Best Practices for Securing Office 365 with Access Management
A record number of organizations are moving to Office 365. While offering cloud efficiencies, this move can make organizations more vulnerable to phishing attacks, credential compromise and ultimate data breaches. In this session we’ll discuss the following:
- Securing O365 at the access point with the appropriate authentication method
- Applying unified access policies to O365 and other web services
RecordedMay 13 202037 mins
Your place is confirmed, we'll send you email reminders
The number 1 barrier to a successful data protection strategy is the ability to discover where sensitive data resides. Still over 60% companies are unable to analyze all the data they collect. Thales brought to the market the industry first Next Generation Solution: Data discovery, classification, and protection in a single, integrated Data Security Platform.
This webinar will discuss one of the first steps to protect your data - find and know what your sensitive data is.
Join Romi Hamplova, Pre-Sales Manager for Data Protection at Thales UKI, to learn:
- What do Data Privacy regulations demand with implications on Data Security strategy
- How can companies streamline the path to compliancy
- Can you effectively discover both structured and unstructured data?
- Gain visibility into data classification and risk analysis
- What is next in the data security life cycle?
- How can you Discover, Protect and Control with Thales CipherTrust Data Security Platform
The concept of Zero Trust security is not new. The term itself was coined more than a decade ago at Forrester with a general premise that all network traffic should be considered untrusted. Over the years we have seen refinements to this idea by Google in their BeyondCorp publication, Gartner in their definition of CARTA framework, and to complete the circle by Forrester again in Zero Trust eXtended report that explained Zero Trust in the light of current cybersecurity challenges. One of these challenges is fine grained and continuous access to resources and data.
This Talk will review the history of Zero Trust and then explore how Zero Trust applies to continuous authentication and access. We will discuss the historical trends that have shaped our authentication evolution, and then look at Continuous Access Evaluation Protocol (CAEP) a nascent but promising technology that can fundamentally change how we define and implement Zero Trust in web applications. The role of major players in this effort, such as Thales and Google will be explained.
Before the onset of COVID-19, enterprises already had Identity Access Management (IAM) controls in place for company stakeholders working remotely. Enterprises secured applications and digital assets through Single Sign On (SSO), Virtual Private Networks (VPN) or Web Access Management (WAM). But this architecture was designed for only a small number of employees to work outside of company headquarters — with limited access to applications beyond the on-premises network perimeter. However, the pandemic forced enterprises to adapt quickly as most of the workforce shifted to working at home. This posed new challenges for IT teams and CIOs who had not planned on such a massive change.
Join this webinar, Danna Bethlehem, Product Marketing Director for Authentication, will discuss why Access Management and Authentication is at the heart of enterprise security, how drives a Zero Trust architecture and creates synergies across IT modernisation programs.
Halimjon Sultanov, Pre-Sales Consultant META for Access Management
SafeNet Authentication Service Private Cloud Edition is an on premises authentication platform making authentication easy and cost effective to implement and manage.
Our approach has been to design a solution, which takes away many of the traditional pain points in authentication. SafeNet Authentication Service Private Cloud Edition (PCE) can be used to protect access to a variety of access points within your global infrastructure and supports for more than 200 out of the box pre-tested configurations with the leading VPN, SSL VPN, IAM, SaaS, PaaS and VDI solutions.
The advantages of this solution is that secure any enterprise use cases: network logon, Cloud (SaaS), VDI, VPN, web portals and custom applications.
Join this webinar in order to learn the benefits and features of this secure on premises authentication platform.
Danna Bethlehem, Product Marketing Director for Authentication
Before the onset of COVID-19, enterprises already had Identity Access Management (IAM) controls in place for company stakeholders working remotely. Enterprises secured applications and digital assets through Single Sign On (SSO), Virtual Private Networks (VPN) or Web Access Management (WAM). But this architecture was designed for only a small number of employees to work outside of company headquarters — with limited access to applications beyond the on-premises network perimeter. However, the pandemic forced enterprises to adapt quickly as most of the workforce shifted to working at home. This posed new challenges for IT teams and CIOs who hadn’t planned on such a massive change.
Join this webinar, Danna Bethlehem, Product Marketing Director for Authentication, will discuss why Access Management and Authentication is at the heart of enterprise security, how drives a Zero Trust architecture and creates synergies across IT modernisation programs.
What are the threats and risks from operating online and storing sensitive data, whether that is on-premises or in the cloud and what are the challenges of Internet Governance considering the erosion of traditional borders between Nations?
