Hi [[ session.user.profile.firstName ]]

The Authentication Service 30 minute challenge

Can you move or add an Authentication Service in your lunch break?

An increasingly mobile workforce, the ongoing trend of employee BYOD plus the move to the cloud and virtualised environments is blurring the boundaries of the traditional network security perimeter. Organizations are having difficulty affording, implementing and managing consistent, unified access policies to corporate resources, considering the actual costs of existing solutions is not simply the capex – but also the opex of running the service in deploying, managing and supporting tokens.

Join your fellow professionals to understand how an Authentication Service can enable companies to pursue a consistent authentication policy across the organization with speed, ease and a significantly reduced spend, by automating and simplifying the deployment and management of a distributed estate of tokens.
Recorded Oct 4 2012 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jason Hart, Authentication and Cloud Visionary
Presentation preview: The Authentication Service 30 minute challenge
  • Channel
  • Channel profile
  • Implementing Virtualized Network Encryption to Secure SD-WANs Recorded: Jun 21 2018 60 mins
    Stan Mesceda, Senior Product Manager at Gemalto and Julian Fay, CTO at Senetas
    Today enterprises and service providers are increasingly using network functions virtualization (NFV) and software-defined networking (SDN) technologies to design, deploy and manage their networks and cloud-based services. These software-based technologies give organizations cost and operational benefits because they move network functions from dedicated hardware appliances to virtual servers. These same technologies can be now be applied to how encryption is deployed and managed to protect sensitive data and communications the flow across SD-WANs.

    In this webinar you will learn about:
    •What is the best network fit for virtualized encryption
    •How to implement a virtual network encryption appliance in software-defined network
    •What are the cost, operational and performance benefits of virtual encryption
    •What it means to be transport layer independent and how you can protect network traffic simultaneously across Layers 2, 3 and 4
  • Gemalto and Venafi: Securing Machine Identities at Machine Speed Recorded: Jun 12 2018 48 mins
    Gorav Arora, Director, Office of CTO, at Gemalto & Ben Rogers, Solution Architect, Venafi
    Machines are increasingly taking over tasks traditionally conducted by humans. Moreover, they often work independently to improve business productivity. As more and more machines come into existence, we need to be able to reliably identity which machines should be trusted and which shouldn’t. But the security that protects machine identities can no longer be slowed down by traditional manual or homegrown methods. These methods are no longer sufficient to allow organizations to scale and thrive at the speed of business.

    Join us at this webinar to learn how Gemalto and Venafi help organizations address these challenges.
  • IoT Security Over Tea: Steeping Out the Hype Recorded: Jun 5 2018 63 mins
    Gorav Arora, CTO Office Director of Technology at Gemalto
    A familiar buzz word over the past few years has been the Internet of Things (IoT). We have all heard the talk about it being the next big thing, its massive growth potential and the benefits to everyone. The IoT will generate more data, connect more devices and enable more users, and somehow these interactions will be safe and secure.

    We take a pragmatic view of IoT, cutting through the hype to uncover the core objective. Furthermore, we take a persona based approach to IoT security, and have identified four main ones: cloud service providers, consumers, device makers and third-party service providers. Each persona faces the obstacle of securing different parts of the ecosystem whether its access, the device, data and/or the user. However, it is necessary that security is provided holistically, as the weakest security link in the chain could compromise it all. In addition to security, the personas are used to demonstrate the ‘Stages of IoT’ from the digital identity of physical products to actualization of new business opportunities. No matter what persona in the IoT ecosystem you are (or are not), the webinar cuts through the hype to understand the real business opportunities and share with attendees the technology tool box (predictive analytics, security, connectivity, data collection and business intelligence) to create and improve services and leverage the generated data internally and externally.

    Join us for the webinar, “IoT Security Over Tea: Steeping out the Hype”, to learn more about:
    •A grounded perspective on IoT
    •Why IoT security matters for everyone
    •The persona analysis of IoT security
    •Key considerations as it begins to take off
    •How to protect what matters most to you
  • 451 Research and Gemalto present "MSPs - Maximizing ROI with Security" Recorded: May 15 2018 60 mins
    Gary Marsden, Senior Director of Data Protection Solutions at Gemalto and William Fellows, Research VP 451 Research
    Digital transformation is a critical part of an enterprise business strategy. However, for many organizations, having more digital assets introduces major headaches due to the complexity of technologies, the lack of available and affordable skills and the ever-changing security threat landscape. The ability to use cloud based solutions to service digital strategies is helping reduce costs but is also increasing risks, isolating data and reducing controls.

