Hi [[ session.user.profile.firstName ]]

Best Practices for Securing Access to Cloud & On-Premise Applications

The ideal of maintaining pure cloud environments has proven to be more myth than reality, resulting in the adoption of a more pragmatic approach to cloud expansion. As a result, hybrid environments are taking precedence with CISOs prioritizing their ability to create unified access and federation schemes for on-prem apps and cloud services. Join us in this session to hear best practices on how to apply centralized access policies to all apps in your environment, using a range of access technologies and capabilities.
Recorded May 12 2020 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Asaf Lerner, Business Development Manager, IAM at Thales
Presentation preview: Best Practices for Securing Access to Cloud & On-Premise Applications
  • Channel
  • Channel profile
  • Change for the Better: Latest Trends and Future of Identity & Access Management Oct 5 2021 7:30 am UTC 45 mins
    Martin Kuppinger, Founder and Principal Analyst, KuppingerCole Analysts
    Throughout the last year, organisations have ridden a tidal wave of change. Not all change was good. With the rise of ransomware and identity based breaches perpetrating organisations due to the acceleration in remote working, the hackers grasped the opportunity to make the most of the vulnerabilities it caused.

    However, it’s not all doom and gloom. There has been positive change, and change is driving trends that will take IAM into the future. Join Martin Kuppinger, as he discusses the latest trends that are driving positive organisational direction and what this means for future growth, security and IAM modernisation.
  • Key Findings from the 2021 Thales Access Management Index: APAC Edition Oct 5 2021 7:30 am UTC 60 mins
    Rana Gupta, VP APAC Sales, Thales
    The changes that the last year has wrought upon organizations’ technology teams have been most acute in access management. Seemingly overnight, remote access went from being an exception to the default working model for a large swath of employees. The 2021 Thales Access Management Index, based on data from a survey of more than 2,600 respondents worldwide including 750 security professionals across Asia-Pacific, looks to identify the depth of that change, as well as the current state of and plans for access management across a range of industries.

    This webinar will review the findings of the 2021 Thales Access Management Index APAC Edition and how organizations in APAC are responding to the new challenges for authentication and access management created by increased remote work and cloud adoption. Specifically, in this webinar attendees will learn:
    - How prepared were organizations in APAC for the changes of remote work and cloud adoption
    - Which access management technologies APAC organizations are deploying to secure access to the cloud and remote work
    - Where APAC organizations are in their adoption of Zero Trust
    - What technologies are APAC organizations investing in to modern their IAM strategy
  • What is Modern Authentication and Its Role in Achieving Zero Trust Security? Oct 5 2021 6:15 am UTC 45 mins
    Danna Bethlehem, Director of IAM Product Marketing
    The need for secure, yet convenient ways of logging into apps is driving the quest for more effective authentication. In this session we'll do a deep dive into the innovations shaping modern authentication concepts and the role they play in achieving Zero Trust security.
  • Identity Authentication: Ensuring the Integrity of Your Systems Oct 5 2021 2:30 am UTC 45 mins
    Simon Piff, VP Security Research - APAC Region, IDC
    Today's businesses rely on digital technologies far more than ever before. Digital industry ecosystems are emerging as the supply chain choice of a most industries; requiring digital connectivity between all parties in the supply chain to facilitate better product planning and ability to serve the markets and customers. Governments are relying on technology to more deeply engage, inform and serve their population. Consumer in most markets have had no choice but to default to ecommerce to have even the most basic necessities delivered during these times of social distancing and lockdowns.

    In spite of this, millions still rely on the most basic of security features to secure these highly critical, and yet mostly fragile, networks of commerce. Passwords are still used as the default for security.

    Threat actors know this, which is why millions of passwords appear on the Deep Web markets every year. They are stolen, sold, traded and ultimately used to break into networks and systems the world over.
    The only way to prevent this activity, and to implement a more mature security environment is through identity authentication. This means not just trusting to a password, but actively following up with other challenges to the identity of the user, device or application, eventually being able to dispense with passwords altogether and relying on more robust identifiers for security purposes.

    However, whilst IDC believes IT buyers should already have MFA solutions included within their present year security software budgets; if not, include such next year and that this is a must-do security thing, but we believe current market acceptance rates to be a disappointing 30% or less. That means 7 out of 10 users are all still making up passwords.

