Browse communities
Browse communities
Presenting a webinar?

Two Step Process to Cloud Security

Matt McKinley
Securing access to cloud-based services - both public and private - is no easy feat. It involves a two-pronged approach, which includes securing the actual cloud-based applications and data, and providing strong authentication for users wishing to access cloud services. Join this webinar as Matt McKinley, Director of US Product Management for Stonesoft, will discuss the considerations organizations should take when deploying this two–pronged approach.

Attend this webinar to learn:

- How to provide secure access to cloud services
- How to integrate with the cloud and maintain control over user
information
- Ways of providing 2 factor authentication for cloud users
Dec 8 2011
47 mins
Two Step Process to Cloud Security
More from this community:

IT Security

  • Live and recorded (5371)
  • Upcoming (110)
  • Date
  • Rating
  • Views
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 on March 26, 2015 at 1:00PM Eastern for our next "From the Trenches" webcast where we'll talk about what it means to be an expert witness and the best practices for serving as one.
  • As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation.
  • As organizations work hard to ensure complete anti-malware coverage on desktops, servers, and at the perimeter, attackers are already moving on to techniques completely outside those detected by traditional security tools. Enterprises must consider alternative approaches to defending their infrastructure and turn their focus to tools, products and techniques that approach security in new and different ways.

    In this webinar, Eric and Dave will discuss:

    • How the volume of system alerts from Network Security solutions are creating lots of noise but lack context to focus on the real threats facing your data
    • How to stop advanced threats – with no advance knowledge of the tools or malware – by following the attack sequence
    • Why bridging the gap between system security and data protection is the key to stopping ever increasing sophisticated attackers from stealing your data
  • This webinar draws on Bradford Networks’ extensive BYOD experience to help organizations avoid the landmines that plague BYOD initiatives.

    Attend this webinar and you will learn how to avoid:
    • Organizational Resistance - Establish and manage a cross-functional committee of stakeholders to build consensus
    • Support Burden - Leverage proven techniques to educate end users and minimize help desk calls
    • User Frustration - Implement ultra flexible BYOD policies without compromising security
    • Onboarding Latency - Maximize the end users’ ability to self-administer new and lost/stolen devices
    • Vulnerable Endpoints – Guided remediation for user devices that are under-protected and non-compliant
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers always have a goal in mind and it’s up to you to understand how they will get there. But how is that possible when there is simply too much data to sort through and act upon?

    The upcoming release of Core Insight 4.5 adds new attack intelligence features to consolidate, normalize, and prioritize vulnerability management initiatives enterprise-wide. These features allow users to reduce the noise from scanners by more than 90%, so that you can focus on the most critical threats.

    Join us on March 26, 2015 at 1pm ET to get a sneak peek and live demo of Core Insight 4.5. Hear about new features such as:

    - User customizable and flexible reporting
    - Centralized asset store for extended scalability
    - Enhanced exploit matching and filtering
    - Interactive and adaptive attack paths
  • Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

    Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

    In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

    • Engaging human sensors as a layer of defense
    • Utilizing user reports to detect malware
    • Real use cases of user detection within our enterprise
  • Sutter Health is a not-for-profit health system serving more than 100 communities in Northern California. Each year its 5,000 physicians care for more than 10 million outpatient visits and discharge more than 200,000 in-patients.

    As healthcare systems transition from “fee for service” to “fee for value” reimbursement models, there is an increasing focus to drive down 30-day re-admission rates, particularly for high risk patients. To this end, Sutter Health is piloting Project RED (Re-engineered Discharge) which leverages predictive analytics to identify high-risk patients and then prescribes alternative discharge workflows aimed at lowering the risk of re-admission.

    Join us as Kristen Wilson-Jones, Sutter RD&D CTO, shares how Sutter Health has leveraged MuleSoft’s Anypoint Platform in an orchestrated plecosystem of technologies to power Project RED by enabling real-time patient risk scoring, clinical workflow management and bi-directional integration with Epic.

