Two Step Process to Cloud Security

Matt McKinley
Securing access to cloud-based services - both public and private - is no easy feat. It involves a two-pronged approach, which includes securing the actual cloud-based applications and data, and providing strong authentication for users wishing to access cloud services. Join this webinar as Matt McKinley, Director of US Product Management for Stonesoft, will discuss the considerations organizations should take when deploying this two–pronged approach.

Attend this webinar to learn:

- How to provide secure access to cloud services
- How to integrate with the cloud and maintain control over user
information
- Ways of providing 2 factor authentication for cloud users
Dec 8 2011
47 mins
Two Step Process to Cloud Security
More from this community:

IT Security

  • Live and recorded (5239)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Today’s threat actors are more sophisticated than ever, and organizations need live attack intelligence that alerts them to emerging threats long before they become full-blown attacks that lead to sensitive data loss. Furthermore, organizations need the most current threat data available in order to protect their networks from incursions – they need real-time actionable intelligence.

    Join us for the upcoming webinar, “Actionable Intelligence: A Threat Intelligence Buyer’s Guide” featuring Rick Holland, Principal Analyst at Forrester Research, and Jeff Harrell, Senior Director, Product Marketing at Norse, to learn how to evaluate the various threat intelligence offerings in the marketplace, and how to utilize them to prevent today’s advanced attacks.

    In this webinar you will learn about:
    * The criteria needed to effectively evaluate threat intelligence solutions that meet your organization's needs
    * The value of the different types and sources of internal and external threat intelligence
    * How best to utilize threat intelligence to realize a greater return on security investments and better protect your organization
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • Social engineering targets our most challenging assets - people! We'll share a case study on how a regulated, mid-sized company prioritized risks, developed a mitigation strategy, and delivered an innovative awareness campaign.

    What's unique about this example is the program we helped build to incorporate active control testing, user feedback, and metrics to improve employee training alongside traditional technical controls.
  • In this webinar we will examine what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Attack Intelligence to Power Tomorrow’s Cyber Response.

    Preparing to combat every threat and vulnerability is a war that no cybersecurity professional can win today. Speed, accuracy and visibility of threats and active attacks is critical to defending against APTs and other sophisticated attacks responsible for today’s headline-grabbing data breaches. The next generation of advanced threat prevention solutions will require a significant shift in how we incorporate threat and attack visibility into everyday security operations, enabling incident responders to identify and stop campaigns as they happen.

    Join us as IDC’s Research Vice President for Security Products Services Charles Kolodgy shares his view of the threat landscape, including how threats are evolving, how cybercriminals are becoming more sophisticated and what new solutions are necessary to combat APTs.
  • Mobile is no longer a supplementary channel for the enterprise; It is quickly becoming the primary channel to deliver business critical information and experiences to partners, customers and employees. Join Sarvesh Jagannivas, VP of Product Marketing at MuleSoft, and Uri Sarid, CTO at MuleSoft, as they discuss the mobile enterprise opportunity, and the biggest challenges preventing successful mobile delivery.

    Join this webinar to learn:
    - Why mobile applications are the new imperative for the enterprise
    - The top challenges preventing rapid, scalable and secure mobile application development
    - Three case studies of industry leaders who are building mobile enterprises
  • Pass-the-hash and similar credential theft and reuse attacks are among the greatest security threats facing organizations today. With an impact that extends well beyond Microsoft Windows and Active Directory environments — and with no definitive means of remediation — it should come as no surprise that these types of attacks have been an underlying component of just about every targeted attack disclosed in the past several years, including those perpetrated against Saudi Aramco, Target, and The Wall Street Journal — just to name few.

    Join us Thursday, February 26th at 1 pm to learn:

    - How this highly popular and devastatingly effective class of attacks works
    - The basics of the pass-the-hash kill chain
    - An approach, based on design and administrative best practices, for mitigating attacks
    - The role privileged identity management solutions, like Xsuite, can play in implementing these practices

    Presenters:

    - Mark Bouchard, Co-Founder and VP of Research, CyberEdge Group, LLC
    - Dale Gardner, Senior Director, Product Marketing, Xceedium, Inc.
  • What sets high-functioning IT organizations apart from the rest? That’s something every IT leader wants to know. After all, we live in a highly competitive business climate and IT performance can be the difference between success and failure. To conquer the challenge, we need to be informed and collaborative and we need to do this in a cost-effective manner.

