Hi [[ session.user.profile.firstName ]]

Trends in Cloud Access Management, Single Sign On & Authentication: EMEA Edition

The increasing use of cloud applications and services has set IT decision makers on a quest for reconciling the benefits of the cloud with the needs of security and compliance requirements. Much like the user experience of consumer cloud services, cloud access management solutions have emerged to address the multi-faceted challenges of the new zero trust enterprise network. With cloud services applications now a crucial part of day-to-day business operations, the 2020 Thales Access Management Index EMEA Edition found that more than half (57%) of IT security professionals believe unprotected infrastructure, such as new IoT devices, make them a target for cyber-attacks. Cloud applications and web portals are listed in the top three reasons an organization might be attacked, just behind unprotected infrastructure such as IoT devices.

This webinar will review the findings of the 2020 Thales global report and how organizations in Europe, Middle East and Africa are approaching cloud security and the technologies they are using to secure employee access to cloud services. Specifically, in this webinar attendees will learn:
- Which access management technologies organizations are deploying to secure access to the cloud
- Which access management technologies do IT professionals deem the most effective in securing access to services
- Who are the internal stakeholders involved in Access Management deployments
Recorded Apr 23 2020 37 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Danna Bethlehem, Director of Product Marketing, Thales
Presentation preview: Trends in Cloud Access Management, Single Sign On & Authentication: EMEA Edition
  • Channel
  • Channel profile
  • Smart Data Security - Reducing noise on your network Sep 24 2020 10:00 am UTC 45 mins
    Manoj Bhati - Pre-Sales Consultant, Thales
    Organisations are receive hundreds if not thousands of alerts and reports every single day. Not only that, but organisations are using a many different security solutions from multiple vendors. All of these solutions are creating and sending alerts. This is their window to know if they are under attack. The resulting data means it is difficult for organisations to look into and respond, not to mention the false positives and the red herrings. Companies are becoming Cyber Fatigued.

    Thales provide solutions that allow customers to encrypt data at a given layer. With encryption in place any alert below this layer can be handled at a lower priority. We help organisations in prioritising the logs they are receiving and reducing the noise in the network by using encryption.
  • Leaky Buckets: Effective Encryption Techniques to Secure AWS S3 Buckets Aug 18 2020 3:00 pm UTC 60 mins
    Jermaine Ashman, Senior Sales Engineer, Thales
    Several of the most well-known data breaches have involved unsecured Amazon Simple Storage (S3) buckets that resulted in millions of customer data records be exposed. In most cases the main culprit was human error: Administrators who improperly configured the security settings.

    While cloud native encryption and key management can be used, these options are mostly “just good enough security” and do not follow best practices for encryption and key management. Using third party encryption and key management solutions give users total control over the security of sensitive data in the cloud.

    For cloud and security teams, understanding the most effective encryption technology available for securing data AWS can help them make them make the right choices. In this webinar, you will learn about a more secure approach for protecting sensitive data in AWS S3 buckets using Vormetric Transparent Encryption (VTE).

    Key topics in this webinar will be:
    • Causes of misconfigured permissions to AWS S3 buckets
    • What happens if an S3 bucket is intentionally or unintentionally exposed
    • Why Bring Your Own Encryption is better than cloud native encryption
    • The specific techniques VTE offers to provide a more effective encryption mechanism to secure sensitive data in AWS S3 buckets
  • How to Achieve Zero Trust in Your Access Management Strategy Recorded: Aug 7 2020 94 mins
    Sol Cates Principal Technologist, CTO Office Thales, Bryan Green BISO Salesforce, John Kindervag Field CTO Palo Alto Networks
    Zero Trust approaches to security are at the core of key strategic IT initiatives, including cloud and digital transformation. Underlying Zero Trust assumptions rely on a "trust no one, verify everyone" approach, whereby the network, devices, and identities—whether internal or external—should always be assumed to be at risk. A key tenet in this approach is that every device, user, and network flow is authenticated and authorized.
  • What is the new data protection paradigm in a borderless world? Recorded: Aug 5 2020 57 mins
    Brian Grant, A/NZ Regional Director & Andrew Younger, Manager, Solution Consultants, Cloud Protection & Licensing, Thales
    In days gone by, the pinnacle of data protection was the encryption of your database so that any unauthorised access or copying of data never exposed sensitive information. In a borderless information technology environment where data is captured, created and shared across platforms that could be running almost anywhere, simply performing traditional static data protection is always going to leave you exposed to creative or advanced cyberattacks.

