451 Group and Gemalto Present "The Keys to Multi-Cloud Security"
The cloud isn’t consumed by enterprises in just one way. Enterprises have varying internal capabilities and infrastructure means using different deployment models, on or off-premises, private and public clouds, hosted clouds through via multiple cloud vendors, which lends to a complex environment. Today, enterprises run roughly 41% of applications in the cloud, but workloads in cloud environments are expected to increase to 60% over the next two years. Organizations with multiple cloud platforms is becoming a fact of life, but creates challenges for businesses needing to secure them.
Understanding the risks of each cloud platform is crucial to defining and implementing strong, dynamic data protection policies with comprehensive key management across all cloud-enabled environments. When encryption is used, the risk is transferred from the data itself to the cryptographic key. This is why it is essential that organizations control their own key infrastructure. Diving deeper into the topic, Eric Hanselman from 451 Group and John Ray from Gemalto will discuss the three key considerations to a successful multi-cloud security strategy: interoperability, control and compliance.
Join our webinar “The Keys to Multi-Cloud Security” on Tuesday, December 13th 2016 and learn about:
• Recent findings on enterprise cloud usage from 451 Group
• How to analyze the security risks of your cloud platforms
• Security practices for different cloud platforms and business processes
• Future-proofing your Cloud security and data protection compliance
• How security can work in the multi-cloud universe
• Implementing a key management system that you own
RecordedDec 13 201663 mins
Your place is confirmed, we'll send you email reminders
Graeme Pyper, Regional Director A/NZ at Gemalto and Vaqar Khan, Senior Security Consultant, UL Identity Management & Security
Amazon, eBay, Alibaba, Black Friday, Cyber Monday amongst others are all fuelled by online credit card payments. Even traditional bricks and mortar businesses accept card payments through point-of-sale devices, online or via applications on mobile devices. This trend is only going to grow as the world move towards a cashless society.
With the same motivation as criminals stealing cash, in the digital age cyber criminals are now stealing personal financial information from payment card transactions and payment processing systems.
The PCI Security Standards Council (PCI SSC) offers a set of standards and supporting materials to enhance credit card security. For retailers, financial institutions, payment processors, and a range of other organizations that store, process and/or transmit credit card data, and the service providers that enable their businesses, compliance with the relevant the PCI standards (e.g. PCI PTS, PCI DSS, PCI PIN, PCI P2PE, PCI 3DS) is critical to ensure the safe handling of credit card information at every step.
This webinar will discuss and provide helpful and practical information on:
•The overview of PCI standards and how they apply to businesses
•Encryption and key management requirements in PCI and how to comply with focus on PCI DSS, PCI PIN, PCI P2PE and PCI 3DS
•How to secure sensitive cardholder data & meet the critical challenges of complying with PCI standards
Garrett Bekker, Senior Security Analyst at 451 Research and Stephane Vinsot, Senior Director, IAM Product Strategy at Gemalto
Up until now, PKI hardware’s limitations meant companies could not adopt cloud and mobility projects without having to completely ‘rip and replace’ their current security framework. As a result, companies have been using smart cards and tokens to allow their employees to authenticate themselves while accessing corporate resources, but this was limited to activity within the enterprise perimeter. In addition, companies that use PKI credentials for email encryption and digital signing have also been limited to on-premises environments.
In this webinar, you will learn about how organizations can deploy SafeNet Trusted Access and benefit from single sign on (SSO) and high assurance PKI-based authentication, making it easier and more secure to access cloud and web-based apps and resources from wherever and on any device. Using the solution, employees will no longer have to re-authenticate each time they access a resource with their smart card, enabling more efficiency across the company – while allowing enterprises to maintain high assurance security when needed.
In this webinar you will also learn how to build on current PKI investments, and embrace digital transformation without compromising on security, including:
•Enabling cloud transformation: Organizations can extend PKI credentials to access policies, allowing CISOs to maintain security in the cloud by triggering the use of step up PKI-based authentication to cloud and web-based apps when needed
•Facilitating mobility: Employees can access enterprise applications within virtual environments with their PKI credentials. This means that employees and consultants will be able to access corporate apps via a VDI, from any device and carry out certificate-based transactions, even if they can’t use their smart cards
MNP: Danny Timmins, Cyber Security; Miller Thomson LLP: Imran Ahmad, Business Law Partner; Gemalto: Todd More, SVP Encryption
We live in an environment of ever-increasing cybersecurity risks. As new mandatory breach reporting regulations come into effect on November 1, 2018 – the stakes will soon be even higher.
