Hi [[ session.user.profile.firstName ]]

Beyond 2FA: The Smart Way to Manage Cloud Access

Cloud apps are being pulled into the enterprise hand-over-fist, with 93% of organizations using cloud-based IT services. But the efficiencies and convenience offered by cloud apps come at a price. While organizations have long been applying two-factor authentication to their network, VPN and email portals, they have failed to extend that same level of security to cloud-based applications, such as Office 365, AWS and Salesforce.

But the need for stronger cloud access security is only part of the story. Businesses looking to scale and increase their cloud adoption find there are other issues to contend with. Visibility into cloud access events and regulatory compliance become challenging to maintain. Helpdesk staff are burdened with password resets, and the most important link in the chain—users—are plagued with password fatigue.

This webinar explains:
•Challenges to greater cloud adoption in the fintech space
•How strong authentication complements access management
•Why cloud access management is critical to an organization’s cloud adoption strategy
Recorded May 9 2017 44 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mor Ahuvia, Authentication Product Marketing at Gemalto
Presentation preview: Beyond 2FA: The Smart Way to Manage Cloud Access
  • Channel
  • Channel profile
  • Why Data Discovery Should Be the First Step in Your Security Strategy Jun 16 2020 2:00 pm UTC 60 mins
    Tzach Kaufmann, Director of Product Management, Data Discovery & Classification, Thales
    Encryption of sensitive data is a key element of data-centric security. However, most businesses do not know where to start because they lack a clear understanding of what needs to be protected and where. Without a clear visibility into sensitive data and its risks, they cannot determine effective policies and controls to protect it!

    This webinar will discuss one of the first steps you must take to protect your data - find and know what your sensitive data is. We will show how the Thales CipherTrust Data Discovery & Classification solution can help you discover, classify and automatically protect sensitive data from a single pane of glass.
  • Data Security Threats and Trends in Europe Jun 16 2020 12:00 pm UTC 60 mins
    Chris Harris, Director of Sales Engineering, EMEA at Thales
    Digital transformation and the move to the cloud are fundamentally changing business operations throughout Europe and are putting organizations’ sensitive data at risk. Traditional market leaders are driven to digital transformation by the opportunity for greater efficiency, flexibility and new business models – while also fending off rivals entering their markets with an “all digital” focus. In this session we’ll address the state of data security in European enterprises today, the changing landscape of risks to data due to digital transformation, and IT security pros priorities for data security today.

    Based on the results from the 2020 Thales Data Threat Report – European Edition, in this webinar you will learn about:
    - How the adoption of digital transformation technologies, and especially cloud, is putting sensitive data at greater risk
    - The data security challenges facing European enterprises today
    - Analyst recommendations for how organizations can be most effective when selecting the right tools to protect their sensitive data
  • Thales şirketinizin KVKK’ya uyumlu olmasını nasıl sağlıyor? Jun 16 2020 11:00 am UTC 60 mins
    Erhan Seckin Regional Sales Manager and Sercan Koc, Pre-Sales Consultant (Turkey and Greece)
    Dünya çapında hızla yayılan ve her ölçekte firmanın uyması gereken kişisel veri koruması yasaları Türkiye’deki kurumlarıda etkilemeye devam ediyor. Bu webinar’da ülkemizdeki adıyla KVKK’nın isterlerinden bahsetmeye çalışacağız. Aynı zamanda Thales’in Data Discovery and Classification modülü ve diğer çözümleri ile bu isterleri nasıl adresleyebileceğini ve kurumlara nasıl yardım edebileceğini konuşacağız. Thales ürün ailesini tanımak ve canlı demo ile kabiliyetlerini görmek isterseniz webinarımıza davetlisiniz!
  • Secure Your Digital Transformation Journey with Thales and Microsoft Jun 11 2020 2:00 am UTC 90 mins
    Vasupon Thankakan (Vin), Microsoft Azure Business Group Lead; Sarawut Pavasajjanant (Ton), Thales CPL, DIS SecurityConsultant
    พร้อมที่จะปรับเปลียน และ ปกป้องข้อมูลของคุณ ในโลกที่เต็มไปด้วยข้อบังคับ ( regulation ) กับ Thales และ Microsoft (11 มิถุนายน)

    For virtually every organization today, the adoption of cloud services continues to expand — and so does the use of encryption. Join us with your morning coffee and learn how you can embark on your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.