    Join us on this webinar where:
    • Key data protection findings from Thales’ 2020 Report on Data Security in Australia and New Zealand will be discussed
    • You will learn how the best of the best are turning the traditional data protection approach upside down
    • You will see how to align your data protection strategy with a borderless world that leverages automation and orchestration to build in minutes what used to take months
    • You can gain business advantage through securing sensitive data in real time, as it is captured or created
  • It’s True…SAP HANA Customers Can Securely Adopt the CloudUsing VTE Recorded: Jul 30 2020 62 mins
    Alex Hanway, Business Development Director at THALES, and Robert Holland, VP Research and Publishing at SAPinsider
    Organizations are finding it difficult to securely deploy software on someone else’s infrastructure where the cloud vendor is responsible for neither application security nor controlling system access. Any effective enterprise IaaS security strategy needs to address immediate needs while also heading off future security concerns and challenges as cloud deployments grow. Thales’ Vormetric Transparent Encryption offers organizations a proven approach to securing SAP HANA data and log volumes that meets rigorous security, data governance, and compliance requirements both on-premises and in the cloud. As the only third-party encryption vendor with a validated solution for SAP HANA, hear how Thales is uniquely positioned to help SAP customers securely adopt the cloud.
  • 5 Practical Thales Solutions to Complement Microsoft Azure Data Protection Recorded: Jul 29 2020 61 mins
    Graham Wallace Managing Director at Senetas Europe and Erol Dogan, Pre-Sales Consultant at Thales
    Every day many organizations are shifting their data to Microsoft Azure. In this webinar Graham Wallace and Erol Dogan, Cloud Protection experts, will discuss about data protection challenges and how to use Thales solutions in order to address them both in a cloud only and hybrid-cloud environments.
  • Telecom operators: Implementing data security in modern mobile networks. Recorded: Jul 28 2020 61 mins
    Didier Wylomanski, Business Development Director for EMEA at Thales  and Neil Cosser, Country Sales Manager at Thales
    Mobile Network Operators, who deploy new communication services face the complexity of mixing the modern mobile networks with the latest virtualization technology.
    While opening flexibility in the deployment of the subsystems like Core Network, or MEC, the MNO’s see a high risk to lose control on their cybersecurity strategy when applied to data protection.
    The webinar will show how MNO’s can take back control, and ensure an adequate data protection strategy by deploying a “encrypt everywhere” approach associated with best-in-class key life cycle and rights management.
  • Factoring Security Transformation in a Digital Transformation Strategy Recorded: Jul 23 2020 33 mins
    Tzach Kaufmann, Director of Product Management, Data Discovery & Classification, Thales
    A successful digital transformation hinges on the foundation of trust. Companies must safeguard their sensitive data because it forms the basis of their digital business strategy. But, with the increased use of the cloud, big data, and IoT, data can be copied, moved, shared, or stored anywhere, almost at no cost, leaving organizations vulnerable to data breaches.

    This webinar will discuss how organizations can take a strategic approach to data protection by first discovering and understanding their sensitive data and its risks, and then automating the process of remediation from a single pane of glass.
  • Shared responsibility for cloud security, what does it mean for your data? Recorded: Jul 22 2020 60 mins
    Brian Grant, A/NZ Regional Director & Andrew Younger, Manager, Solution Consultants, Cloud Protection & Licensing, Thales
    The shared responsibility model that almost every cloud provider refers to requires both the cloud service provider and the customer to take ownership of specific aspects of cloud security. In this model the customer has the responsibility for securing their information and data.

    So what does this mean for you and your organization’s sensitive data when moving to the cloud?

    Join us on this webinar where:

    • Key cloud security findings from Thales’ 2020 Report on Data Security in Australia and New Zealand will be discussed
    • You will learn how leading enterprises are securing information and data when they no longer own the infrastructure on which they run
    • You will see a demonstration of what this can look like in the real world and why emerging trends in digital transformation, DevSecOps and automation should not be handcuffed by old data protection practices and thinking
  • Rapid Protection for Teradata Database with Vormetric Transparent Encryption Recorded: Jul 21 2020 49 mins
    Blake Wood, Director of Business Development at Thales, Jay Irwin, Director for the Center of Enterprise Security, Teradata
    Teradata data warehouse environments typically use application-level tokenization or encryption solutions to protect sensitive data for privacy and other compliance requirements. This is excellent data security but requires integration within database or application code which can take a lot of time and impact overall database performance. Vormetric Transparent Encryption provides a rapid deployment option to secure all data at rest and provides excellent performance for very large database environments.