    Many MSPs have recognized this as an opportunity and are building business plans and service strategies to help their customers. Being the one-stop shop for applications, cloud services and related security aspects is a path that is actively being trodden by MSP’s, MSSP’s and traditional resellers alike. According to 451 Research, it is about a “sell with” approach by addressing business requirements with security “built-in”. In this joint webinar, our guest William Fellows, 451 Research analyst will provide new research results this related data points and discuss how the cloud is creating opportunities as well as challenges. The interactive Q&A style webinar will cover:

    • A current view of the cloud’s impact on digital transformation
    • Opportunities for MSPs to expand service portfolios and generate new revenue streams
    • What a true “sell with” partnership looks like
    • Technology enabling this new sales and marketing strategy for MSPs

    Presenters:
    William Fellows is a co-founder of The 451 Group. As VP of Research, he is responsible for the Cloud Transformation Channel at 451 Research.

    Gary Marsden: Senior Director of Partnerships at Gemalto
  • New Data Breach Findings: The Year of Internal Threats & Misplaced Data Recorded: May 14 2018 52 mins
    Jason Hart, CTO of Data Protection at Gemalto
    2018 has started off as an eventful year with data breaches at Saks Fifth Avenue, Lord & Taylor and Under Armour’s MyFitnessPal app. And it will continue to be a catalyst year for data security with the 25th of May deadline for the European Unions’ General Data Protection Regulation, which regards “privacy as a fundamental human right and to protect it as such.” Data exposed or breached is not only a headache for security teams, but also impacts brand reputation, customer confidence and stock prices.

    Gemalto’s 2017 Breach Level Index found 2.6 billion records where compromised in 2017, a 88% increase from 2016. In this webinar our expert, Jason Hart, will walk attendees through the most shocking 2017 stats, new data breach tactics and how companies can manage risk by mapping out where your data resides. Join us to learn more about:
    -Internal threats and misconfigured cloud databases
    -Growing security threats like data integrity attacks
    -Innovative technology that is solving some of these issues
    -What we have in store for 2018
  • Seal, Lock & Protect: How not to leave your networks and cloud vulnerable Recorded: May 7 2018 54 mins
    John Ray, Product Management and Danna Bethlehem, Product Marketing Gemalto and Josh Chambers, Product Management at F5
    Securing and monitoring your network and cloud environments has changed over the past few years and compliance and government regulations will add to it. Network traffic monitoring tools have been presented as a solution to meeting compliance and performance on a network. But monitoring alone is not enough. In terms of security, companies need to holistically secure their network, cloud and data, no matter where their users are accessing from.
    This joint webinar between F5 and Gemalto will help attendees prepare for the next-generation of secure network access as more data resides in more places with more people accessing it. It will also walk them through the integration between F5 and Gemalto and what options this partnership offers.

    In this webinar, you will earn how to:
    •Reduce the risk of breaches by ensuring that only authorized users are accessing network, using the F5 environment as an example
    •Protect & encrypt your customer data
    •Manage secure cloud access
    •Comply with regulations
  • The future of smart connected (or IoT) devices, but what about security? Recorded: Apr 11 2018 61 mins
    Paul Lockley, VP of Partnerships at Device Authority and Gorav Arora, CTO Office Director of Products
    One of the biggest obstacles to IoT adoption is security. Our recent survey found 65% of consumers are concerned about hackers controlling IoT devices and 60% worry about their data being stolen. Recent widespread attacks using IoT device vulnerabilities has also highlighted how interconnected the system is and one weak link creates a ripple effect Securing the identities of both humans and machines, access to the devices and protecting the integrity of the data and device opens the door to more opportunities. For example, the ability to manage blockchain identities and data security policies across any IoT deployment.