    The IDC presentation will take a closer look into the advanced authentication market and provide guidance to technology buyers on what to look for in such an important solution.
  • How to Enable Multiple User Authentication Journeys with Modern Authentication Oct 5 2021 1:15 am UTC 45 mins
    Asaf Lerner, IAM Market Owner, Thales
    The new normal of remote working has led to an explosion of unforeseen authentication needs. The multitude of end devices, locations, applications and roles means that a single user will likely need more than one way of accessing the range of apps they need throughout their day. Join us in this session to hear how to effectively support multiple user authentication journeys to achieve secure remote access, without burdening your end users.
  • Ransomware Protection: How to Keep Your Data Safe with Strong Data Security Sep 29 2021 3:00 pm UTC 75 mins
    Narayan Makaram - Sr. Product Marketing Manager & Larry Herzog Jr. - Sales Engineering Manager
    Ransomware attacks have become a top cybersecurity concern in 2021 with nation states targeting everything from critical infrastructure, to hospitals and city governments, and demanding millions of dollars in ransom. These recent cyberattacks has gotten the attention at the highest levels in the United States, with the White House issuing an Executive Order on improving the nation’s cybersecurity.
    As attackers become more sophisticated, they find more ways to run malicious code on workstations and digital infrastructure. This makes it critical for businesses to strengthen its data security and improve cyber resilience.  So how can you better protect your organization from ransomware attacks and strengthen data security.
    In this webinar, Thales’ Narayan Makaram and Larry Herzog Jr. delve into the world of Ransomware attacks, how to contain and prevent them, and how to become more proactive, rather than reactive, with regards to data security processes.

    What You Will Learn:
    - Why are baseline security measures not enough to prevent ransomware attacks.
    - What are the essential data protection capabilities required to prevent ransomware.
    - Live Demo: Preventing a simulated ransomware attack using CipherTrust Transparent Encryption.
    - Live Q&A – feel free to ask us anything ransomware related!
  • Grasp Control of your keys in a Multi Cloudy World Recorded: Sep 21 2021 43 mins
    Romi Hamplova - Cyber Security Specialist, Thales
    Over 80% of companies are using two and more cloud provides to store sensitive data that needs protection. While encryption is a globally recognized data security principle, how do you control it across environments? The Cloud Security Alliance and Industry Analysts state that encryption keys should be held by customers, so what does that mean in a multi-cloud environment?
    - How do you achieve cloud flexibility and data security, across AWS, Azure, Google cloud, IBM cloud, Salesforce, O365 and on-prem?
    - How do you gain visibility and grasp control of your keys in Multi Cloudy World?

    Join Romi Hamplova, Cyber Security Specialist for Data Protection at Thales UKI, to discover:
    - What happens if you do not have key visibility and control?
    - What does enterprise key management truly mean?
    - Learn how Thales CipherTrust increases the cloud security
    - Discover how seamless BYOK, HYOK and full key lifecycle management can be
  • A look at the Monetary Authority of Singapore’s (MAS) cloud security advisory Recorded: Sep 21 2021 50 mins
    Andy Lai, Security Engineer IAM and Nitesh Parasher, Security Engineer Data Protection from Thales
    An increasing number of financial institutions (“FIs”) are using public cloud services for their operations, as the COVID-19 pandemic continues to accelerate the pace of digital transformation. On 1 June 2021, the Monetary Authority of Singapore (MAS) issued an advisory highlighting some key risks and control measures that FIs should consider before adopting public cloud services. The advisory does not set out legal obligations per se, but instead offers specific guidance on managing cloud-related risks. In doing so, the advisory aims to supplement other MAS documents, which include the more general notices (e.g., on technology risk management and cyber hygiene for particular sectors) that set out legal requirements for FIs.

    Join us to learn about:
    • Develop a public cloud risk management strategy that takes into consideration the unique characteristics of public cloud services
    • Implement strong controls in areas such as Identity and Access Management (IAM), cyber security, data protection and cryptographic key management
    • Manage cloud resilience, outsourcing, vendor lock-in and concentration risks
  • The best way to secure enterprise data from ransomware Recorded: Sep 16 2021 30 mins
    Brian Grant, Regional Director Thales CPL A/NZ
    There is so much information out there on how to secure your organisation against ransomware - from cybersecurity awareness training and multi-factor authentication for users, to next generation machine learning threat monitoring and continuous data replication and backup.

