Introducing TC TrustCenter (A PGP Corporation Company)

Presenter: Michelle Lewis, Sales Manager TC TrustCenter (A PGP Corporation Company)
The use of SSL to protect communications and enable secure collaboration has grown dramatically within organisations over the past decade. However, the proliferation of solutions that rely on SSL has a hidden cost for organisations: the administrative burden of procuring and managing SSL certificates.

Failure to manage all of an organisation’s SSL certificates not only increases the direct cost of buying certificates, but also increases the effort required to prevent unexpected certificate expirations from causing costly and embarrassing service interruptions. TC TrustCenter, the newest division of PGP Corporation, provides an on-demand platform for managing trusted identities used to secure SSL transactions, authenticate mobile applications, and create legally enforceable digital signatures.



Join us for this webcast to learn how TC TrustCenter can enable your organisation to:

- Reduce SSL certificate costs and management complexity
- Minimise business risk
- Plan for security beyond SSL
Jun 10 2010
38 mins
Introducing TC TrustCenter (A PGP Corporation Company)
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4510)
  • Upcoming (158)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
Up Down
  • Η Κορυφαία Κρυπτογράφηση για την Απόλυτη Προστασία Δεδομένων Recorded: Mar 15 2012 2 mins
    Στην σημερινή εποχή της ύφεσης και της αβεβαιότητας η κλοπή ή απώλεια δεδομένων μπορεί να επιφέρει τρομακτικές επιπτώσεις στην λειτουργία αλλά και στην φήμη στον χώρο των επιχειρήσεων και των οργανισμών.
    Δείτε πως μπορείτε εύκολα, άμεσα και οικονομικά να προστατεύσετε την ευαίσθητη πληροφορία σας με την πρωτοπόρα λύση κρυπτογράφησης της Symantec.
  • Integrare Data Loss Prevention con Encryption per una più efficace protezione de Recorded: Dec 13 2011 53 mins
    This webcast is in Italian.

    Come le soluzioni Symanteci Data Loss Prevention e Symantec PGP possono essere integrate per offrire una protezione della proprietà intellettuale estremamente efficace e flessibile.
  • Getting Started with DLP: Quick Wins for Success Recorded: Nov 8 2011 28 mins
    Are you thinking about deploying data loss prevention (DLP), but not sure where to start? Join this webcast to learn how you can achieve quick wins and reduce your data loss risk. You'll hear best practices based on customer experiences.

    During this webcast, attendees will learn:

    - Key DLP Requirements
    - How DLP Works
    - Key pre-technology lessons from customers
    - Key rollout lessons
    - How to move your DLP project forward
  • Smarter Than You Think: DLP Learns to Protect Hard-to-Find IP Recorded: Oct 11 2011 35 mins
    Are you worried about protecting your intellectual property (IP), but can’t get your arms around it? Finding data is like looking for the proverbial needle in the haystack. IP is buried in documents, spreadsheets and reports across your network. A new DLP technology based on machine learning, a branch of artificial intelligence, now makes it simpler to find and protect IP.

    During this webinar, viewers will learn:

    • The Challenge of Finding IP
    • A New Way to Find & Protect IP
    • How Vector Machine Learning Works
    • Automated Zero-Day Protection for Data
    • The New ABCs of DLP: Describe, Fingerprint & Learn
  • Covering Your Bases, Encrypting Your Data in More Places: Encryption & Mobility Recorded: Sep 29 2011 56 mins
    The benefits of mobile computing come at a price for information security professional. Employees want the benefit of being able to access information on the go, but what risks does mobility pose to sensitive data? In this session, learn about the deployment issues associated with protecting data on the go. Ensure that employees can handle data safely when using smartphones, laptops and removable storage.
  • Getting Started with Data Loss Prevention: Quick Wins for Success Recorded: Sep 15 2011 57 mins
    Are you thinking about deploying data loss prevention (DLP), but not sure where to start? Join this webcast to learn how you can achieve quick wins and reduce your data loss risk. You’ll hear best practices from an InfoSec veteran who has had success with DLP.

