstripes to EMV chips to dual-interface contactless and now mobile formats. But there’s one thing that has remained: the importance of simplicity and security in how consumers pay and how they receive their payment credential.

    Processing sensitive, personally identifiable financial data requires multiple layers of logical and physical safeguards, and providing a seamless experience for your cardholder is becoming increasingly complex by the day.

    In this presentation, we’ll cover why the Entrust Instant Financial Issuance solution creates a perfect cardholder experience from receipt to utilization to renewal, and how delivering a best-in-class experience for your cardholders and colleagues requires best-in-class solution security.

    Attend this webinar to learn more about:
    • The security threats faced by the evolving card issuance technologies
    • How higher levels of security can create a simpler issuance experience for all
    • How to ensure instant gratification for your customers’ card issuance demand
  • The future of cryptography? Aug 4 2021 10:00 am UTC 60 mins
    NA
    It’s the year 2030: Quantum computers are capable of cracking all of the public-key algorithms that provided protection for sensitive data in 2021. Hackers use them to access information in private emails and state authorities use them to obtain data belonging to suspicious institutions. Debit card payments are no longer possible, and trading in cryptocurrencies such as Bitcoin is vulnerable to attack.

    Experts predict that within ten years there will be functioning quantum computers capable of calculating mathematical problems such as the prime factorization of very large numbers millions of times faster than today’s normal computers. And those quantum computers would be able to crack encryption methods which we now believe to be secure.

    How realistic is this prediction, and what does it mean for cryptography?

    Join this live webcast to
    - Hear why organizations need to start thinking about post-quantum security threats now: Migrating to post-quantum cryptography will be difficult. One of the key reasons to start thinking about PQ early is to ensure your business is crypto agile; knowing where you use cryptography, understanding its criticality to your operations and to start preparing today for the shape of things to come.
    - Discover how HSMs provide assurance against unauthorized access to data and identity in a world rife with both internal and external security challenges: Cryptocurrencies and non-fungible tokens (NFTs) are hot investments – representing new forms of digital assets that are disrupting traditional financial services. It’s clear we are witnessing a rapid expansion of the digital asset market and the exponential growth of the role of digital asset custodians.
  • Devenez conforme à l’eIDAS Aug 3 2021 8:00 am UTC 28 mins
    Jérôme Beclin, Pierre Ischan, Data Protection Solutions Entrust
    Devenez conforme à l’eIDAS

    Si votre organisation gère les transactions en ligne de citoyens européens, le règlement eIDAS peut vous ouvrir de formidables opportunités, mais il introduit également de nouvelles exigences.

    Les modules matériels de sécurité (HSM) nShield jouent un rôle essentiel dans la sécurisation des solutions conformes à l’eIDAS, protégeant ainsi les certificats numériques, les horodateurs ou les signatures numériques.

    Ainsi, participer à cet évènement en ligne vous permettra de :

    - comprendre comment un HSM nShield établit une base de confiance pour les systèmes de protection des données afin de générer et de gérer les clés de chiffrement afin de créer des signatures, et aussi d’exécuter des programmes sensibles

    - découvrir comment nos HSM fonctionnent en parfaite harmonie avec les technologies de nos partenaires conformes à l'eIDAS tels que Cryptomathic, Intesi, Safelayer et Nexus

    - voir comment nos clients utilisent les HSM pour fournir des solutions et des services conformes à l’eIDAS, tels que les certificats électroniques, les passeports électroniques, les cartes d’identité électroniques, sécurisant l’autorisation de transactions et les PKI mobiles
  • 2021 Global Encryption Trends: Ponemon insights on evolving threats and drivers Jul 29 2021 2:00 pm UTC 61 mins
    John Grimm, VP Strategy & Business Development; Dr. Larry Ponemon, Chairman & Founder
    The use of encryption to protect sensitive data has never been higher, but deployment and management challenges abound in today’s multi-cloud world. The 2021 Global Encryption Trends Study, the most comprehensive encryption survey in the industry, highlights how organizations are managing encryption strategies in the face of changing regulations and evolving data security threats.