    Yet there is a better way to secure your organisation’s data crown jewels; those critical databases and file servers that if made unavailable through a ransomware attack will cripple your business.

    Join Thales and learn the secret to better securing your enterprise data, that in combination with your traditional cybersecurity tools, will make your data truly secure against ransomware attacks.
  • 2021 Data Threat Landscape in Asia Pacific Recorded: Sep 7 2021 55 mins
    Shaun Chen, Director of Sales Engineer - APAC Thales Group CPL
    In this session Shaun will cover the following data security topics:

    - What are the top data threat risks in APAC?
    - How much does a data breach and ransomware incident cost customer in APAC?
    - What are the data security best practices to protect you against these threats?
    - How can you improve your security posture with lowest cost?
  • Cybersecurity in ASEAN: Why Hardware-based PKI is on the Rise Recorded: Aug 26 2021 32 mins
    TAN Heng Hiang, IAM Regional Sales Director, Thales DIS CPL ASEAN; Chin Jien Lau, Technical Consultant, Versasec APAC
    In this webinar, Thales hosts its technology partner, Versasec, a leader in identity and access management that provided customers with a secure solution for managing digital identities. With its flagship product, vSEC:CMS S - Series, Versasec eases the deployment of physical and virtual smart cards for enterprises of any size.
    Participants in the webinar will learn about PKI trends in ASEAN, why hardware-based PKI is the one of strongest and most effective cybersecurity solutions and how it enables a Zero Trust ecosystem.
    During the talk, experts from both Thales and Versasec will address customer challenges, discuss real-life use cases, and will explore the advantages of multifactor authentication.
    Key Discussion Points:
    1. What are the business customer requirements, and why should enterprises use strong authentication?
    2. Why hardware-based PKI and what are its benefits for enterprises?
    3. The advantages of hardware-based PKI versus other two-factor authentication solutions.
    4. Use cases from ASEAN that focus on SAM migration and work-from-home situations.
  • Secure Tertiary Data Backup (STDB) is Coming Recorded: Aug 25 2021 52 mins
    Chris Mo, Partner, PwC; Karl Lee, Commvault; Benjamin Hui, NetApp; Wood Lam, Thales DIS CPL
    The Hong Kong Association of Banks (“HKAB”) issued the Secure Tertiary Data Backup (“STDB”) Guideline in April 2021 to better prepare Banks recover and restore critical data in order to facilitate the resumption of critical functions, services and systems in a prompt manner in the event of destructive cyber-attacks. The STDB Guideline contains eight principle-based guidelines and nine characteristics that AIs could consider to enhance their controls. All retail banks and foreign bank branches with significant operations in Hong Kong are expected to submit a report containing the result of their assessment to the HKMA by November 2021.

    Thales, together with the Commvault and NetApp, the industry leading vendors in data management, backup and recovery to co-host a webinar to share the latest update about the latest STDB guidelines, its related solution design and implementation. This webinar will be also featuring PwC that was appointed by the HKAB to formulate the STDB principle-based guidelines.

    Come join this webinar to learn:
    - High-level consideration and preparation on STDB implementation
    - Protection against malicious attacks with data encryption, immutable point-in-time image and WORM retention
    - Data backup and recovery plan that is timely, secure, resilient and cost-optimized
    - Protection and management for cryptographic keys
    - A holistic data backup and protection offerings to meet the stringent security requirements

    Speakers:
    Chris Mo, Partner, Risk Assurance, PwC
    Karl Lee, Director, Sales Engineering, Commvault
    Benjamin Hui, Solutions Engineer, NetApp
    Wood Lam, Security Consultant, Cloud & Protection Licensing, Thales
  • 보안 담당자라면 놓치지 말아야 할 2021 탈레스 데이터 위협 보고서 Recorded: Aug 10 2021 61 mins
    구병춘 이사, 탈레스 코리아 기술영업
    포스트 코로나 시대의 변화하는 데이터 보안에 대한 인사이트를 찾고 계십니까?

    세계적인 조사기관 S&P Global Market Intelligence와 탈레스의 공동 조사 및 분석한 9번째 연례 데이터보고서의 핵심을 정리해 드리는 이번 웨비나를 통해 해답을 얻으십시오.

    코로나 19의 여파로 원격 근무가 증가하면서 보안에 대한 요구가 높아지고 전략적 보안 지출에 대한 재평가가 필요하게 되었습니다. 보안 업계 종사자들이 직면하는 실태와 현재의 대응 노력, 효과적인 조직 보호를 위한 탈레스의 권고 사항을 확인할 수 있으며 추가적으로 아래의 인사이트도 얻으실 수 있습니다.