    This webinar will discuss the current security options for Teradata database, provide a deep dive into application-layer database encryption, and discuss the advantages of the industry first transparent encryption database protection for Teradata.

    The agenda for this webinar is:
    • Overview of Teradata and Thales
    • Database Security Fundamentals and Options
    • Vormetric Protection for Teradata Database
    • Vormetric Transparent Encryption for Teradata Database
    • Q&A
  • Estudo sobre Gerenciamento de Acesso Seguro no Brasil em 2020 Recorded: Jul 16 2020 71 mins
    Sergio Muniz, VP, LATAM Sales, Identity and Access Management, Rodrigo Eimar, Sr. Sales Engineer
    Examinando 300 tomadores de decisão de TI no Brasil e Estados Unidos, a nova pesquisa da Thales descobriu que 61% dos entrevistados brasileiros acreditam que o acesso desprotegido à rede local representa o maior alvo dos ataques cibernéticos. Mas, ao mesmo, tempo 46% ainda acreditam que senhas são uma das ferramentas mais eficazes do gerenciamento de acesso. Na verdade, 76% dos entrevistados planejam expandir o uso de senhas e 68% o de login social, apesar dos riscos e reconhecidas vulnerabilidades destas opções.

    Participe do nosso webinar para entender:

    - As tendências do mercado e os resultados do Estudo de Gerenciamento de Acesso Brasil-EUA de 2020.
    - O conflito entre Segurança x Conveniência em tempos de crise.
    - Como a adoção acelerada na nuvem agrega maior complexidade.
    - Como melhorar a experiência do usuário, utilizando políticas de acesso e o SSO.
    - Duplo fator de autenticação: Modelos para cada tipo de caso.

    A Thales provém soluções líderes mundiais para gerenciamento de acesso seguro. O SafeNet Trusted Access é uma solução oferecida por meio de um serviço que permite que os funcionários acessem aplicações corporativas com segurança, combinando seu SSO inteligente com políticas de acesso granular, e uma ampla variedade de formatos de autenticação proprietários, todos centralizados em um único console de administração.


    HORARIO: 11:00 horas Brasilia
  • 5G Security Challenges and the Keys for a Trustworthy Security Framework Recorded: Jul 15 2020 64 mins
    Chen Arbel, VP, Business Development, 5G & Cloud Security, Ranjeet Khanna | Global Practice Head, Security Engineering, Wipro
    The 5G networks will require evolution of the design, build and operating model of communication infrastructure and services built on it. Decoupling of hardware/software, virtualization technologies and the breadth of foreseen 5G use-cases implies high scalability, ultra-low latency, ability to support a massive number of concurrent sessions and ultra-high reliability.

    With the advent of the 5G networks, security threat vectors will expand, in particular with the exposure of new connected solutions and services use-cases. Such security risk will exploit vulnerabilities at both 5G network and enterprise infrastructure layer.

    Join Wipro and Thales as they explore ways to build a trustworthy security model that protects both the integrity and confidentiality of the operator and enterprise environments.
  • そのアプリやデータ、クラウドに移動させても大丈夫です!! Recorded: Jul 15 2020 47 mins
    タレスDIS CPLジャパン株式会社、IAM事業本部 担当部長 芳賀 悟
    【日本時間 7月15日(水)11:00~ライブWebセミナー開催!】クラウドプロテクションを標榜するタレスDIS CPLジャパン、その扱い製品とサービスを紹介する入門編、クラウド利用を検討する上でのセキュリティ対策の入り口です。
  • Navigating the Future of Network Security Recorded: Jul 14 2020 30 mins
    Stan Mesceda, Senior Product Manager for High-Speed Encryption, Thales Graham Wallace, Managing Director at Senetas Europe
    The continuing pandemic has changed the way we work. Increased data in motion from video conferencing, email, make-shift work environments, and remote applications have shifted the way we utilize our network and think about security. In addition, the dynamics of network architectures are changing, and security professionals and individuals are struggling to adapt. Modern organizations must rely on a complex mix of connectivity over both public Internet and private WANs, leaving security administrators challenged to balance requirements for network performance and strong security as more data traverses networks out of their control.