    In our joint webinar with Device Authority, our experts will outline how security by design methodology helps future proof IoT deployments. They will have an open conversation and a question and answer session on topics that customers are dealing with, related news topics, compliance and government regulations, business opportunities and technologies that are changing the game. Join us to hear more about how using the security by design approach can help:

    •Identify and manage risks and challenges in the short and long term
    •Prepare for legislation and compliance
    •Create new opportunities for a secure blockchain-based IoT
    •Leverage new technology like machine learning and analytics
  • Developing and implementing risk-based access policies to match IAM strategies Recorded: Mar 28 2018 55 mins
    Amanda Rogerson, Product Expert at Gemalto
    The security challenges of companies large and small is changing. This is especially pronounced in the access management space as IT admins and CISOs are faced with more identities and devices across a growing number of cloud applications. In our recent survey, we found 72% of respondents found cloud access management tools as a solution to reducing the threat of large scale data breaches, while 62% highlighted the tools ability to help simplify the login process for their enterprise users.

    In an organization, individuals dealing with security have different goals and objectives. Aligning them can be a challenge. We will look at the priorities of the user, IT teams and CISOs – where they are linked and where they diverge. To build effective risk-based access policies, you need to start with a living IAM strategy that takes into account geolocation, threats, unusual behavior and scenario based data. Using policy-based access management, internally and externally for example in the cloud, is helping enables aligning the different security teams in an organization and automate and simplify the log-in process for users as well. During the webinar attendees will walk away with an understanding of:

    -Analyzing personas within your organizations security team to improve IAM solution implementations
    -Things to consider when building your access management strategy
    -Building risk-based access management policies across multiple applications or cloud environments
  • Trends in IAM: The Consumerization of Enterprise Security Recorded: Mar 7 2018 34 mins
    Danna Bethlehem, Director of Product Marketing
    With a growing number of cloud apps in use, more employees working remotely increasing the need for stronger authentication. This is driving IT decision makers to find ways to ‘consumerize’ the login process. To get a better understanding of access management challenges and views on the industry Gemalto surveyed 1,000 IT decision makers to compile the 2018 Identity and Access Management Index. During this webinar, we will share some of the fascinating key findings that will shape cybersecurity and the way enterprise IT professionals evaluate and implement access management technology. Join us to learn more about:

    •2018 key findings and trends
    •How consumerization of IAM can be achieve in the enterprise security space
    •How organizations can maintain security while lowering barriers to authentication
    •Evolution of IAM Trends: A look at the historical numbers compared to the new findings
  • Ponemon Research 2017 Trends in Cloud Security: Cloud & Compliance Compatible? Recorded: Feb 27 2018 60 mins
    Larry Ponemon, Chairman and Founder of the Ponemon Institute and Jason Hart, CTO office for data protection
    95% of companies have adopted cloud services but the 2018 Global Cloud Data Security Survey found there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions. This is disturbing since only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using,

    The reality is cloud creates challenges in knowing where your data resides and what or who has access to it. In 2018, breaches like Uber and Accenture occurred because of improperly configured security for web and cloud applications that were connected to a company’s network. A major catalyst to address this is upcoming regulations and compliance, which are trying to catch up with cloud adoption. Over the next few years, companies will be faced with more complicated and intricate auditing to demonstrate security and privacy best efforts in the cloud.

    During this webinar, Larry Ponemon, Chairman and Founder of the Ponemon Institute, and Jason Hart, CTO of Data Protection, will walk attendees through the research methodology, key findings and how things have changed over the past couple of years. Join us to learn more about:
    -2018 Global Cloud Data Security Findings
    -Compliance and cloud security: How will this work?
    -A shift in the budget: Where is IT spending their money?
    -Country breakdown of IT cloud security: Who is doing the best?
    -What can you do to secure the cloud and comply with regulations?
  • Before you choose Microsoft – 5 Things to Check in an Access Management solution Recorded: Feb 26 2018 59 mins
    Mor Ahuvia, Authentication Product Marketing at Gemalto
    Organizations with Microsoft environments, such as Azure or Office 365, are inclined to implement Microsoft’s native access management solutions (namely, Azure AD and AD FS). Defaulting to Microsoft’s cloud SSO solutions may appear to be the best choice, a closer examination of these solutions reveals critical downsides, as well.

