Two Step Process to Cloud Security

Matt McKinley
Securing access to cloud-based services - both public and private - is no easy feat. It involves a two-pronged approach, which includes securing the actual cloud-based applications and data, and providing strong authentication for users wishing to access cloud services. Join this webinar as Matt McKinley, Director of US Product Management for Stonesoft, will discuss the considerations organizations should take when deploying this two–pronged approach.

Attend this webinar to learn:

- How to provide secure access to cloud services
- How to integrate with the cloud and maintain control over user
information
- Ways of providing 2 factor authentication for cloud users
Dec 8 2011
47 mins
Two Step Process to Cloud Security
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4487)
  • Upcoming (154)
  • Date
  • Rating
  • Views
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • Learn from ING how one of the largest financial services corporations implemented ReputationDV (RepDV) from HP TippingPoint to proactively secure their network without compromising performance. RepDV, a security intelligence tool, monitors inbound and outbound communications to identify and block undesirable hosts. Updated every two hours, this robust security intelligence feed searches through hundreds of thousands of known malicious IPv4, IPv6, and DNS names and assigns a threat score of 1 to 100. Rated based on the analysis of the source, category, or threat, this score helps block traffic that poses a potential security risk. ING has had amazing success with HP TippingPoint RepDV:
    - 2 million connections blocked in 15 months
    - 75% decrease in total malware related incidents
    - 0 false positives
    ING will cover how deploying HP TippingPoint security intelligence helped simplify their network security strategy while increasing reliability and effectiveness.
  • Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.

    A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:

    How advanced targeted cyber attacks are different from traditional threats
    How Big Data techniques can spot attacks when traditional defenses fall short
    What you should be doing now to take advantage of Big Data Security Analytics
  • Advanced targeted cyber attacks have hit some of the world’s largest businesses. The attacks weren't blocked because they don’t match any known attack signature. Each one is unique, custom created to penetrate the target network and steal data.

    A new video featuring Gartner Distinguished Analyst, Neil MacDonald, and HP’s Eric Schou, explains how Big Data Security Analytics can help find and block targeted cyber attacks. View it to learn:

    How advanced targeted cyber attacks are different from traditional threats
    How Big Data techniques can spot attacks when traditional defenses fall short
    What you should be doing now to take advantage of Big Data Security Analytics
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • Take a rule book, throw it away and write a better one.
    In typically disruptive fashion, Dell are Redefining the Economics of Enterprise Storage and you can benefit.

    In this webinar Paul Harrison, UK Storage Sales Director for Dell, will discuss Dell’s storage design philosophy and how our modern storage architectures are helping customers around the world to be more flexible and agile as well as breaking the traditional cycles of rip and replace.
    With our key design tenets around ease of use, full virtualisation, intelligent tiering, high scalability, elimination of forklift upgrades and innovative perpetual licencing models, Dell’s storage solutions are delivering real world benefits to thousands of users around the world and was the platform of choice for the Commonwealth Games, Glasgow2014.

    Join us and learn how Dell’s storage strategy differs from that of others and how it can help you to:
    •Acquire, deploy, and grow Storage on demand
    •Adapt more seamlessly to changing business needs
    •Intelligently manage data assuring business continuity
    •Reliably automate more processes, releasing time to focus on more strategic tasks
    •Strike the perfect balance between performance, capacity and price all while delivering a rich feature set.
  • Join this unique roundtable chat with three InfoSec Professionals who have recently climbed the BYOD mountain and come back down to share their stories. We’ll discuss the industry and regulatory differences, managing user expectations of privacy, legal implications and technical pitfalls in this 60 minute Security Leadership Series webinar, brought to you on April 10, 2014 at 1PM Eastern in partnership with Capella University.
  • Autonomic Software significantly expands the capabilities of McAfee ePO. Autonomic’s three suites are all integrated into ePO with no need for separate console, databases, and reports. They are “As McAfee As McAfee”!

    Autonomic Patch Manager, EndPoint Manager and Power Manager suites provide improved security, and managing of end points, at virtually no charge when incorporating Power Manager.