    - APAC / 한국 지역의 데이터 위협 동향
    - 조직 전반에 걸친 제로 트러스트 전략 채택 추세
    - 클라우드 및 원격 작업에서 민감한 데이터를 보호하기 위한 최고의 보안 방안
    - 클라우드 마이그레이션 동향 및 가장 효과적인 데이터 보안 적용 방안
  • 《2021 Thales資料威脅報告》- 加速邁向雲端轉型和遠距辦公時代的資料安全挑戰 Recorded: Aug 6 2021 83 mins
    Thales大中華區資深技術顧問陳昶旭;網路資訊雜誌總編輯謝至恩
    根據Thales第九年度發表的2021資料威脅報告調查研究中發現,COVID-19致使企業大規模實行遠距辦公,面臨資安風險大幅提升下必須重新評估資安的IT支出。資料外洩和資安威脅的複雜性日益增長,亞太地區超過一半的受訪者表示遭遇過安全漏洞。48% 的受訪者表示,將近 60%儲存在雲端的機敏資料沒有加密保護。

    然而,現代企業想要保護資料將更不容易,報告中也指出24%的受訪者使用50個以上的 SaaS 應用程式,該如何對分散各地的資料確實進行加密管理?Thales 將透過最新出爐的《2021 Thales資料威脅報告》與您共同探討亞太區企業轉型的資安威脅狀況,企業該如何建立零信任世界的現代資料安全,並同時應對即將來臨的量子運算安全威脅。

    本會議中Thales大中華區資深技術顧問陳昶旭與網路資訊雜誌總編輯謝至恩除了與您分享報告中其他威脅分析,也將探討關鍵技術為企業的金鑰、資料與網路傳輸,打造堅實可信的架構,有效地應對日趨複雜的環境。
  • タレス暗号鍵管理製品活⽤事例のご紹介 Recorded: Aug 2 2021 26 mins
    タレスDIS CPLジャパン株式会社、CPL (クラウドプロテクション&ライセンシング) データプロテクション事業本部、 セールスエンジニアリングマネージャ、CISSP、⾈⽊康浩
    大規模な情報漏洩事件によってデータ侵害への危機意識が高まってきており、暗号化と鍵管理は、データ侵害に対するガバナンス強化への対策需要として機密データの保護に欠かせないセキュリティソリューションです。機密情報を暗号化していれば、たとえ盗まれても解読不可を実現することができます。

    鍵と機密情報を同じ場所で管理した場合、暗号鍵の漏洩が発生した場合は複合化が可能になりますが、鍵を鍵管理システムに保管した場合、たとえ暗号データが漏洩しても情報を解読することが難しくなります。暗号データと暗号鍵の分離が非常に重要になってくるのです。ランサムウェアの攻撃を受けた場合でもこの方法が有効です。本セミナーでは、タレスが提供する鍵管理システムや暗号化ソリューションを実際に導入いただいたお客様の活用事例をご紹介するとともに、仮想環境のデータ暗号についてもご紹介します。
  • 世界のガイドラインが要求する暗号化と鍵管理のご紹介 Recorded: Jul 29 2021 21 mins
    タレスDIS CPLジャパン株式会社、CPL (クラウドプロテクション&ライセンシング)  データプロテクション事業本部、セールスエンジニアリングマネージャ、CISSP、⾈⽊康浩
    暗号化と鍵管理は、機密データの保護に欠かせないセキュリティソリューションであり、アンチウィルスやファイアーウォール等だけでなく、多要素認証と暗号化、鍵管理も標準で実装すべき時代に突入しています。
    大規模な情報漏洩事件によってデータ侵害への危機意識が高まってきており、データ侵害に対するガバナンス強化への対策需要として、暗号化・鍵管理はますます重要性を増してきています。

