Hi [[ session.user.profile.firstName ]]

Converged Security - Protect your Digital Enterprise

Join Forrester and HPE Experts discussing why enterprise investments in security aren’t having the desired impact due to reliance on point solutions and treating security as a silo, overlay function. Find out more about how Converged Security can help overcome these challenges:

A use-case driven approach enhancing current security practices
Integrates with existing security methods, creating a ‘security-by-design’ solution
Uses end-to-end collaboration to embed security throughout the IT service value chain
Recorded May 24 2016 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Gerben Verstraete, HPE, John Kindervag, Forrester
Presentation preview: Converged Security - Protect your Digital Enterprise

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ensure Privacy Protection Through Your Digital Transformation Mar 27 2019 3:00 pm UTC 60 mins
    Carole Murphy, Product Marketing, Data Security – Voltage & Becky Arenson, Solutions Marketing, Data Security, Micro Focus
    Privacy represents a major challenge for the modern enterprise. The flexibility of hybrid IT and insights of data analytics are essential to business. But the digital transformation that is key to business success and competitive advantage is also a major vulnerability when it comes to data privacy.

    Organizations are rightfully concerned about CCPA, GDPR, PIPEDA, and the growing number of regulations now being enacted means they need to figure out how to reduce their risk. But current privacy protection approaches fall short. What’s needed is a unified technology framework that lets you take a holistic, analytics-driven approach to securing what matters most—a framework flexible enough to meet the needs of your enterprise, but specific enough to offer a guide to risk reduction.

    Join us for this webinar, to learn about:

    • The attributes of a flexible, unified framework to address disparate regulations
    • Five critical technology capabilities to enable compliance
    • Data discovery and classification to manage risk
    • Governing identity privileges, access, and stores
  • Close the gap in your ransomware defense Mar 21 2019 5:00 pm UTC 60 mins
    Gil Cattelain, Product Marketing Manager and Joe Leung, Product Marketing Manager, Micro Focus
    Ransomware is a global epidemic that is spreading like wildfire. According to the 2019 CyRiM (Cyber Risk Management) Report, ransomware could cause up to $193B in economic damage. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. And in one example, The City of Akron, Ohio experienced public service interruptions, including disruption to the processing of credit card payments, as result of a ransomware attack.

    Organizations can easily neutralize the threat with a holistic 2-step approach by first strengthening protections against intrusions from the start, and by quickly resolving issues with an up-to-the minute copy of data needed to restore systems back to operational status, should the virus manage to get through.

    Join this webinar to learn about:

    • Ransomware challenges and impact
    • Why malware detection alone is not enough
    • How to close the gap with holistic endpoint data and device management
  • 6 Part series - Breach Defense: Part 1 - Anatomy of a Breach Recorded: Feb 26 2019 49 mins
    Robert MacDonald, Micro Focus
    Cyber breaches have almost doubled in the past five years, according to the World Economic Forum, which now lists cyberattacks as third on its list of top global risks. But how can organizations keep pace, keep secure? There needs to be a plan! One of the clearest, most comprehensive, most flexible, and most highly-regarded methods we’ve found to approach cybersecurity is the framework devised by the National Institute of Standards and Technology (NIST).

    This webinar provides an overview of market trends facing organizations as they venture into a digital transformation. We will review how organizations can make their digital transformation secure by employing the NIST framework and ways they can to use it to strengthen every facet of their organization’s defenses against a breach.
  • Privacy: An Introduction to Data Protection and Identity Management Recorded: Feb 26 2019 11 mins
    Nathan Turajski, Director Product Marketing, Security Operations and Data Security, Micro Focus
    To help enterprises achieve an end-to-end solution that scales to meet modern privacy mandates such as GDPR, the California Consumer Privacy Act, and beyond, Micro Focus brings together comprehensive technology portfolios. This overview includes Secure Content Management for data discovery and classification; Identity and Access Management to capture and enforce user rights for safe access to sensitive data through identity governance; and Data Security for applying data-centric protection through innovative format-preserving encryption. The flexible solution supports a wide range of use cases to meet organizational maturity needs through a modular approach that grows along with your organization—learn more!
  • Get Started with Seamless AppSec in One Day Recorded: Feb 13 2019 48 mins
    Brent Jenkins and Harley Adams, Micro Focus
    With software becoming the competitive differentiator for most businesses rather than just a support function, the speed and complexity of it is rapidly increasing. Because of the business demand being put on development teams, often times there is little to no time put into ensuring these applications are secure. However, the biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer.