Canadian organizations must also be prepared to communicate with federal regulators and all affected parties the details of any cyber attack that could potentially lead to “real risk of significant harm.” – or experience costly financial, legal and reputational damages well-above the loss of data and proprietary information.
During this insightful webinar, MNP, Miller Thomson LLP and Gemalto will provide all the information you need to understand the new rules, ready your organization and better protect yourself from the growing criminal and regulatory threats all around you.
Gary Marsden, Senior Director of Data Protection Services at Gemalto
While the technological and commercial advances of the cloud have created significant opportunities for enterprises, service providers and IT vendors alike, this cloud-driven transformation has also undone conventional approaches to data security and created compliance challenges when it comes to data control and ownership.
These changes have unwittingly drawn us into a realm of increasing threat vectors, poor security practices and bad actors. From reducing cost of ownership to empowering IT decision making across the value chain, it is safe to say that the cloud means that life will never be the same for anyone.
During this webinar we will:
- Look at the challenges facing today's IT and security teams;
- See how this wave of disruption can be overcome using ever advancing automation, processing and intelligence technologies that can be used to build and deliver security an increasingly diverse IT landscape; and
- Look at how security will need to evolve in the wake of digital transformation.
Michael Gardinar, Principal Architect, Enterprise & Cybersecurity CTO Office, Gemalto; Brandon Dunlap (Moderator)
We’ve all heard that quantum computers are coming; beyond being a boon for materials science they’re going to wreak havoc for cybersecurity. Part 3 of this series from Gemlato will outline the scope of the problem (it’s more than just algorithms) as well as the work required and being done to protect data through the upcoming transition.
SafeNet Trusted Access (STA) is a cloud-based access management service that makes it easy to manage cloud and web access with single sign-on, access policies and strong multi-factor authentication.
Watch the 30-minute demo webinar to learn how you can:
- Simplify user access with cloud single sign-on
- Quickly set up access policies - Start global & go granular
- Enable trust elevation and step-up authentication
- Seamlessly integrate apps with a catalog of ready to use templates
- Optimize security with contextual information
Ferry de Koning, Director Business Development, Gemalto and Gary Marsden, Senior Director, Encryption Products
Fintech startup companies are disrupting the financial services industry, raising more than $120 billion over the last three years. Although these new entrants are changing how money and markets operate, they must still do business within the realities of regulations like GDPR and Australia's Notifiable Data Breaches scheme that the rest of the financial industry must operate. This means that data security and trust are just as important to Fintech companies as it is to traditional banks.
Fintech companies are unique because of their agility, lean operations and that most are built using the cloud and digital technologies that banks are just now adopting. While this makes Fintech companies more nimble and they can enter new markets faster, it also presents more complexities for how Fintech companies need to manage security and meet compliance mandates.
In this webinar you will learn about:
•Fintech compliance and regulation from a data protection perspective.
•How to build a secure the breach strategy using a case study from the physical world
•Understand key elements for building cloud-based data security strategy that fits the needs of Fintech companies
On the eve of quantum computing, the definitive need for crypto-agility is greater than ever. The ability to locate, manage, and securely update digital certificates on a network or on a device seems like a simple task, yet with the advent of new Enterprise use cases and flourishing IoT device introductions, management at massive scale becomes a challenge. Facing mounting pressures, IT security personnel and product managers are tasked with implementing solutions fit for today’s environment plus tomorrow’s post-quantum world. Join renowned Public Key Infrastructure (PKI) expert and Certified Security Solutions (CSS) CTO, Ted Shorter, as he outlines the defense against quantum computing and the IoT device invasion, crypto-agility:
· How can crypto-agility lend itself to a truly future-proof Enterprise and IoT device security strategy?
· Cryptographic kryptonite: demystifying quantum computing
· Challenges with digital certificate/device management at scale
Dr. Shawn Murray, Principal Scientist, US Missile Defense Agency & Director, ISSA International
Ted Shorter, CTO, Certified Security Solutions (CSS)
Michael Gardiner, Principal Architect, Gemalto
Michele Mosca, Founder, Institute for Quantum Computing
Mike Brown, CTO & Co-Founder, ISARA Corporation
Alexander Hanway, Sr. Product Mrky Mgr, Data Protection, Gemalto; Andrea Middleton, Sen Sec. Prod Mgr. NetApp; Brandon Dunlap
The General Data Protection Regulation (GDPR) is the biggest overhaul of EU data protection law in more than 20 years. It’s not simply another regulation. It’s about accountability and it’s reshaping how organizations view and interpret privacy. Join us as we uncover the regulation, define a new lens and perspective to address not only the GDPR, but other regulations which are sure to follow. Understand the ecosystem and seamless integrated security solutions necessary to address these key privacy challenges. Whether you are looking for insight, guidance, or solutions to privacy, join in on this journey with GDPR as a guide to understanding and addressing privacy in today’s organizations.