    Join Dr. Larry Ponemon, chairman and founder of the Ponemon Institute, and John Grimm, vice president of strategy and business development with Entrust, for an overview of key highlights of this just-released research, including:
    • Trends in encryption adoption and deployment
    • Evolving threats, drivers, and customer priorities
    • Methods of managing encryption and keys across multiple clouds
    • The increasing role of hardware security modules (HSMs)
  • How to approach enterprise security with Zero Trust in the work from home era? Jul 28 2021 3:00 pm UTC 65 mins
    Madhur Bhargava, Product Marketing Manager, Entrust , Rajan Barara, Director of Product Management at Entrust
    Organizations around the world have transitioned to working from home in past months, and this transition has challenged advanced security models and user behaviors in a COVID-19 world. A significant number of users discovered that poor technology and/or infrastructure was the biggest barrier to effective remote working.

    As we speed towards the new normal of hybrid workplaces, organizations are reviewing their business continuity plans and restoring productivity to pre-covid times. Cybercriminals are getting smarter; work from home has expanded the enterprise perimeter; and the digital ecosystem is growing rapidly including new cloud applications. A significant part of IT Security effort is to ensure appropriate infrastructure and tools for their employees as well as top of the line cyber hygiene controls. Therefore, companies need a cyber security strategy that is consistent and crosses their on-premises perimeter. “Never trust, always verify”, is the bedrock of Zero Trust. With a Zero Trust model, every request to access information/data must be authenticated, authorized, and encrypted before permission is granted. It is not a product but an enterprise cybersecurity plan to protect its resources. In this session the participants will learn about:

    o Enterprise challenges in Zero Trust implementation
    o How Zero Trust responds to different risk factors
    o Ways to secure enterprise Hybrid environment
    o How Entrust's high assurance IAM solution helps in achieving Zero Trust
  • Analyst insights on encryption practices making a difference in the Middle East Jul 28 2021 10:00 am UTC 42 mins
    Hamid Qureshi, Senior Executive, Entrust
    As sensitive data proliferates across new environments and applications, most organisations are expanding their use of encryption. But what are the top priorities for enterprises in the Middle East?

    Analysts Ponemon Institute conducted a survey of over 300 IT professionals based in the Middle East to create the 2021 Middle East Encryption Trends Study - the most comprehensive encryption survey in the industry.

    Join Hamid Qureshi, Senior Executive, Entrust Data Protection Solutions, for this informative webinar to learn about the key insights and findings from this industry-leading study, and receive advice on addressing encryption’s top challenges.

    You will learn:
    • How your encryption strategy compares to others in the region
    • Which threats are causing the most concern
    • Trends driving encryption adoption and deployment choices; including multi-cloud encryption
    • The growing importance of Hardware Security Modules (HSMs)

    You can also read the full report here: https://www.entrust.com/lp/en/middle-east-encryption-trends-study
  • Hoe encryptie digitaal zaken doen veilig en compliant maakt. Jul 28 2021 8:00 am UTC 55 mins
    Richard Meiling, sales consultant bij Multi-Post en Ena Hurmola, senior solutions consultant bij Entrust
    Compliancy omtrent data privacy, een Cloud strategie of juist niet, groeiende cybercriminaliteit, maar toch meer focus op digitaal zaken doen met relaties. IT organisaties hebben veel zaken om rekening mee te houden. Encryptie helpt om daar meer veiligheid in te brengen. Maar dan moet de kern wel beveiligd blijven. Een HSM is het sluitstuk hierop en zorgt ervoor dat cybercriminelen niet met de encryptiesleutel aan de haal gaan en uw gegevens veilig blijven.

    De 3 Takeaways van deze webcast:
    • Creëren van een ‘Root of Trust’ voor uw encryptie
    • Veilig uw data en encryptiesleutels in de cloud
    • Eenvoudig compliant (AVG, eIDAS, PSD2, NEN7510)
  • Contrôlez le chiffrement dans le Cloud Microsoft avec Double Key Encryption Jul 27 2021 9:00 pm UTC 41 mins
    Jérôme Béclin, Ingénieur Avant-Vente, DPS – Entrust, France & Arnaud Jumelet, National Security Officer – Microsoft, France
    Joignez-vous à Microsoft et Entrust : étendez le contrôle et la sécurité des données sensibles dans les environnements cloud et hybrides avec Double Key Encryption.

    Les entreprises migrent de plus en plus leurs données et workload vers des services cloud pour des raisons de commodité, de flexibilité et de rentabilité. Cependant, cette pratique implique que les organisations renoncent à un certain contrôle sur ceux-ci.