    本セッションでは、香港、シンガポールのコンプライアンス事情、国家サイバーセキュリティに対するホワイトハウス行政命令を例にとり、世界のコンプライアンス要求に対する対応、また、顧客情報漏洩の事例から
    データの暗号対策をしている企業としていない企業で、GDPRの制裁金の差がどれくらいあったのか等の事例をご紹介します。また、日本の暗号と情報利用の取り組みについても述べ、暗号化と鍵管理はなぜ重要なのかについて考えていきます。
  • SSO(シングルサインオン)MFA(認証強化)のIDaaS (SafeNet Trusuted Access)とトークン、カードのご紹介 Recorded: Jul 28 2021 21 mins
    タレスDIS CPLジャパン株式会社 クラウドプロテクション&ライセンシング IAM事業本部、担当課長 (Senior Inside Sales Representative)、瀬尾 雄一郎 (Yuichiro Seo)
    タレスは、クラウドおよびWebシングルサインオン(SSO)の利便性ときめ細かいアクセスセキュリティを組み合わせた、クラウドベースのアクセス管理サービス「SafeNet Trusted Access」を提供しています。
    ここでは、「SafeNet Trusted Access」の主な利点・特長を、以下のポイントでご紹介しています。

    - 様々なクラウド、アプリケーションのサポート
    - シナリオベースのアクセスポリシー定義
    - 幅広い様々な認証メソッドを提供
    - ユーザー変更に伴う自動化ワークフロー
    - レポーティング機能による可視化

    また、PKIやFIDOの採用についての確認ポイントについてもご紹介しています。
  • ゼロから始めるゼロトラストセキュリティ Recorded: Jul 28 2021 13 mins
    タレスDIS CPLジャパン株式会社、クラウドプロテクション&ライセンシング IAM事業本部、担当課長 (Senior Inside Sales Representative)、瀬尾 雄一郎 (Yuichiro Seo)
    昨今、ゼロトラストセキュリティという言葉をよく耳し、その重要性が注目されていますが、そもそもゼロトラストセキュリティとはどういった概念なのでしょうか?
    ここでは、ゼロトラストセキュリティの定義、日本市場におけるゼロトラストの採用状況、そして、クラウドおよびWebシングルサインオン(SSO)の利便性ときめ細かいアクセスセキュリティを組み合わせた、クラウドベースのアクセス管理サービス「SafeNet Trusted Access」を提供するタレスが推奨するNIST要件に基づくゼロトラストセキュリティの構築方法をご紹介いたします。
  • A Single Platform to rule them all - Control your data, encryption and keys Recorded: Jul 20 2021 44 mins
    Romana Hamplova - Cyber Security Specialist, Thales UKI
    Encryption has shown to be one of the strongest solutions to support most organisations' data protection strategy. However, the growing number of data encryption tools (and respective key managers) for on-premises and cloud systems, increases complexity and reduces visibility. Ultimately resulting in unexpected costs and security risks.

    Join Romana Hamplova to discover:
    • How you can centrally manage all your encryption keys from a single pane of glass and simplify auditing
    • How CipherTrust Manager can help you gain full control and visibility over your encryption keys
    • How CipherTrust Manager delivers enterprise-grade key management and encryption for leading software and hardware vendors solutions
    • The added benefits of a unified data security platform to reduce cost and minimise risk
  • Embracing C-RAF 2.0 to Data-at-Rest Security Recorded: Jun 29 2021 56 mins
    Shangyan Chen, Director, Sales Engineering, Thales CPL / Herman Sin, Manager, Cyber Security, PwC
    The Hong Kong Monetary Authority has recently introduced the enhanced Cybersecurity Fortification Initiative (CFI) 2.0 to improve and address the state of cybersecurity banking systems in Hong Kong with a structured implementation timeline starting in mid-2021.
    With most banks currently in the Cyber Resilience Assessment Framework (C-RAF) assessment implementation phase, some are facing compliances challenges with C-RAF requirements, i.e, applying a data protection strategy in data tokenization and encryption; as well as iCAST Simulation.
    In this upcoming webinar, experts from Thales and PwC will share insights on the C-RAF 2.0 and how the banking sector can apply the C-RAF assessment. This webinar will discuss the following topics:

    We’ll cover the following:
    • Tips and techniques to debunk C-RAF 2.0 framework
    • Key root causes identified from iCAST Exercises
    • Real-world use cases sharing on C-RAF assessment: challenges in sensitive data protection
    • Using C-RAF to prepare better for data protection and encryption strategy
Decisive Technology for Decisive Moments
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.

We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Securing Access to Cloud & On-Premise Applications
  • Live at: May 12 2020 6:00 pm
  • Presented by: Asaf Lerner, Business Development Manager, IAM at Thales
  • From:
Your email has been sent.
or close