Hi {{ session.user.profile.firstName }}

McAfee Identity Center of Expertise - Cloud Single Sign On Overview & Demo

Manage webcast
Robert Craig, Senior Product Marketing Manager at McAfee
Is your company or organization outsourcing applications to the cloud?

The cloud is great for cutting costs and improving productivity, but it also creates new security challenges. You need to create, monitor, and manage your user’s software-as-a-service (SaaS) application accounts and secure their access.

Connecting to hundreds of popular SaaS applications, McAfee Cloud Single Sign On (Cloud SSO) synchronizes with your existing identity repositories. It provides your users with a single sign-on experience while securing their access using its built-in multi-factor authentication. Available for both on-premises and SaaS-based deployments, McAfee Cloud SSO has the flexibility to meet the cloud security and identity and access management needs of organizations of all sizes – from small companies to large enterprises.

Attend this webcast to learn about the advantages and costs of implementing single sign-on for cloud applications. A McAfee security expert will make the business case for SSO, share deployment best practices, and demonstrate McAfee’s solution - McAfee Cloud Single Sign On.

Attend this webcast to learn how to:
• Provide your users with the convenience and added security of standards-based SSO.
• Extend your enterprise security policies and procedures to protect your SaaS applications.
• Reduce the administrative overhead costs of managing access to critical applications and data in the cloud.
• Seamlessly enforce strong authentication based on business needs and requirements.
• Integrate SSO and authentication with McAfee Web Protection for comprehensive cloud security.

The presentation and demonstration (30 minutes) will be followed by a live Q&A session (10-15 minutes). The webcast will be in English.
Oct 24 2013
45 mins
McAfee Identity Center of Expertise - Cloud Single Sign On Overview & Demo
More from this community:

IT Security

  • Date
  • Rating
  • Views
  • The Nordic region is known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government. However, these unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns. FireEye Threat Intelligence assesses that threat actors aggressively target strategic industries and government and military organizations in search of valuable economic, political, or military intelligence.

    In this webinar we will be drawing on the findings from our recent report, Cyber Threats to the Nordic Region.

    Register now to learn about:

    •Some of the specific threat activity we have observed against Denmark, Finland, Iceland, Norway, and Sweden
    •Attacks on Critical Infrastructure in the Nordics
    •The motivations and drivers of future threat activity in the Nordics
    •How to respond to advanced attacks
  • Our dependencies are clear. Organisations have become virtual, and all of this progress relies on systems and infrastructure that no one organisation maintains, and there is no turning back. Significant time and resources are being dedicated to coping with mistakes and oversights, while remediation time following system or data compromise is steadily getting longer.
    Industry has been cornered into a reactionary position addressing incidents as they occur.

    Such concerns are set to dominate discussions at the 2nd Annual (ISC)² Security Congress EMEA, October 20-21 in Munich, Germany.

    Join (ISC)², Infosecurity Magazine and two of the several top notch (ISC)² Security Congress EMEA speakers to examine our progress, how to challenge our reactionary position, and what is required to look forward to the future.

    Moderator: Michael Hine, Deputy Editor, Infosecurity Magazine
    Panellists: Adrian Davis, Managing Director, (ISC)² EMEA; Yiannis Pavlosoglou, Director of IT Risk, UBS; Georg Freundorfer, Director Security EMEA, Oracle

    WIN A FREE TICKET TO CONGRESS!
    (ISC)² is giving away 3 delegate passes for the 2015 (ISC)² Security Congress EMEA, to delegates who view the webinar for a minimum of 50 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. The free pass is valid for all sessions including pre-conference workshops and networking opportunities. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser: http://bit.do/isc2emeacongressprize
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • You already know the power of application segmentation to deliver data center and cloud security—now you can take segmentation to the next level. Nano-segmentation is finally a reality.

    In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.
    Register to find out how to:

    - Reduce your data center and cloud attack surface by 99%
    - Quarantine compromised servers in seconds
    - Achieve compliance in hours
  • Patching systems and applications is a huge challenge, and doing it manually is not an option.
    In this session Microsoft MVP Raphael Perez will look at the basics of SCCM Automation with PowerShell. You'll learn when automation should be used, get tips on making the most of WMI, SCCM PowerShell cmdlets and some of the techniques he uses when creating automation scripts.

    Live attendees of this session will automatically participate in a draw of three editions of Raphael’s latest publication: System Center 2012 R2 Configuration Manager: Automation from Zero to Hero

    About Raphael Perez: Raphael is one of the only three ‘Enterprise Client Management MVPs‘ based in UK, specialising in System Center Configuration Manager (SCCM) and with over a decade of front-line enterprise experience of working with Microsoft technology and Management solutions. Raphael has worked on a number of different enterprise SCCM, OS Deployment and Patch Management projects over the years.
  • Today’s cyber defenses generate a torrent of security alerts. Some of them can be useful, even essential. Many are not. And telling the difference isn’t always easy.

    When assessing security products, organizations often equate a large volume of alerts with more thorough threat detection. But as anyone who’s been roused awake by a car alarm at 3 a.m. knows, it’s the quality of these alerts—not the quantity—that really matters.

    This webinar will examine the four biggest problems with reactive, alarm-based defenses in conventional security deployments.

    Join us to:

    -Learn how to alleviate alert fatigue
    -Detect true threats, provide quality alerts and enhace them with ample context and insight so security teams can act on them
    -Sort out the alerts you must respond to from those you should respond so
    -Discover how to recognize multiple separate alerts that might be part of a multi-pronged attack on your network

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: McAfee Identity Center of Expertise - Cloud Single Sign On Overview & Demo
  • Live at: Oct 24 2013 3:00 pm
  • Presented by: Robert Craig, Senior Product Marketing Manager at McAfee
  • From:
Your email has been sent.
or close
You must be logged in to email this