    During this webcast, attendees will learn:

    • Security Trends Driving DLP Projects
    • Key DLP Requirements
    • How DLP Works
    • The True Life Story of DTE Energy’s DLP Program
  • Protecting Your Information in the Age of WikiLeaks Recorded: Sep 13 2011 2 mins
    We’ve entered a new era in which organizations suddenly find their most confidential information splashed across the Internet. In the wake of this intense media attention, you may be asking yourself, “What steps can I take to help my company avoid this same fate?”

    Symantec has been working with financial services customers who are concerned about preventing these same issues. We have developed a set of best practices that can help defend against these types of breaches.

    Viewers will learn:

    • How to identify the internal and external risks that could lead to a data breach
    • Recommended counter measures from financial services customers on how to defend against these types of breaches
  • Building Trusted Banking Apps for the iPad – How Hidden 2FA Helped USAA Recorded: Sep 1 2011 47 mins
    Users are increasingly adopting smart phones and tablet devices as their default computing platform. In response to this trend, businesses are delivering applications to these devices to deliver new products, streamline customer service, and drive customer satisfaction. However, exposing information via mobile devices risks exposing users’ information to unauthorized access. Reducing this risk demands an authentication solution for your mobile application that balances the need for security with a simple user experience.

    Join Symantec’s User Authentication group for this one-hour webcast to learn how USAA, a leading provider of financial services, embedded Symantec strong authentication into its mobile application to deliver a superior and secure user experience that accelerated adoption of its mobile banking application.
  • Hardware Based Encryption is Here, Now What? Recorded: Aug 18 2011 39 mins
    IT organizations have been asking about support for Opal-compliant self-encrypting drives for quite awhile now. Opal-compliant hardware availability is slowly trickling out to the purchasing public. The question then becomes, “It’s here! What do I do next?”

    Join us for this informative session on hardware-based encryption as we’ll talk about managing these new hardware based encrypted drives, as well as your existing software based encrypted drives. We’ll discuss the advantages and disadvantages of self-encrypting drives vs. the standard non-encrypting drives. We’ll also discuss deployments and management of self decrypting drives, and managing these hybrid encryption environments.
  • The Trusted Front Door: Cloud-based Authentication Solutions Recorded: Aug 4 2011 60 mins
    The perimeter around the modern enterprise has become increasingly porous over the past five years. Employees that traditionally resided within the organization’s four walls have altered their work patterns and become increasingly mobile. At the same time, the accelerating pace of business has forced enterprises to open their networks to business partners to obtain or deliver new services faster, and more cost-effectively. While these new patterns of behavior drive productivity, they also increase an organization’s exposure to risk. A key struggle for a modern enterprise is enabling access to sensitive networks, applications, and data – but only to the right individuals. This session will detail how modern strong authentication solutions can provide secure access to sensitive information and applications, while accounting for the unique needs of different business partners, employees, and customers.
  • What’s New with Symantec Encryption Recorded: Jul 28 2011 51 mins
    IT organizations with the mandate to encrypt information are finding that there is more data in more places. This leads to the question of how to build a proper strategy to ensure that it is protected in all places, and keep it running with strong management tools.

    In this session, learn about how IT issues such as mobility and management affect encryption requirements.

    Attend this session if you have questions such as:

    • How can I let my employees use iPads with encrypted email?
    • What considerations do I need to think about with hardware-based encryption?
    • How can I make sure that my encryption deployments are always well managed?

    Join this webcast to find out what’s new with Symantec’s encryption solutions, and get a clear understanding on how to protect more data in more places.
  • Smarter Than You Think: DLP Learns to Protect Hard-to-Find IP Recorded: Jun 30 2011 53 mins
    Are you worried about protecting your intellectual property (IP), but can’t get your arms around it? Finding data is like looking for the proverbial needle in the haystack. IP is buried in documents, spreadsheets and reports across your network. A new DLP technology based on machine learning, a branch of artificial intelligence, now makes it simpler to find and protect IP.