    Key Highlights:
    - What is Microsoft Migration Program?
    - How Microsoft manages customer data?
    - What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
  • Trends, Technologies and Challenges of Payments Industry Saudi Arabia and Levant Jun 9 2020 11:00 am UTC 60 mins
    Simon Keates, Head of Strategy for Payments Security and Omar Hassan, Presales Consultant, Saudi and Levant
    The payments industry is undergoing intense transformation caused by customer demands, technology advancements, globalisation, disintermediation by new entrants, and increasing regulatory requirements. On top of this, fraud by cyber criminals continues to evolve with attacks becoming increasingly sophisticated.

    Join this webinar where will discuss evolving trends, technologies and regulations affecting the payments industry, and how Thales can help meet these challenges.
  • Hành trình chuyển đổi số an toàn, bảo mật cùng với Thales và Microsoft Recorded: Jun 5 2020 62 mins
    Vy (Gavin) Nguyen, Partner Technical Specialist, Microsoft, Huynh Tuan Kiet, Security Solution Manager, HPID
    Ngày nay, đối với hầu hết mọi tổ chức doanh nghiệp, việc áp dụng các dịch vụ đám mây (cloud services) ngày càng có xu thế mở rộng, đồng thời mở rộng hơn việc sử dụng mã hóa. Hãy tham gia buổi trò chuyện trong giờ café buổi sáng của bạn cùng chúng tôi, tìm hiểu cách bạn có thể bắt đầu hành trình chuyển đổi số an toàn và bảo mật cho hệ thống dữ liệu cũng như ứng dụng của bạn - cùng các giải pháp kết hợp của Thales và Microsoft.

    Nội dung chính:
    • Chương trình chuyển đổi lên cloud của Microsoft diễn ra như thế nào?
    • Microsoft quản lý dữ liệu khách hàng ra sao?
    • Giảii pháp quản lý khóa Bring Your Own Key(BYOK) và Your Own Encryption (BYOE) là gì?
  • Como Implantar Pagamentos Instantâneos PIX com Segurança, Escala e Flexibilidade Recorded: Jun 4 2020 62 mins
    Abilio Branco, Head of Sales Brazil, Thales CPL Encryption; Murilo Fernandes, Gestor Comercial - EVAL
    O sistema de pagamentos instantâneos PIX promete revolucionar a indústria de pagamentos no Brasil. Mas, instituições financeiras têm que estar alertas para os desafios de segurança, escalabilidade e flexibilidade que são essenciais para o sucesso dos pagamentos instantâneos.

    Participe de nosso Webinar para entender como superar desafios como:

    •Estar preparado para milhões de transações e momentos de pico.
    •Processar transações com o maior nível de segurança.
    •Estabelecer disponibilidade 24x7x365 para uma infraestrutura essencial para a sociedade.
    •Atingir o tempo estimado da transação entre recebedor e pagador menor que 10 segundos.
    •Implementar um sistema escalável, seguro e flexível antes de novembro de 2020.

    HORARIO: 11:00 Horário de Brasília
  • Passwordless authentication can finally put passwords to rest Recorded: Jun 4 2020 33 mins
    Danna Bethlehem, Product Manager, Access Management & Claire Pitman-Massie EMEA Snr Field Marketing Director
    About a third of firms and organisations in Europe, the Middle East and Africa still believe the humble password is a good enough security measure, according to a survey carried out by Thales. Although stubbornly persistent in our digital lives, the time has come to adopt easier and more secure ways of logging onto online services. Passwordless authentication aims to do just.
    Join us in this coffee break webinar for an insider’s view on passwordless authentication where we’ll discuss:
    ·       What passwordless authentication is
    ·       Whether passwordless authentication is secure
    ·       How you can adopt and implement passwordless authentication in your organization
  • Tech Talk: Secure Access to Hybrid IT Environments Recorded: Jun 2 2020 40 mins
    Haider Iqbal, Director of IAM Technology Alliances; Kashyap Merchant, Lead Product Manager, Cloud Security, F5 Networks
    While many organizations are moving more applications to the cloud, there are still many applications that are managed inside the corporate network for security reasons. This hybrid ecosystem of internal and cloud-based applications makes managing access more difficult for security treams, from both security and user experience perspectives. This interactive tech talk with experts from Thales and F5 Networks will discuss best practices for managing secure access to applications in hybrid environments and provide opportunities for participants to ask the experts questions.
  • タレスの暗号化ソリューションで対応できるPCI DSSの要件 Recorded: Jun 2 2020 42 mins
    タレスDIS CPLジャパン株式会社、データプロテクション事業本部パートナー営業部、部長 前田 俊一
  • Encrypt Everything Summit Welcome Video Recorded: May 28 2020 3 mins
    Todd Moore, VP Encryption Products at Thales
    Todd Moore, Vice President of Encryption Products, shares what you can expect from the Thales Encrypt Everything Summit. Learn about best practices and trends in encryption, key management and multi-cloud security so your organization can discover and protect sensitive data wherever it resides. You will also learn more about the new Thales CipherTrust Data Discovery & Classification and CipherTrust Manager solutions.
  • Gerenciar o Acesso com Segurança é Crucial para Enfrentar os Desafios Atuais Recorded: May 28 2020 64 mins
    Sergio Muniz, VP, LATAM IAM Sales; Rodrigo Eimar, Sr. Sales Engineer
    No novo ambiente global, onde trabalho remoto, serviços digitais, o potencial da nuvem e crimes cibernéticos se tornam um desafio estratégico em qualquer empresa, o gerenciamento do acesso seguro do usuário a aplicativos corporativos é crucial para obter e manter uma vantagem competitiva. A realidade é que apenas 36% das empresas atualmente usam um SSO (Logon Único) inteligente.