Cloud, mobile, big data, the internet of things. Your enterprise is undergoing its digital transformation. But these new technologies mean more risk to your data as it moves beyond the perimeter.
You know that a data breach is inevitable. So, when it happens to your business, will your data be secure?
Gemalto’s portfolio of SafeNet identity and data protection solutions provide the centralized data security you need to secure the breach.
Keep your data protected and secure your enterprise’s digital transformation.
Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas
Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.
In this webinar you will learn about:
•What is the best network fit for virtualized encryption
•How to implement a virtual network encryption appliance in software-defined network
•What are the cost, operational and performance benefits of virtual encryption
•What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
Thanks to SafeNet Trusted Access by Gemalto you can centrally manage access to cloud applications. The solution is flexible enough to easily adapt to business and security requirements but also convenient for employees thanks to the enhanced Single Sign On capability.
With Safenet Trusted Access, you have a central service that lets you manage single sign on with granular access control and enforce appropriate levels of authentication across your enterprise cloud applications.
For more information visit https://safenet.gemalto.com/access-management/idaas-safenet-trusted-access/
Gorav Arora, Director, Office of CTO, at Gemalto & Ben Rogers, Solution Architect, Venafi
Machines are increasingly taking over tasks traditionally conducted by humans. Moreover, they often work independently to improve business productivity. As more and more machines come into existence, we need to be able to reliably identity which machines should be trusted and which shouldn’t. But the security that protects machine identities can no longer be slowed down by traditional manual or homegrown methods. These methods are no longer sufficient to allow organizations to scale and thrive at the speed of business.
Join us at this webinar to learn how Gemalto and Venafi help organizations address these challenges.
A hardware security module is a dedicated crypto processor, designed to protect the crypto key lifecycle, validated for security by third parties (FIPS 140-2, Common Criteria, PCI HSM, FIPS 201).
A hardware security module is a trust anchor. A trust anchor that protects the things we use every day. Things like SSL, DNS, banking and websites. Mobile devices. Smart meters. Medical devices. National identity cards. Credit card data and PINs. Mobile payments and verbal banking. Digital documents. Passports.
And so much more. Hardware security modules typically are appliances or cards. Appliances or cards that ensure compliance. Simplify audits. Improve performance. Securely generate and store keys.
Hardware security modules are trusted by the most security-conscious companies, agencies, banks, and service providers in the world.
Hardware security modules: trust anchors in a digital world.
For more information, visit https://safenet.gemalto.com/data-encryption/hardware-security-modules-hsms/
Gorav Arora, CTO Office Director of Technology at Gemalto
A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.
We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.
Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
•A grounded perspective on IoT
•Why IoT security matters for everyone
•The persona analysis of IoT security
•Key considerations as it begins to take off
•How to protect what matters most to you
SafeNet Data Protection On Demand is a cloud-based platform providing a wide range of on-demand key management and encryption services through a simple online marketplace. Security is now simpler, more cost effective and easier to manage because there is no hardware to buy, deploy and maintain. Just click and deploy the services you need, provision users, add devices and get usage reporting in minutes.
What is PKI (Public Key Infrastructure)?
Discover what you need to know about the level of security PKI provides, how easy it is to implement and how convenient it is for users.
Public key infrastructures (PKIs) are relied upon to secure a broad range of digital applications, validating everything from transactions and identities to supply chains. However, infrastructure vulnerabilities represent a significant risk to the organizations that rely on PKI alone to safeguard digital applications.
Gemalto offers PKI encryption key management solutions to help you protect the keys at the heart of PKI as well as PKI-based authentication tokens that leverage the security benefits offered by PKI to deliver dependable identity protection
Watch and learn how PKI can benefit you and your organization.
For more information visit https://safenet.gemalto.com/data-protection/pki-credential-management/
From the physical and virtual data center to the cloud, Gemalto's SafeNet encryption and tokenization solutions help organizations remain protected, compliant, and in control. Gemalto's solutions enable organizations to secure sensitive data in databases, applications, storage systems, virtualized platforms, and cloud environments.
As the global leader in digital security, Gemalto brings trust to an increasingly connected world. From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.
Gemalto’s solutions are at the heart of modern life, from digital payments and transactions to enterprise security and the Internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.
451 Group and Gemalto Present "The Keys to Multi-Cloud Security"John Ray, Senior Product Strategist and EricHanselman, Chief Analyst at 451 Group[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]63 mins