    During this webinar, viewers will learn:

    • The Challenge of Finding IP
    • A New Way to Find & Protect IP
    • How Vector Machine Learning Works
    • Automated Zero-Day Protection for Data
    • The New ABCs of DLP: Describe, Fingerprint & Learn
  • Nach Hackerangriff auf RSA SecurID: Sind Sie noch geschützt? Recorded: Jun 27 2011 29 mins
    In den letzten Wochen haben Hacker angeblich mithilfe duplizierter RSA SecurID-Token versucht, in die hochsensiblen Netzwerke mehrerer Unternehmen einzudringen. Diese Angriffe erfolgten nach vorangegangenen Zusicherungen von RSA, dass während eines Einbruchs bei RSA gestohlene Informationen nicht für direkte Angriffe auf seine Kunden verwendet werden könnten.

    Als Folge dieser Angriffe besteht bei vielen Unternehmen ein verstärktes Interesse an einer sicheren Alternative, um das Risiko eines ähnlichen Sicherheitsverstoßes auf ein Minimum zu reduzieren.

    Informieren Sie sich in unserem Webcast über:
    • Mögliche Auswirkungen, die diese Art von Angriff auf die Risikoanfälligkeit Ihres Unternehmens haben kann, und welche Kosten dadurch entstehen können
    • Eine Strategie, um schnell und problemlos wichtige Systeme auf eine sichere Alternative umzustellen
    • Möglichkeiten, diesen Sicherheitsvorfall als Chance für Ihr Unternehmen zu nutzen
    • Lukrative finanzielle Anreize, mit denen Symantec Ihnen den Wechsel erleichtert
  • After The RSA SecurID Breaches: Are You Still Protected? Recorded: Jun 23 2011 58 mins
    In recent weeks, attackers allegedly using duplicate RSA SecurID tokens have attempted to gain access to several organizations’ sensitive networks. These attacks follow previous assurances by RSA that information extracted during the RSA breach could not be used to enable a successful direct attack against its customers.

    In the wake of these attacks, many organizations are now seeking a secure alternative to mitigate the risk of experiencing a similar breach.

    Join us for this hour webcast to learn:

    • The potential impact this kind of breach could have on your organization’s risk and costs
    • A strategy to quickly and easily migrate critical systems to a secure alternative
    • How you can transform this incident into an opportunity for your business

    This session will be repeated at 12h00 BST
  • After the RSA SecurID Breaches: Are You Still Protected? Recorded: Jun 23 2011 36 mins
    In recent weeks, attackers allegedly using duplicate RSA SecurID tokens have attempted to gain access to several organisations' sensitive networks. These attacks follow previous assurances by RSA that information extracted during the RSA breach could not be used to enable a successful direct attack against its customers.

    In the wake of these attacks, many organisations are now seeking a secure alternative to mitigate the risk of experiencing a similar breach.

    Join us for this webcast to learn:

    • The potential impact this kind of breach could have on your organisation's risk and costs
    • A strategy to quickly and easily migrate critical systems to a secure alternative
    • How you can transform this incident into an opportunity for your business
    • A fantastic financial incentive Symantec has to further help your transition

    This session will be repeated at 12h00 EST.
  • Data Loss Prevention (DLP) Techniques Recorded: Jun 16 2011 50 mins
    This session will focus on how to get the most from your Data Loss Prevention (DLP) technologies, through some new functionalities.

    DLP simplifies the detection and protection of enterprises’ most valuable information – their intellectual property. During this webinar, fInd out more about Symantec's major new release of the leading data security suite features including:

    - The ability to streamline remediation of Data at Rest - network folder risk scoring

    - Added Protection at the Endpoint through Application File Access Control
  • Protecting Your Information in the Age of WikiLeaks Recorded: Jun 1 2011 49 mins
    We’ve entered a new era in which organizations suddenly find their most confidential information splashed across the Internet. In the wake of this intense media attention, you may be asking yourself, “What steps can I take to help my company avoid this same fate?”

    Symantec has been working with financial services customers who are concerned about preventing these same issues. We have developed a set of best practices that can help defend against these types of breaches.