    Afin de renforcer le contrôle et la sécurité des données les plus sensibles d'une entreprise, le chiffrement à double clé (DKE) vous permet de définir des niveaux supplémentaires de protection, de contrôle et d'assurance.
    Microsoft Double Key Encryption aide les entreprises à protéger leurs données Microsoft 365 les plus sensibles dans le cloud à l'aide d'une deuxième clé - de la même manière que le ferait un coffre-fort dans une banque.

    Les points clés du webinar:

    • Comprendre les principes du DKE et comment les entreprises le déploient pour protéger leurs actifs les plus précieux et critiques avec Microsoft Information Protection.
    • Découvrir comment protéger les données les plus sensibles avec Azure Information Protection (AIP) en ayant l'assurance qu'elles soient complètement isolées des tiers.
    • Apprendre comment garantir que les clés sont générées et gérées avec les meilleures pratiques et une sécurité maximale
    • Découvrir comment Entrust peut vous aider à déployer votre instanciation Microsoft DKE reposant sur des modules matériels de sécurité (HSM) nShield.
  • Banking security: How to use encryption to protect customer & enterprise assets Recorded: Jul 27 2021 42 mins
    Pali Surdhar, Chief Security Officer, Entrust
    The attacks targeting financial services organizations continue to increase in both volume and sophistication.
    Security-conscious enterprises need to prepare for threats that emanate from external cybercriminals as well as employee errors and malicious insiders.
    While detection, threat intelligence and other techniques have come into vogue in recent years, encryption continues to play a foundational role in protecting sensitive customer data and enterprise assets.
    Join this session to learn:
    • the role that encryption plays in defending financial institutions’ sensitive data
    • the strategies for implementing strong encryption
    • Real-world case studies to address financial institutions’ challenges
  • The time to prepare for CMMC is now Recorded: Jul 22 2021 62 mins
    Stuart Itkin, Vice President, CMMC and FedRAMP Assurance Coalfire Federal
    CMMC, which affects organizations in the DoD supply chain, establishes a minimum threshold of cyber maturity that all organizations must achieve. CMMC is pass-fail, and failure to become certified disqualifies an organization from being able to supply to the DoD. While CMMC requirements begin roll out this year, many organizations don’t appreciate the effort and the time required to satisfy those requirements, and many have not begun. Certification requirements and the certification process are both exacting. Organizations looking to become CMMC compliant are surprised to learn how exacting and difficult it is to satisfy the requirements.

    We are pleased to be joined by Stuart Itkin, VP CMMC & FedRamp Assurance at Coalfire Federal, to discuss:

    • Why CMMC is important and why it was created
    • A quick overview and description of the CMMC framework
    • How to undertake the journey from where you are and need to be
    • The assessment process: what to expect
    • The impacts of CMMC beyond the DoD supply chain
  • Schutz von hochsensiblen Daten in der Cloud Recorded: Jul 22 2021 40 mins
    Volker Semmelmann, Senior Systems Engineer - Entrust
    Die Verwaltung der Sicherheit von Workloads in dynamischen und virtuellen Umgebungen ist häufig zeitaufwändig und komplex. Die Verschlüsselung des Workloads hilft Unternehmen sicherzustellen, dass hochsensible Daten und Applikationen von aktuellen Bedrohungen und Sicherheitslücken geschützt sind.

    Die Kombination aus HyTrust und Entrust nShield HSMs bietet Ihnen eine einzigartige Lösung für vereinfachte und skalierbare Verschlüsselung, sowie eine Schlüsselverwaltungs-Lösung mit Unterstützung von VMware vSphere VM Verschlüsselung und VMware vSAN Datenverschlüsselung.

    Nehmen Sie an diesem Webinar teil und erfahren Sie wie Sie:
    • im großen Stil Verschlüsselungsschlüssel durch die Verwendung von FIPS-140-konformer Hardware verwalten.
    • durch die Automatisierung der Schlüssel-Lifecycles das Management von verschlüsselten Workloads vereinfachen.
    • Verschlüsselungsschlüssel für virtuelle Maschinen und verschlüsselte Storage-Arrays verwalten, um hochskalierte Deployments zu unterstützen.
    • Mit Hilfe von Policy-basierte Kontrollen die volle Verantwortung über ihre Schlüssel erreichen, um regulatorische Compliance einzuhalten.