    Join this webinar to learn the five things to consider before implementing Microsoft’s access management solutions. You will also see a demo of how you can centrally define access management policies (including cloud SSO and step-up authentication) for Microsoft and 3rd party apps with a vendor agnostic-solution.
  • GDPR: T Minus 1 Month: 6 Steps to Get Ready Recorded: Feb 22 2018 61 mins
    Jan Smets, Certified Data Protection Officer, Gemalto
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • The battle between two trends driving compliance: Paperless (eIDAS) vs. Privacy Recorded: Jan 23 2018 55 mins
    Eric Avigdor, DIrector of Product Management at Gemalto
    Two critical European regulations are rolling out in 2017 and 2018. The General Data Protection Regulation (GDPR) is designed to strengthen the safeguards around personal data and create a more uniform standard within the European Union (EU), while eIDAS is the European Regulation aimed at creating a framework for cross-border electronic identification and transactions across EU member countries.

    Paperless vs. Privacy is a real issue facing business in the EU, and around the world. Both eIDAS and GDPR have global ramifications and affect a broad group of industries. Complying with both of these regulations can be a real hardship for some small to mid-size companies.

    Please join us for our BrighTalk webinar where our resident Public Key Infrastructure expert, Eric Avigdor, will help you tread the waters of eIDAS vs. GDPR. Which one is most important for your business? What are the consequences of non-compliance? We will also discuss how to comply with multi-factor authentication, physical access, and encryption requirements.
  • How to Prepare for GDPR: A Gemalto Case Study Recorded: Dec 18 2017 60 mins
    Jean-Pierre Mistral, Director of Global Data Privacy and Alex Hanway, Encryption Product Marketing
    Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •What is GDPR?
    •Case Study: A look at how Gemalto has prepared for GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • How Cryptocurrencies are Changing the Face of Financial Services Recorded: Dec 15 2017 61 mins
    Eric Larchevêque, CEO at Ledger and Joe Pindar, CTO Office Director of Strategy
    Joint webinar with Ledger and Gemalto discussing how cyrptocurrencies have the potential to revolutionize the financial industry and what needs to be done to secure the digital assets.
  • Are you Ready for Australia's Privacy Act? A Gemalto Case Study Recorded: Nov 22 2017 61 mins
    Jean -Pierre Mistral, Legal Counsel for Data Privacy and Graeme Pyper, Regional Director of Enterprise and Cybersecurity
    Join us for part two of our webinar series focused on helping companies prepare for the upcoming Australian Privacy Act and global government regulations, like European General Data Protection Regulation (GDPR).
    Data sovereignty, especially for cloud first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

    This follow up webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our legal counsel for global data privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Graeme Pyper, Regional Director for New Zealand and Australia, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

    Join us to hear more about:
    •The Mandatory Data Breaches scheme
    •Case Study: A look at how Gemalto is preparing for Australia’s NDB & GDPR
    •The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations
  • Security Heretic: What got us here, won't get us there Recorded: Nov 16 2017 57 mins
    Gary Marsden, Senior Director of Data Protection Solutions at Gemalto
    Cybersecurity is at a crossroads and requires a dramatic shift to adequately support the needs of business owners and security administrators as digital transformation challenges their needs and investments. Managing multiple cloud providers and dramatic increases in the number of endpoints generating data and the subsequent volume of data means enterprise security teams no longer have the requisite skills and bandwidth to deal with complicated security products. Building in security from the beginning quickly and cost-effectively is an industry game changer, especially with new growth markets like Big Data, Blockchain, Cloud Computing, Internet of Things and Digital Payments.

    Multi-cloud environments and government regulations and industry compliance add to the complexity of maintaining a manageable and effective data protection strategy. Transforming encryption and key management (data protection in general) into a click and deploy model reduces internal business barriers between security teams, DevOps and product teams and alleviates disparate security policies, so you know where your data is and that it is secure. The way people consume security is changing by taking an on-demand approach similar to the Netflix philosophy. In this webinar, we will discuss how cloud-based security is simplifying workflow processes, changing cost/benefit models to drive us towards a pervasiveness of encryption and key management that will de-risk data and connectivity in similar ways to anti-virus and firewalls.