    Topics covered
    -------------------
    + How Sutter Health is lowering 30-day re-admission rates by re-engineeing clinical workflows
    + The need for connectivity to enable workflow re-design
    + Best practice in moving from an application-centric to a data object-centric connectivity approach
  • Channel
  • Channel profile
  • Two Step Process to Cloud Security Recorded: Dec 8 2011 47 mins
    Matt McKinley
    Securing access to cloud-based services - both public and private - is no easy feat. It involves a two-pronged approach, which includes securing the actual cloud-based applications and data, and providing strong authentication for users wishing to access cloud services. Join this webinar as Matt McKinley, Director of US Product Management for Stonesoft, will discuss the considerations organizations should take when deploying this two–pronged approach.

    Attend this webinar to learn:

    - How to provide secure access to cloud services
    - How to integrate with the cloud and maintain control over user
    information
    - Ways of providing 2 factor authentication for cloud users
  • Deploy Thousands of Security Devices in Seconds Recorded: Nov 2 2011 29 mins
    Matt McKinley
    A Quicker, Error Free Approach to Deploying, Maintaining and the Upkeep Security Across Multi-Location Businesses

    Whether you’re facing new threats or tuning your entire network of business locations, there is a new approach that makes updating and maintaining security fast. In a matter of seconds, new security rules, updates and upkeep tasks can be pushed to all locations remotely. Automated updates and upgrades ensure the highest level of protection. They also reduce the potential for human errors — the biggest security threat of all. From delivery to full operation, this new approach can do in 84 seconds what takes traditional security deployments 16 days to complete.
  • MSSPs: Offer more services, spend less money, provide enterprise-class security Recorded: Oct 26 2011 29 mins
    Matt McKinley
    Become a Stonesoft MSSP and not only ensure the security of your customers, but become more competitive as a security services provider. The Stonesoft approach is different – more secure, easier to use and more cost effective. Join us for this session which will cover the Stonesoft solution for MSSPs:

    - Centralized management
    - New revenue possibilities
    - Flexible pricing model
    - High availability
    - Virtualization
  • Secure Connectivity for Multi-location Businesses Recorded: Oct 25 2011 45 mins
    Mr Matt McKInley, Director of US Product Management
    Looking for a more economical, faster and easier approach to network security?

    Securing an entire network of locations can be costly, burden IT staff and open the doors to evolving and advanced threats. Attend this webinar for a discussion of the latest trends in next generation security infrastructure, learn a new approach to securing your entire network of business locations as well as gain insights for reducing management costs.

    If any of the below describes your security situation, register now to attend!

    •Is your business geographically distributed?
    •Is secure and resilient connectivity a must?
    •Is the low cost alternative preferred?
    •Is ease of management essential?
  • Tech Topics: Deploy Thousands of Security Devices in Seconds Recorded: Sep 13 2011 30 mins
    Matt McKinley
    Take a look at this first-of-its-kind approach to large scale security deployments that is easier, cheaper, faster and safer. Join Stonesoft for a demonstration of the plug and play installation, firewall element creation wizard, policy changes, as well as a closer look at the new StoneGate Express Firewall FW-105.
  • Tech Topics: Virtualization Recorded: Aug 11 2011 27 mins
    Matt McKinley, Director Product Management US
    Tech Topics: Virtualization
  • Tech Topics: Application Awareness Recorded: Aug 11 2011 21 mins
    Timo Tiitinen
    Tech Topics: Application Awareness
Enterprise Network Security. Simplified.
Stonesoft webinars are designed to help IT and network security professionals respond to the dynamic, multi-sourced and virtualized world of IT infrastructure. Including such topics as cloud computing, consumerization of IT, advanced threats and virtualization, get best practices and tips for securing your network in today's dynamic environment.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Two Step Process to Cloud Security
  • Live at: Dec 8 2011 6:00 pm
  • Presented by: Matt McKinley
  • From:
Your email has been sent.
or close
You must be logged in to email this