Join Robert Carolina, Technology & Cyber Security Lawyer as he explores these considerations, how organisations can retain full ownership of their sensitive data by leveraging strong encryption and key management. Axel Debray from Thales will explore how to discover and classify sensitive data across data stores to give full visibility over your hybrid multi cloud environments and significantly reduce the risk of data leaks using the Thales CipherTrust Data Security Platform.
Learn:
• The Benefits of an External Key Manager
• How to control Encryption Key Lifecycle’s
• When and How to use Data Encryption
• How to achieving Data Sovereignty across multiple Public Clouds
Speakers
- Robert Carolina, Technology & Cyber Security Lawyer
- Elton Jones, Director at ID-3
- Axel Debray, Pre-Sales Consultant at Thales
Chris Hickman - Chief Security Officer, Ryan Yackel - VP of Product Management, Blake Wood - Director of Business Development
The explosion of machine identities, keys, and certificates across multi-cloud and DevOps environments have stretched your on-premise PKI to its limits.
And with over 62% of organizations currently or planning on outsourcing their PKI, now might be time to evaluate a new approach to PKI for the future.
In this webinar, we explore the evolving complexity and costs of PKI, how to balance potential risks against those costs, and ways your organization can build the business case for a cloud-first PKI strategy.
Join Chris Hickman, Chief Security Officer at Keyfactor, and Blake Wood, Director of Business Development at Thales, as they talk:
- How PKI has evolved and continues to grow in complexity
- Options for PKI deployment
- The costs of on-premise PKI
- The Future of PKI in the cloud
L’adozione del Cloud é un processo che non puó essere procastinato ed impatta tutte le societá indifferentemente dalla loro dimensione e/o organizzazione. Il nuovo paradigma pone sfide importanti ai team di Sicurezza e Compliance. Non é possibile adottare soluzioni cloud native senza introdurre security by-design nella progettazione delle soluzioni.
Scopriamo insieme come le soluzioni di Data Protection Thales possono agire come elemento di semplificazione dei processi di adozione del cloud.
Paul Hampton, Senior Product Manager, Thales; Anton Chuvakin, Security Solution Strategy, Google
When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
In this webinar Anton Chuvakin (Google) and Paul Hampton, Senior Product Manager (Thales), will discuss how Google and Thales are helping organisations address this challenge by exploring use cases where keeping the encryption keys off the cloud may in fact be truly necessary or outweigh the benefits of cloud provider based key management.
As our critical infrastructure becomes more connected, it exposes legacy technologies to the outside world; leaving some vital systems open to exploitation. In recent years, we have seen an increasing number of attacks on critical infrastructure. Governments and industry regulators around the world are now focusing beyond physical perimeter protection to ensure the integrity of the systems used to control our critical infrastructure.
Join us to explore how encryption is a key element in ensuring the security of SCADA networks and how it needs to deliver against four criteria: Speed, Scalability, Manageability and Affordability to be most effective. We will look at traditional SCADA network provision, the evolving need to secure IoT connected devices, identify network vulnerabilities and discover the benefits of High-Assurance and Network Independent Encryption.
Brian Trzupek, Senior VP, Product Management at DigiCert, and John Ray, Director of HSM Product Management at Thales
Public Key Infrastructure (PKI) is the proven framework for securing communications, transactions, network access, data and verifying ownership or authorship. However, traditional PKI deployment can be complicated and time-consuming. Also, if the digital keys are not properly secured, there are risks of a security breach. DigiCert, a leading provider in PKI solutions, has teamed up with Thales, an industry leader in data protection, to provide a “minutes, not months” deployable solution with automation for keeping keys safe and protecting your communications and assets. Join DigiCert and Thales to discover how a modern PKI platform and Thales Hardware Secure Module (HSM) establish roots of trust and drive security.
Iain Kothari Johnson, Fujitsu Security Sales Lead (Financial Sector)| Romi Hamplova, Thales Pre-Sales Manager Data Protection
Fujitsu and Thales have partnered up to look at how financial organisations are expanding their cloud offerings on a global scale and how they are exploring the best security data practices to keep their organisations secure.
Join the data security team at Fujitsu and Thales as we discuss:
- The flexibility and benefits of moving to the cloud including how to improve the customer experience with value-added services
- How to find the balance between innovation and compliance in one of the most regulated industries in the world
- How to achieve cloud flexibility and data security adopting encryption and key management
You will learn:
- The Cloud Data Protection principles on the market
- The Data Encryption and Key Management options for the finance sector
- What challenges the finance sector face and what solutions they can implement
- The Best Practices of gaining control of your encryption keys
Over 80% of companies are using two and more cloud providers to store sensitive data that needs protection. While encryption is a globally recognized data security principle, how do you control it across environments? The Cloud Security Alliance and Industry Analysts state that encryption keys should be held by customers, so what does that mean in a multi-cloud environment?