    Ensuring your applications are secure doesn’t have to be a cumbersome process, though. With the right program and tools, you can improve or start your organization’s security initiative without getting in the way of developers’ productivity. In this webinar, we will cover:

    • The current state of software and application security
    • How to create or improve your AppSec program in a day
    • Why integration is essential for speed
    • Why it is essential to go beyond the OWASP Top 10
  • Discover, protect, and control access to data to lower privacy risk Recorded: Feb 12 2019 17 mins
    Nathan Turajski, Director Product Marketing, Security Operations and Data Security, Micro Focus
    Ensuring the privacy of your customer information and IP is critical for protecting the lifeblood of your enterprise. But where to start? Micro Focus offers a comprehensive framework approach that maps products and technologies to each phase of your strategy. Whether just starting out with data discovery and classification to determine your risk, or if ready to apply controls and audit compliance, our security, risk and governance solutions scale to your needs, each step of the way. Begin to unlock new business value safely when data is trusted in the hands of appropriate users and applications, while lowering risk of abuse or loss. This privacy solution overview will illustrate how you can begin your journey!
  • Five Creative Ways that Organizations are using Advanced Authentication Recorded: Dec 13 2018 61 mins
    Kent Purdy and Troy Drewry, Micro Focus
    As organizations realize that today's users expect their digital interactions to be convenient, seamless, and above all secure, demand for new types of authentication heightens.

    In this session we’ll talk about the new ways organizations are using the latest authentication technologies and how they’re preparing the future.
  • Best Practices for managing privileged identities in a hybrid world Recorded: Nov 14 2018 34 mins
    Lacy Gruen and Tim Sedlack, Micro Focus
    One of the biggest challenges organizations with hybrid infrastructures face today is managing access across their complex and disparate systems – specifically privileged access. In the name of productivity, privileged access is provisioned to identities who need to perform administrative tasks. Those identities with elevated rights bring the most risk to an organization because they have the ability to do the most harm if their credentials are stolen or misused. This is why organizations must seek out solutions to get their privileged identities under control before they face a major data breach, network incident or, at the very least, a failed audit. However, employing the principle of least-privilege, where identities only have the correct level of access (no more, no less) can be difficult. This session will discuss best practices for privilege management in a hybrid world and how to reduce risk with a comprehensive, identity-based approach.

    Why attend this webinar?
    • Understand the amount of risk privileged identities pose to your organization
    • Hear best practices for managing privileged access across your hybrid infrastructure
    • Learn how Micro Focus can help you implement an identity-powered strategy
  • Five Steps to Efficient and Secure Office 365 Management Recorded: Oct 24 2018 45 mins
    Lacy Gruen, Jeff Kistler and Dennis Powell, Micro Focus
    Whether you have already implemented Office 365 or are considering the move, this is a session you don’t want to miss. Organizations who transition to Office 365 as part of a hybrid strategy experience a common set of management challenges. Many struggle to effectively manage privileges in both their Azure AD and on-premises Active Directory. The fact is that challenges around user provisioning, policy enforcement, and governance can prevent you from realizing the full value of your hybrid approach – and open your organization up to unnecessary risk. This session will describe five ways that you can more efficiently and securely manage your cloud and on-premises environment to get more return on your investment.

    Why attend this session?
    • Discover the most common challenges that accompany Office 365 implementations
    • Learn five steps that you can take to improve efficiency, security, and governance
    • Hear how Micro Focus can help you automate Office 365 management
  • Deploying Windows 10 with MDT and ZENWorks 2017 Update 3 Recorded: Oct 19 2018 72 mins
    Todd Laycock and Oscar Sanchez, Micro Focus
    This session will look at how to use the Microsoft Deployment Toolkit in conjunction with ZENworks 2017 Update 3 to deploy Windows 10 to your enterprise. This session will be presented by Todd Laycock and Oscar Sanchez, two of our most experienced engineers who are helping customers do this in their real-world environments.
  • Endpoint Management Roadmap Review Recorded: Oct 18 2018 64 mins
    Jason Blackett, Micro Focus
    Come and find out what’s happening in Endpoint Management at Micro Focus. This session will be presented by Jason Blackett and other members of the Product Management team. They will discuss the upcoming product roadmap for products including ZENworks, Service Desk, Desktop Containers and ZENworks Mobile Workspace.
  • Live Webinar: Enabling complete privacy protection from legacy to modern IT Recorded: Sep 20 2018 27 mins
    Simon Wilkinson, Anna Russell, Daniel Clift, Brendan Rizzo
    During this session, we’ll introduce you to modern-day data security challenges.