    Möchten Sie die Sicherheit Ihre Daten und Infrastruktur erhöhen? Dann registrieren Sie sich noch heute und erfahren Sie wie Entrust Ihnen dabei helfen Kann.
  • Protéger les données dans un environnement cloud hybride Recorded: Jul 20 2021 30 mins
    Jérôme Béclin, Encryption Engineer Evangelist à Entrust, Data Protection Solutions
    Le chiffrement des charges applicatives aide à garantir la protection des données d´entreprise, même si celles-ci venaient à tomber entre de mauvaises mains. La gestion de la sécurité de ces charges dans un environnement dynamique et virtualisé reste pourtant un défi chronophage et complexe pour les administrateurs, alors que la gestion des clés pour des dizaines de milliers de charges applicatives chiffrées n'est pas anodine.
    Ainsi, pour garantir une forte sécurité des données, les clés doivent faire l'objet d'une rotation fréquente et être transportées et stockées en toute sécurité.
    Découvrez les solutions ainsi que les bonnes pratiques lors de ce webinar.

    Lors de ce webinar animé par Jérôme Béclin, Encryption Engineer Evangelist à Entrust , vous apprendrez comment :
    • Gérer les clés de chiffrement à l'échelle en utilisant le chiffrement conforme à la norme FIPS-140.
    • Simplifier la gestion de charges applicatives chiffrées en automatisant et en simplifiant les cycles de vie des clés de chiffrement.
    • Maîtriser les clés de chiffrement avec des contrôles basés sur des politiques pour protéger les données et répondre aux exigences de conformité.

    Ne manquez pas la démonstration HyTrust KeyControl : gestion des clés de chiffrement de manière évolutive de toutes vos machines virtuelles et vos data stores pour une prise en charge de milliers de charges applicatives dans les grands déploiements.
  • A new way to enable high-trust signing for a digital business Recorded: Jul 15 2021 38 mins
    José Perez, Sales Engineer at Entrust and Pierluigi Pilla, ID Systems and PKI Unit Director at Bit4id
    Secure the exchange of documents with legally binding requirements by learning how to enable a high-trust, compliant environment for digital signatures from this webinar.

    This live webinar will be presented by Jose Perez, Sales Engineer at Entrust and Pierluigi Pilla, ID Systems and PKI Unit Director at Bit4id.

    Top 3 Takeaways
    - Bit4id Signing Today: exchanging documents requiring legally binding signatures in a high-trust environment
    - Integration between Entrust nShield HSMs and Bit4id solutions: a root of trust for the creation, management and protection of encryption and signature keys
    - Bit4id, Entrust and Uanataca: an eIDAS compliant digital signature solution
  • Increase insight into your card issuance process Recorded: Jul 14 2021 36 mins
    Heather Petschl, Product Manager, Entrust
    Learn from Entrust leaders with experience and expertise in supporting your operation and your data needs. We will review the ways customers track data today and the opportunities and challenges that brings to the production process. Learn how Production Analytics Solution can provide you with dynamic dashboards for self-sufficient, digital intelligence as well as engagements with experts that will provide you with actionable next steps to improve your operations efficiency and effectiveness.

    Benefits of the webcast

    * Learn how others are tacking data in their card issuance operations
    * What are the pros and cons of each method
    * Hear about solutions that help you become more efficient
  • How to protect critical data in a hybrid cloud environment Recorded: Jul 13 2021 36 mins
    Wayne Lewandowski, VP of Global Sales, HyTrust and Mike Turner, VP, Sales Engineering & Evangelism
    Managing the security of workloads in a dynamic, virtualized environment is a time-consuming and complex challenge for administrators. Encrypting workloads helps enterprises to ensure their data is protected, even if the data falls into the wrong hands. However, managing the keys for tens of thousands of encrypted workloads is not trivial. To ensure strong data security, keys have to be rotated frequently, and transported and stored securely.

    We also know that now more than ever, when dealing with new working environments, vulnerability risks and other issues, data protection is essential. We are here to support and protect your business critical data in these challenging times.
  • What Visa Ready Certification Means to your Instant Financial Issuance Program Recorded: Jul 13 2021 56 mins
    Andy Cease is a Product Marketing Manager in the Instant Issuance business unit at Entrust.
    The payments landscape is evolving rapidly. Are you prepared? Join us to learn how the Entrust Visa Ready-certified Instant Financial Issuance solution can supercharge your card program’s performance and cardholders’ satisfaction while reducing cost and complexity for your financial institution.