    Join McAfee and its 2013 MVP Partner of the Year to learn how the integrated solution provides:
    • Increases Scalability – Delivery of patches to both large organizations and small-to-mid-sized organizations
    • Reduces Costs - Using Power & Patch Management Suites
    • Simplifies Complexity - Maintains a secure environment with minimal human intervention using EndPoint Suite
    • Easily Customizable Solutions – For unique requirements
  • The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • The alarming rise of advanced persistent threats (APTs) makes security analytics around Big Data an imperative. In light of the challenges of converting Big Data into actionable information with first generation SIEMs, security professionals have become skeptical about the ability to use SIEM beyond compliance needs. Yet, today’s advanced SIEM technology takes threat detection, understanding and response to a whole new level. Join us to learn how to use next generation SIEM technology to specifically detect security threats within an ocean of Big Data. Discover how the latest technologies in security analytics such as the quad-correlation methods of rules, statistics, risk, and history can help your organization execute SIEM best practices in detection with intelligence, integration, and ease.
  • Channel
  • Channel profile
Up Down
  • Two Step Process to Cloud Security Recorded: Dec 8 2011 47 mins
    Securing access to cloud-based services - both public and private - is no easy feat. It involves a two-pronged approach, which includes securing the actual cloud-based applications and data, and providing strong authentication for users wishing to access cloud services. Join this webinar as Matt McKinley, Director of US Product Management for Stonesoft, will discuss the considerations organizations should take when deploying this two–pronged approach.

    Attend this webinar to learn:

    - How to provide secure access to cloud services
    - How to integrate with the cloud and maintain control over user
    information
    - Ways of providing 2 factor authentication for cloud users
  • Deploy Thousands of Security Devices in Seconds Recorded: Nov 2 2011 29 mins
    A Quicker, Error Free Approach to Deploying, Maintaining and the Upkeep Security Across Multi-Location Businesses

    Whether you’re facing new threats or tuning your entire network of business locations, there is a new approach that makes updating and maintaining security fast. In a matter of seconds, new security rules, updates and upkeep tasks can be pushed to all locations remotely. Automated updates and upgrades ensure the highest level of protection. They also reduce the potential for human errors — the biggest security threat of all. From delivery to full operation, this new approach can do in 84 seconds what takes traditional security deployments 16 days to complete.
  • MSSPs: Offer more services, spend less money, provide enterprise-class security Recorded: Oct 26 2011 29 mins
    Become a Stonesoft MSSP and not only ensure the security of your customers, but become more competitive as a security services provider. The Stonesoft approach is different – more secure, easier to use and more cost effective. Join us for this session which will cover the Stonesoft solution for MSSPs:

    - Centralized management
    - New revenue possibilities
    - Flexible pricing model
    - High availability
    - Virtualization
  • Secure Connectivity for Multi-location Businesses Recorded: Oct 25 2011 45 mins
    Looking for a more economical, faster and easier approach to network security?

    Securing an entire network of locations can be costly, burden IT staff and open the doors to evolving and advanced threats. Attend this webinar for a discussion of the latest trends in next generation security infrastructure, learn a new approach to securing your entire network of business locations as well as gain insights for reducing management costs.

    If any of the below describes your security situation, register now to attend!

    •Is your business geographically distributed?
    •Is secure and resilient connectivity a must?
    •Is the low cost alternative preferred?
    •Is ease of management essential?
  • Tech Topics: Deploy Thousands of Security Devices in Seconds Recorded: Sep 13 2011 30 mins
    Take a look at this first-of-its-kind approach to large scale security deployments that is easier, cheaper, faster and safer. Join Stonesoft for a demonstration of the plug and play installation, firewall element creation wizard, policy changes, as well as a closer look at the new StoneGate Express Firewall FW-105.
  • Tech Topics: Virtualization Recorded: Aug 11 2011 27 mins
    Tech Topics: Virtualization
  • Tech Topics: Application Awareness Recorded: Aug 11 2011 21 mins
    Tech Topics: Application Awareness
Enterprise Network Security. Simplified.
Stonesoft webinars are designed to help IT and network security professionals respond to the dynamic, multi-sourced and virtualized world of IT infrastructure. Including such topics as cloud computing, consumerization of IT, advanced threats and virtualization, get best practices and tips for securing your network in today's dynamic environment.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Two Step Process to Cloud Security
  • Live at: Dec 8 2011 6:00 pm
  • Presented by: Matt McKinley
  • From:
Your email has been sent.
or close
You must be logged in to email this