    O Thales SafeNet Trusted Access, é uma solução oferecida por meio de um serviço que permite que os funcionários acessem aplicações corporativas com segurança, combinando seu SSO inteligente com políticas de acesso granular e uma ampla variedade de formatos de autenticação proprietários, todos centralizados em um console de administração.

    Participe do nosso webinar para discutir:

    - Tendências do mercado e os resultados do relatório Índice de Gerenciamento de Acesso Thales
    - Como a adoção de aplicativos em nuvem está direcionando a necessidade de consolidar o acesso em uma única ferramenta
    - A gestão de acesso é um crucial, para atender as normas da LGPD, PCI e ISO 27001
    - Como melhorar a experiência do Usuário, utilizando políticas de acesso e o SSO.
    - Duplo fator de autenticação: Modelos para cada tipo de caso.

    HORARIO: 11:00 Horário de Brasília
  • Anatomy of a Crisis – How the Pandemic has Shone a Light on Sensitive Data" Recorded: May 27 2020 33 mins
    Graham Wallace, Managing Dir, Senetas Europe & Claire Pitman-Massie, Snr Dir of Field Marketing, EMEA
    The concern around data-in-motion has always been that the information and more importantly, sensitive data, carried is vulnerable to interception, corruption or change. The pandemic has shone an even harsher light on these concerns. As more functions are carried out remotely, and more data is moving, network security and resilience are very much front of mind. Protecting critical infrastructure has never been more important. There is the immediate need to protect vital services and the general need to secure an economic recovery. The increase in attacks on infrastructure over the last few months only serves to highlight the fact that those who wish us harm, or are looking for reward, recognise that this is way to achieve that.
    Join the discussion to find out how to organisations are addressing these concerns without impacting efficiency, productivity or security.
  • Secure Collaboration During a Pandemic Recorded: May 27 2020 30 mins
    Juilan Fay, CTO, Senetas Corporation & Claire Pitman-Massie, Snr Director of Field Marketing, EMEA, Thales CPL
    Even the best prepared businesses couldn’t have anticipated the overnight shift to mass home working that the Covid-19 pandemic has caused.   Organisations are trying to maximise the productivity of their remote workers while ensuring they maintain a healthy security posture against an increased cyber security risk.  There is an unprecedented need for people to perform simple business tasks such as data-sharing and collaboration above and beyond the ways they have in the past.
    Join us in this webinar to hear the best practice guidelines for secure file sharing and collaboration and to learn the essential security features you should be looking for in the productivity tools you deploy.
  • Secure Your Digital Transformation Journey with Thales and Microsoft Recorded: May 26 2020 60 mins
    Herns Hermida, Business Group Lead PH, Microsoft; Vina Yee, Data Protection Lead, CPL ASEAN, DIS, Thales
    For virtually every organization today, the adoption of multiple cloud services continues to expand — and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys and the potential risks. Join us with your morning coffee and learn how you can start your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.