    With unparalleled security and simplicity delivered by the industry’s leading provider, there’s no better way to equip your customers and members with their preferred way to pay: the contactless card.

    Attend this webinar to learn more about:
    • What instant card issuance is and how it can improve the client experience
    • How higher levels of security can create a simpler issuance experience for all
    • How to ensure you stay relevant in the eyes of your clients and prospects
  • A roadmap for secure digital healthcare Recorded: Jul 8 2021 38 mins
    Jenn Markey, Product Marketing Director, Entrust Identity
    Heightened patient expectations, enabling technologies like mobile and IoT, and complex compliance mandates are all forces fueling healthcare’s digital transformation. Going digital introduces new security challenges and risks. And healthcare is already vulnerable with an average data breach cost of $7.13M roughly double the overall average. Participants in this webinar will receive a roadmap to secure digital healthcare delivery including:

    - How to protect patient data
    - How to secure healthcare infrastructure
    - How to enable a secure, productive and hybrid workforce
    - How to safeguard healthcare delivery, transactions and payments
  • RGPD et sécurité des données dans le Cloud : quelles solutions ? Recorded: Jul 8 2021 54 mins
    Geoffrey Portier, Channel Manager à Entrust & Gilles d´Arpa, VP Cloud security à Rohde & Schwarz Cybersecurity
    En juillet 2020, la Cour Européenne de Justice invalide le Privacy Schield dans l’arrêt Schrems II au motif que la sécurité des données personnelles n’est pas assurée en conformité avec la réglementation RGPD. Cette décision est confirmée par la CNIL deux mois plus tard ainsi que par le conseil d’Etat.

    Pourtant Le Cloud et les Cloud continue de connaitre un véritable essor. Alors quelles sont les contraintes et les solutions pratiques pour rester en conformité avec la directive GDPR ou NIS tout en déployant dans le cloud ?

    Lors de ce webinar, Geoffrey Portier, EMEA Channel Manager à Entrust et Gilles d´Arpa, VP Sales Application & Cloud security à Rohde & Schwarz Cybersecurity feront le tour de la question
    et aborderont non seulement le contexte règlementaire français mais aussi les solutions au détour de présentation de cas clients.

    Dans ce webinar :

    • Présentation des impacts des réglementations sur les applications et données dans le cloud
    • Quelles solutions peuvent être mises en oeuvre pour être conformes à ce nouveau contexte amené par l’arrêt Schrems II
    • Quelles solutions pragmatiques Rohde & Schwarz Cybersecurity peut vous apporter dans ce contexte
    • Valeur ajoutée des solutions Entrust pour la protection des clés de chiffrement et de vos données sensibles
  • IDaaS - Born in the cloud, offered as a service Recorded: Jun 30 2021 50 mins
    Madhur Bhargava, Product Marketing Manager, Entrust
    The recent times have changed the way we consume as well as transact. We are no longer restricted to physical premises for work; nor are we required to visit brick and mortar setups to buy groceries or conduct our banking. All the tasks are easily accomplished through various apps and services available on our mobiles. In this digital world, all we demand is an agile solution with increased functionality in a simple UI. Enterprises, on the other hand, want scalable solutions with high availability and reduced governance.

    Services developed on cloud and offered “as a service” address these changing business requirements and user preferences. Tune in to understand how this is interpreted in the world of digital security and know about our solution - Identity as a Service. Participants will get to learn :
    Please, press the button to start editing this field

    - Rise of “as a service” solutions and the reasons behind it
    - Challenges in digital security
    - The push for Identity centric solutions
    - Entrust’s Identity as a Service
Securing the world in motion.
Entrust keeps the world moving safely by enabling trusted identities, payments and data protection around the globe. Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, or accessing corporate networks. With our unmatched breadth of digital security and credential issuance solutions, it’s no wonder the world’s most entrusted organizations trust us.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Which encryption technologies are making a difference?
  • Live at: Jun 16 2021 7:00 am
  • Presented by: Hamid Qureshi, Senior Executive, Entrust
  • From:
Your email has been sent.
or close