    Join this interactive presentation to learn about:
    • The role of security in today's connected world
    • The drivers for and impact of simplifying security on business and workflow
    • How security is providing valuable business intelligence through connected systems and meeting compliance mandates
    • Gemalto’s solution to solving on-demand data protection
    • Upcoming cybersecurity trends and how to prepare
  • What is New with PCI-DSS Compliance in 2018? Recorded: Nov 7 2017 46 mins
    Danna Bethlehem, Director Product Marketing, Gemalto
    The deadline to comply with Payment Card Industry Data Security Standard (PCI DSS) 3.2 is quickly approaching, leaving many businesses scrambling to understand and meet compliance requirements. Join us for an hour and learn more about the mandate and how you can prepare and be ready by February 2018.
    This webinar will discuss and provide helpful information on the upcoming mandate including:
    •Overview of PCI DSS 3.2
    •What is new in PCI DSS 3.2 and what that means for your business
    •Comprehensive solutions that will help you ensure compliance
    •Mapping solutions to the needs of your department
    Please visit our BrightTalk channel to register for the webinar.
  • Best Practices for Migrating from On-Prem to Cloud-based SSO Recorded: Oct 25 2017 38 mins
    Ella Segura, Authentication and UX Expert at Gemalto
    According to Gartner, by 2021, IDaaS will be the majority access management delivery model for new purchases of access management solutions, up from less than 20% today. High maintenance costs and operational overheads as well as a shortage of skilled professionals are turning organizations to the cloud in an effort to outsource commodity IT services such as storage, content delivery, multi-factor authentication, cloud SSO and access management.
    As some organizations hesitate to change the status quo of their access management and MFA infrastructure, others have already managed to migrate their users and resources to realize significant savings and better utilize their existing budgets.

    In this webinar you’ll learn how to:
    •Reap cloud efficiencies from as-a-service delivery of a cloud single sign-on solution
    •Maintain your current investments while migrating to cloud-based access management
    •Leverage automation to drastically lower day-to-day operational overheads
    •Start global and go granular as you set up access management and cloud SSO policies
    •Accommodate diverse user groups such as administrators, partners, C-suites and mobile users
  • 451 Research & Gemalto Present "Alphabet Soup: Deciphering Multi-Cloud Security Recorded: Oct 19 2017 57 mins
    Eric Hanselman, Chief Analyst at 451 Research and Michael Gardiner, Security Lead for CTO office, Gemalto
    The cloud provides organizations with elasticity and speed and by 2018 60% of an enterprises’ workloads will run in the cloud says 451 Research. The amount of business operations running in the cloud means organizations have more cloud computing service providers, with a typical enterprise having roughly six. This requires companies to develop and implement a multi-cloud strategy, especially when it comes to security. But each CSP has its own security offerings and integrations sometimes making the process confusing and complex. Even prior to the cloud, encryption and key management have presented challenges for many organizations, but with encryption becoming ubiquitous – a strong key management strategy is key. This is especially important with industry mandates and government regulations like European General Data Protection Regulation (GDPR) and U.S state data breach disclosure laws.

    In this joint webinar with 451 Research, we will cover topics including:

    -Building a multi-cloud security strategy for encryption and key management
    -Best practices, benefits and pitfalls of managing your own security
    -Impact of regulations on data protection in the next few years
    -Understanding the different CSP requirements for key management:
    oCustomer-Supplied Encryption Key (CSEK)
    oBring Your Own Key (BYOK)
    oHold Your own Key (HYOK)
    oGeneral cloud service provider key management services overview
Security for What Matters Most: Data & Identities
As the global leader in digital security, Gemalto brings trust to an increasingly connected world. From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.

Gemalto’s solutions are at the heart of modern life, from digital payments and transactions to enterprise security and the Internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Authentication Service 30 minute challenge
  • Live at: Oct 4 2012 1:00 pm
  • Presented by: Jason Hart, Authentication and Cloud Visionary
  • From:
Your email has been sent.
or close