    In this webcast, you will hear from two experts on some of the technology that’s driving today’s high-functioning IT organizations. Find out how your company can be aligned, agile and ready to respond to ever-changing business requirements and competitive pressures.
  • Channel
  • Channel profile
  • Two Step Process to Cloud Security Recorded: Dec 8 2011 47 mins
    Securing access to cloud-based services - both public and private - is no easy feat. It involves a two-pronged approach, which includes securing the actual cloud-based applications and data, and providing strong authentication for users wishing to access cloud services. Join this webinar as Matt McKinley, Director of US Product Management for Stonesoft, will discuss the considerations organizations should take when deploying this two–pronged approach.

    Attend this webinar to learn:

    - How to provide secure access to cloud services
    - How to integrate with the cloud and maintain control over user
    information
    - Ways of providing 2 factor authentication for cloud users
  • Deploy Thousands of Security Devices in Seconds Recorded: Nov 2 2011 29 mins
    A Quicker, Error Free Approach to Deploying, Maintaining and the Upkeep Security Across Multi-Location Businesses

    Whether you’re facing new threats or tuning your entire network of business locations, there is a new approach that makes updating and maintaining security fast. In a matter of seconds, new security rules, updates and upkeep tasks can be pushed to all locations remotely. Automated updates and upgrades ensure the highest level of protection. They also reduce the potential for human errors — the biggest security threat of all. From delivery to full operation, this new approach can do in 84 seconds what takes traditional security deployments 16 days to complete.
  • MSSPs: Offer more services, spend less money, provide enterprise-class security Recorded: Oct 26 2011 29 mins
    Become a Stonesoft MSSP and not only ensure the security of your customers, but become more competitive as a security services provider. The Stonesoft approach is different – more secure, easier to use and more cost effective. Join us for this session which will cover the Stonesoft solution for MSSPs:

    - Centralized management
    - New revenue possibilities
    - Flexible pricing model
    - High availability
    - Virtualization
  • Secure Connectivity for Multi-location Businesses Recorded: Oct 25 2011 45 mins
    Looking for a more economical, faster and easier approach to network security?

    Securing an entire network of locations can be costly, burden IT staff and open the doors to evolving and advanced threats. Attend this webinar for a discussion of the latest trends in next generation security infrastructure, learn a new approach to securing your entire network of business locations as well as gain insights for reducing management costs.

    If any of the below describes your security situation, register now to attend!

    •Is your business geographically distributed?
    •Is secure and resilient connectivity a must?
    •Is the low cost alternative preferred?
    •Is ease of management essential?
  • Tech Topics: Deploy Thousands of Security Devices in Seconds Recorded: Sep 13 2011 30 mins
    Take a look at this first-of-its-kind approach to large scale security deployments that is easier, cheaper, faster and safer. Join Stonesoft for a demonstration of the plug and play installation, firewall element creation wizard, policy changes, as well as a closer look at the new StoneGate Express Firewall FW-105.
  • Tech Topics: Virtualization Recorded: Aug 11 2011 27 mins
    Tech Topics: Virtualization
  • Tech Topics: Application Awareness Recorded: Aug 11 2011 21 mins
    Tech Topics: Application Awareness
Enterprise Network Security. Simplified.
Stonesoft webinars are designed to help IT and network security professionals respond to the dynamic, multi-sourced and virtualized world of IT infrastructure. Including such topics as cloud computing, consumerization of IT, advanced threats and virtualization, get best practices and tips for securing your network in today's dynamic environment.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Two Step Process to Cloud Security
  • Live at: Dec 8 2011 6:00 pm
  • Presented by: Matt McKinley
  • From:
Your email has been sent.
or close
You must be logged in to email this