    Network Independent Encryption, is one of the innovative technologies developed to meet the demands of modern network architectures. Using Transport Independent Mode (TIM), security professionals can encrypt data concurrently at network Layers 2, 3, or 4. Our experts for this session will discuss current and future network architectures, including TIM, and give advice on how to secure your network without compromising performance.
  • Planning your migration from on-premise IAM to cloud-based access management Recorded: Jul 9 2020 36 mins
    Danna Bethlehem, Director of Product Marketing & Claire Pitman-Massie, Snr Director of Field Marketing
    Compelling events have the power to transform and accelerate key enterprise IT initiatives. This has been all too evident in the Covid-19 emergency where the need to rapidly enable remote employees revealed gaps in legacy systems and their ability to support a mass move to remote working and cloud service adoption. In our latest "Coffee Break" webcast series, Danna Bethlehem discusses how IT teams can start mapping out the move from legacy on-prem IAM solutions to cloud-based access management in order to enable their cloud and digital transformation journey.
  • Un accesso remoto sicuro consente un vantaggio competitivo Recorded: Jul 8 2020 48 mins
    Luigi Vezzoso, Thales Pre-Sales Consultant
    Smartworking non è più considerato il "semplice" accesso VPN alle risorse aziendali bensì, l'utilizzo in modo agile, di applicazioni tradizionali e cloud-based per ottenere la massima produttività ovunque ci si trovi a lavorare. In questo scenario è necessario garantire un elevato livello di sicurezza, la massima interoperabilità e flessibilità. Scopriamo insieme come la soluzione Thales - Safenet Trusted Access - possa supportare tutte le esigenze per un’adozione completa dello smartworking.
  • Thales Suredrop ile güvenli ve kolay dosya paylaşımı. Recorded: Jul 8 2020 50 mins
    Sercan Koc, Pre-Sales Consultant for Turkey at Thales
    Bu ayki webinarımızın konusu Thales çözüm ailesinin en yeni üyelerinden birisi olan Suredrop. Thales’in yeni çözümü Suredrop ile şirket çalışanları veya üçüncü parti şahıs ve kurumlarla nasıl kolayca ve güvenli bir şekilde dosya paylaşabileceğinizi anlatacağımız webinarımıza davetlisiniz.
  • Como Implantar Pagamentos Instantâneos PIX com Segurança, Escala e Flexibilidade Recorded: Jul 7 2020 60 mins
    Abilio Branco, Head of Sales Brazil, Thales CPL Encryption; Murilo Fernandes, Gestor Comercial - EVAL
    O sistema de pagamentos instantâneos PIX promete revolucionar a indústria de pagamentos no Brasil. Mas, instituições financeiras têm que estar alertas para os desafios de segurança, escalabilidade e flexibilidade que são essenciais para o sucesso dos pagamentos instantâneos.

    Participe de nosso Webinar para entender como superar desafios como:

    •Estar preparado para milhões de transações e momentos de pico.
    •Processar transações com o maior nível de segurança.
    •Estabelecer disponibilidade 24x7x365 para uma infraestrutura essencial para a sociedade.
    •Atingir o tempo estimado da transação entre recebedor e pagador menor que 10 segundos.
    •Implementar um sistema escalável, seguro e flexível antes de novembro de 2020.

    HORARIO: 11:00 Brasilia
  • Why are Key Blocks important to payment security? Recorded: Jul 7 2020 51 mins
    Simon Keates, Head of Strategy, Payment Security at Thales and Sean Davies, Thales Pre-Sales Consultant
    Recent updates to the Payment Card Industry (PCI) PIN Security requirements state that “encrypted symmetric keys must be managed in structures called key blocks”, where the use of the key is cryptographically bound to the key itself. The Thales payShield has full support for key blocks, for both internal storage of keys and exchange of keys with third parties. Join this webinar to understand more about key blocks and how the migration to key blocks will impact applications, databases, and processes, as well as how Thales can help reduce the complexity of the migration .
  • Address Bank Negara Malaysia’s Cloud & Data RMiT Policy Recorded: Jul 7 2020 63 mins
    Rahul S Kariyal, Azure Specialist, Microsoft Malaysia & Ivan Tan, Security Consultant, Thales DIS CPL Malaysia
    Bank Negara Malaysia (BNM) has taken a lead in defining a stringent security controls framework for Malaysian financial institutions. As the move to cloud continues to expand — and so does the use of encryption. As the proliferation of encryption continues, so do the number of keys and the potential risks.

    Join us with your morning coffee and learn how you can start your digital transformation journey and securely migrate your applications and data through a combined portfolio of Thales and Microsoft.
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Trends in Cloud Access Management, Single Sign On & Authentication: EMEA Edition
  • Live at: Apr 23 2020 1:00 pm
  • Presented by: Danna Bethlehem, Director of Product Marketing, Thales
  • From:
Your email has been sent.
or close