    Key Highlights:
    - What is Microsoft Migration Program?
    - How Microsoft manages customer data?
    - What is Bring Your Own Key(BYOK) and Bring Your Own Encryption (BYOE)?
  • Evolving Security for an IoT World Recorded: May 21 2020 48 mins
    Gorav Arora, Office of CTO at Thales and Ted Shorter, CTO, Keyfactor
    The Internet of Things (IoT) has transformed our lives, providing convenience, enabling personalization, and changing our expectations of how devices behave. Products have become smarter with an extended usable life, allowing companies to deepen customer engagement through bi-directional touchpoints and enhanced usage analytics.

    With Internet connectivity opening these formerly isolated devices, they are digitally transformed into data hubs – sending and receiving critical information to the end-user and the enterprise. While this flow of data offers enhanced product features and new revenue opportunities, it can introduce security risks to the user and enterprise.

    Join Thales and Keyfactor to learn:
    • The state of IoT security today;
    • Best practices for securing the entire IoT ecosystem and product lifecycle – from development, manufacturing, updates, decommissioning; and
    • How a robust, secure PKI process can protect device identities, sign application artifacts in all environments, secure communication channels to and from the device, and ensure authorized access to the device, software and data.
  • Bring your own Encryption to the Cloud (BYOE) Recorded: May 20 2020 31 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    IT Departments are balancing the need for optimising performance and availability along with how best to ensure heightened security when considering their Cloud adoption. Encryption is the most effective way of securing that data.

    Considerations include: Should organisations rely on cloud native encryption only? Is there any effective Key Management available? Do you have complete control of your keys and a root of trust? Are you protected against the attacks that begin from within the cloud infrastructure?

    Join Manoj Bhati as he uncovers:

    - How can you bring your own encryption in the Cloud.
    - How to have complete control of your keys.
    - The best layer to encrypt your data (application, database, file/folder, etc...)
    - How key management is the most important part in encryption.
    - How organisations can cater for cloud, multi Cloud and hybrid cloud use cases.
  • Gestionar de Manera Segura el Acceso es Crucial para Enfrentar los Desafios Recorded: May 15 2020 52 mins
    Martin Bobbio, Regional Sales Manager for IAM LATAM, Thales CPL
    En el nuevo entorno global, donde el trabajo remoto, los servicios digitales, el potencial de la nube y el cyber crimen se vuelven un reto estratégico en cualquier compañía, gestionar el acceso seguro de los usuarios a las aplicaciones corporativas es crucial para obtener y mantener una ventaja competitiva. La realidad es que solo el 36 % de las empresas utiliza actualmente un Single Sign-On (SSO) inteligente.

    Thales SafeNet Trusted Access, es una solución ofrecida a través de un servicio que permite a los empleados acceder a las redes corporativas de manera segura al combinar su SSO inteligente con las políticas de acceso granulares y una amplia gama de formatos de autenticación propios, todo centralizado en una consola de administración.

    Participe en nuestro Webinar para discutir:
    •Las tendencias del mercado y los resultados de nuestro reporte Access Management Index
    •Cómo la adopción de aplicaciones en la nube está impulsando la necesidad de consolidar el acceso en una sola herramienta
    •Nuestra solución de gestión de acceso (Safenet Trusted Access)
    •Políticas de Acceso, SSO inteligente y Múltiple Factor de Autenticación.
    •Variables para evaluar una solución IDaaS que se adapte a las necesidades actuales.
  • Tech Talk: Cloud Security & Digital Transformation Recorded: May 14 2020 41 mins
    Haider Iqbal, Director IAM Ecosystems, Thales & Chris Gregory, VP of Channel Development & Operations, Saviynt
    The cloud is a critical component of enterprises’ digital transformation journey. But it also opens the enterprise to new threat vectors. Join this interactive Tech Talk with experts from Saviynt and Thales to learn how identity-centric cloud security can help companies address such threats, and make their digital transformation a success.
  • Tech Talk: Identity & Access Management Recorded: May 14 2020 46 mins
    Iqbal Haider, Director of IAM Ecosystems, Thales; Paul Keeler, Senior Cloud Platforms Architect, SailPoint
    In this interactive Tech Talk, experts from SailPoint and Thales will discuss the latest trends in the Identity Governance and Access Manangement markets, offer best practices for developing an integrated Identity & Access Management strategy, and offer attendees the opportunity to ask questions in real time.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Beyond 2FA: The Smart Way to Manage Cloud Access
  • Live at: May 9 2017 3:00 pm
  • Presented by: Mor Ahuvia, Authentication Product Marketing at Gemalto
  • From:
Your email has been sent.
or close