Hi [[ session.user.profile.firstName ]]

Utilizing Strong Authentication for Secure File Collaboration in the Enterprise

Managers tasked with leading IT and security today find themselves having to navigate fundamental changes in their professional environment.

In the process they are being overtaken by business units, groups and even individual employees who are taking an off-road approach by procuring IT services on their own, whether by subscribing to a SaaS offering, buying their own computing equipment, downloading a productivity application, or renting cloud storage. From here, the slippery road toward unauthorized file sharing and leakage of sensitive corporate data is short.

Join your fellow professionals for a best practices session on “Utilizing Strong Authentication to Encourage Collaboration in the Enterprise”. In this webinar executives from SafeNet and WatchDox will discuss how strong authentication combines with file sharing to facilitate and enable secure collaboration in the enterprise.

In this webinar we will discuss :

•Current market trends around collaboration, cloud and security
•Vulnerabilities associated with unsecured file sharing tools
•The role of strong authentication in securing collaboration and file sharing tools
•Case study discussion
Recorded Nov 20 2013 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Doron Cohen, SafeNet, Doron Peri, Watchdox
Presentation preview: Utilizing Strong Authentication for Secure File Collaboration in the Enterprise
  • Channel
  • Channel profile
  • Are you Ready for DFARS? Sep 27 2017 3:00 pm UTC 60 mins
    Eric Avigdor, Director of Product Management at Gemalto
    With the deadline for DFARS (Defense Federal Acquisition Regulation Supplement) quickly approaching, many business are scrambling to meeting compliance requirements. An important part of DFARS addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals.
    Are you prepared? If you’re like many other government contractors and subcontractors, a little advice may be needed to navigate the waters of physical and user access controls.
    Gemalto’s Identity and Protection expert, Eric Avigdor, will be present and informative look at DFARS and what options are available to ensure compliance. What Eric will discuss:
    •Overview of DFARS mandate
    •Use cases – our experience from the field
    •Comprehensive solutions that meet the multi-factor authentication and physical access controls required by the DFARS mandate
    •Mapping solutions to the needs of your department
  • The Blockchain Bubble: Identifying viable opportunities for blockchain Sep 26 2017 3:00 pm UTC 60 mins
    Joe Pindar, CTO Office Director of Strategy
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • Data, the new oil: Find out why and what it means for your organization Recorded: May 5 2016 62 mins
    Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
Protecting Data, Identities, Transactions & Communications
SafeNet is the only company trusted to protect the world’s most sensitive commercial and government assets. We do this through solutions that persistently protect throughout the information lifecycle and evolve to support changing business and market requirements without disruption.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Utilizing Strong Authentication for Secure File Collaboration in the Enterprise
  • Live at: Nov 20 2013 3:00 pm
  • Presented by: Doron Cohen, SafeNet, Doron Peri, Watchdox
  • From:
Your email has been sent.
or close