- How do you achieve cloud flexibility and data security, across AWS, Azure, Google cloud, IBM cloud, Salesforce, O365 and on-prem?
- How do you gain visibility and grasp control of your keys in Multi Cloudy World?
Join Axel Debray, Pre-Sales Manager for Data Protection at Thales UKI, to discover:
- What happens if you do not have key visibility and control?
- What does enterprise key management truly mean?
- Learn how Thales CipherTrust increases the cloud security
- Discover how seamless BYOK, HYOK and full key lifecycle management can be
Supply chain attacks can have catastrophic impacts and are some of the most difficult to prevent. These attacks can cause serious financial, and even national security, consequences and are typically carried out by well-resourced attackers, such as nation-states. In this webinar, we will discuss the anatomy of a supply chain attack and what you can do to prevent your enterprise from falling victim. While some of the ground we will cover is aimed at technology companies, it is relevant to any company that consumes software from a third-party vendor or produces software for internal or external purposes.
Andrew Silberman, Sr Product Marketing Manager at CyberArk, and Blair Canavan, Director of Business Development at Thales
In this discussion, join experts from CyberArk and Thales to discuss why Identity Security and Privileged Access Management have converged to be a top priority for any organization looking to tangibly reduce risk. You’ll learn how CyberArk and Thales work together to secure the keys to the kingdom using the integrated solution to secure privileged access for all types of users and identities.
Cameron Skidmore, Associate Solutions Architect at Red Hat, and David Madden, Director Business Development at Thales
Containers and DevOps are being embraced as critical elements of enterprise digital transformation strategies, as this new paradigm provides development teams with an efficient way to build and deploy applications across hybrid cloud environments at scale. Red Hat and Thales have partnered to enable the benefits of DevSecOps to ensure code runs securely and data can be protected effectively. Thales and Red Hat discuss in this video how to enable a secure and scalable DevOps platform to deploy new services efficiently.
Paul Hampton, Snr Product Manager & Claire Pitman-Massie, Director of EMEA Field Marketing, Thales CPL
When it comes to encryption keys, security best practice is all about control and separation between encrypted data at rest and the keys. Google Cloud encrypts customer data at rest by default and offers organisations multiple options to control and manage their encryption keys. For many organisations hosting sensitive data or looking to migrate workloads to the cloud, they require additional control and ownership over their encryption keys in order to meet compliance or internal security requirements.
In the first of our Data Protection Coffee Break Series for 2021, we will discuss how Google and Thales are helping organisations address this challenge by giving customer’s enhanced control over how and when their encryption keys are used to protect and access encrypted data in the cloud.
Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Director of Business Development at Thales
In this brief video, you’ll hear from Ellen Boehm, VP of IoT Strategy at Keyfactor, and Dave Madden, Sr. Director of Business Development at Thales, as they discuss the current state of IoT security and share their joint solution for securing the entire IoT ecosystem using Keyfactor Control and Thales Luna HSMs.
Chintan Gosalia, Sr. Solutions Engineer at HashiCorp, and Dave Madden, Director of Business Development at Thales
As organizations adopt DevSecOps principles for rapid application delivery, they are heavily leveraging HashiCorp vault to centrally manage and deliver appropriate secrets to the applications. Vault stores thousands or even millions of highly sensitive secrets in such environments and encrypts them in storage to prevent any unauthorized access. Thales HSM solutions encrypt the Vault master key in a hardware root of trust to provide maximum security and comply with regulatory requirements. In this video, we discuss how organizations can enhance Vault’s security controls by leveraging Thales Luna HSM to meet the most stringent compliance regulations and automate their DevOps processes.
Angelo Fafulo, Director Partnerships & Sales at Isara and Dave Madden, Director of Business Development at Thales
The Quantum era is quickly approaching, threatening to impact security, as we know it. But how will it really impact you and how can you prepare?
In this TalkingTrust video you will learn about:
- The quantum landscape and where we’re at
- The quantum threat to use cases and industries and how it impacts internet security
- How crypto agility enables you to quickly react to cryptographic threats
- How to ensure your IoT devices can remain in use and secure from spoofed software updates
- Why it’s important to start preparing today with solutions that are readily available
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day.
We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.
Best Practices for Securing Office 365 with Access ManagementMatt Sparks, IAM Senior Sales Engineer, Thales[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]36 mins