    Viewers will learn:

    • How to identify the internal and external risks that could lead to a data breach
    • Recommended countermeasures from financial services customers on how to defend against these types of breaches
  • Yellow Thursdays Webcast: Symantec PGP Email Encryption Overview Recorded: May 19 2011 46 mins
    This is an in-depth look of how to use Symantec email encryption solutions including the Symantec PGP Universal Gateway Email and Symantec PGP Desktop email . Symantec PGP Email encryption application which can be adapted to a wide variety of enterprise needs. In this web cast we’ll examine how to protect email and enable organisations to encrypt email both internally and externally to allow 3rd parties to share the benefits of encrypted communications distributed to partners and customers. We’ll also demonstrate how PGP Universal Server is able to provide centralised key generation and lookup, and improved logging, reporting and overall management of keys.

    This is a technical presentation and a detailed understanding of encryption techniques is recommended.
  • Integrating Endpoint Encryption and Endpoint DLP Recorded: Apr 27 2011 62 mins
    Please join us to hear how you can protect against loss and theft of your IP, through the latest integration of Symantec Data Loss Prevention (DLP) and Endpoint Encryption.

    According to the latest Forrester research, most companies are under-invested in protecting their IP. If you’re like most of your peers, you’ve already taken steps to protect credit card data – but what are you doing to protect your IP?
    Through this integration of DLP and Endpoint Encryption, you can:
    •Quickly identify laptops and desktops that contain your IP and take steps to clean them up
    •Protect against laptop loss or theft that may lead to exposure of your IP
    •Reduce legal costs associated with IP theft by blocking malicious activity
    •Monitor and apply policy around how your IP is being used while employees are off your trusted network
    In this age of Stuxnet and WikiLeaks, malicious attacks are designed specifically to capture IP - with potentially devastating results. Attend this webcast to learn how you can protect your firm from these emerging threats through defense in depth at the endpoint from Symantec
    .
  • Two-Factor-Authentication (German) Recorded: Jan 25 2011 41 mins
    Identitätsdiebstahl, Phishing und Online-Betrug verursachen wachsende Besorgnis beim Verbraucher und führen bei Anbietern zu steigenden Kosten durch Schadensbehebung, Bußgelder und Imageeinbußen. Auch die zunehmende Notwendigkeit, externen und internen Mitarbeitern, Dienstleistern und Geschäftspartnern Zugriff auf Unternehmensdaten zu ermöglichen, führt zu einem erhöhten Bedarf an starker Authentifizierung.

    Eine empfohlene Methode zum Schutz der digitalen Identitäten ist die Zwei-Faktor-Authentisierung, die vertrauenswürdig, benutzerfreundlich und kostengünstig einsetzbar ist. Bei der Zwei-Faktor-Authentisierung wird zur Verifizierung einer Identität oder einer Transaktion Wissen (z. B. Benutzername und Passwort) mit Besitz (ein Credential z. B. in Form eines Token) kombiniert.

    In unserem Webcast stellen wir Ihnen die Einsatzmöglichkeiten von Zwei-Faktor-Authentisierung und die Besonderheiten unserer Cloud-basierten VIP Authentication Services vor. Erfahren Sie in unserem Webcast, wie Sie bei der Umsetzung von Zwei-Faktor-Authentisierung mit VIP einen deutlichen Kostenvorteil und Geschwindigkeitsvorsprung gegenüber typischen Marktlösungen erzielen können.

    Webcast Inhalte:
    - Einsatzszenarien von Zwei-Faktor-Authentisierung
    - VIP Authentication Services: Vorteile einer Cloud-basierten Zwei-Faktor-Authentisierung
    - Im mobilen Einsatz: VIP Access for Mobile
Webcasts targeted to software security professionals
Symantec Corporation is a global leader in Email and Data Encryption software and Data Loss Prevention providing Trusted Data Protection. Our presenters usually are combined with a customer, analyst or partner. We plan a webcast once a month and they are targeted to software security professional.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Introducing TC TrustCenter (A PGP Corporation Company)
  • Live at: Jun 10 2010 10:00 am
  • Presented by: Presenter: Michelle Lewis, Sales Manager TC TrustCenter (A PGP Corporation Company)
  • From:
Your email has been sent.
or close
You must be logged in to email this