    You’ll learn how Micro Focus Voltage can help you to overcome these challenges, while also improving operational efficiency, compliance, and revenue generation.

    We’ll also share real-world examples of how Voltage has enabled the world’s leading organisations to:

    •Scale big data security, by protecting big data streaming into and beyond the data lake, allowing secure analytics to be enabled on protected data at massive scale

    •Reduce high cost of compliance for data protection regulations, by protecting card data immediately after capture and minimising PCI audit scope

    •Secure workloads to the cloud, by seamlessly protecting data consistently across hybrid IT infrastructure, accelerating new business models

    This live webinar will be presented by:

    - Simon Wilkinson, EMEA Cyber & Security Strategist, Micro Focus
    - Brendan Rizzo, Senior Sales Engineer, Micro Focus
  • Improving your ability to support mobile devices and apps with NotifyRDS Recorded: Sep 18 2018 37 mins
    Jason Blackett, Micro Focus and Paul DePond, Notify Technology
    How do you help your employees when they call your help desk and are having a problem with their mobile device or a mobile application? Have you ever wished you could just see what the user was seeing? We've heard from many of you that you need a solution that helps with achieving shorter problem resolution times for your mobile help desk team. This webinar introduces NotifyRDS, a mobile support solution from one of our trusted partners, Notify Technology. NotifyRDS delivers real-time screen viewing for iOS and Android (as well as remote control on some Android devices) with a simple application that can be deployed via ZENworks 2017 to your mobile devices or even used standalone. This is an opportunity to learn about NotifyRDS and how it can meet your needs.

    Join Jason Blackett, Micro Focus Director of Product Management for ZENworks – Endpoint Management solutions, and Paul DePond, President and Founder of Notify Technology, for a look at this solution.
  • Deploying multi-factor authentication on mobile platforms Recorded: Aug 29 2018 47 mins
    Brent Kynaston, TriVir LLC and Kent Purdy, Micro Focus
    Do you have mobile platforms in your organization? Are you interested in eliminating usernames and passwords on iOS, Android and Windows mobile devices and tablets?

    In this webinar you’ll learn:

    • How multi-factor credential enrollment and usage can be provisioned along with enterprise identity into the VMWare AirWatch, IBM MaaS360 and MobileIron environments as well as others
    • How to enable convenient access with tighter security and an improved experience for users and mobile developers alike
    • How easy it is to escape inefficient password processes, get away from resetting forgotten passwords, and enforcing strong passwords that are easily forgotten

    Register today to hear from Brent Kynaston, Principal Solutions Architect at TriVir LLC, a Virginia-based Identity and Access Management (IAM) integrator, and Kent Purdy of Micro Focus.
  • Key trends and application security risks from the 2018 AppSec Risk Report Recorded: Aug 28 2018 49 mins
    Alexander Hoole, Manager, Software Security Research, Micro Focus Fortify
    Fortify on Demand analysis shows broad vulnerability in apps. The majority of web or mobile applications we analyzed had at least one critical or high severity issue. Furthermore, 1 out of 2 apps had critical or high vulnerabilities not covered by the OWASP Top 10 2017.

    The biggest and most severe data breaches that have affected both the public and private sectors all operate at the application layer. That’s why it is important that organizations take a holistic view and include application security and vulnerability assessment as part of their software development program.

    In this webinar, we will share results from our recent primary research study that reveals:
    • The top application security risks
    • Where these risks originate
    • How to remediate these risks
    • Best practices to protect your business
  • Protecting your Endpoint Data with Connected MX Recorded: Aug 14 2018 61 mins
    Jason Blackett and Edward Gavin, Micro Focus
    If your CEO’s hard drive died today, could you recover his keynote presentation for tomorrow’s board meeting? Can you help a user recover this morning’s version of the spreadsheet they were working on and accidentally overwrote? Micro Focus Connected MX provides a great solution that allows you to back up critical data across all of your endpoint devices. Using ZENworks you can quickly and easily deploy the Connected agent and then use the powerful policy-driven backup capabilities to backup your critical business data on your Windows, Mac, Android and iOS devices. Join Jason Blackett, Director of Product Management and Edward Gavin, Connected MX Product Manager to find out how Connected MX can help augment the Secure Unified Endpoint Management capabilities of ZENworks to offer data protection for your enterprise estate.
  • Understanding and Troubleshooting ZENworks Inventory Recorded: Aug 8 2018 61 mins
    Bob Reynolds and Rekha Goyal, Micro Focus
    This session will go behind the scenes of ZENworks inventory capabilities, help you understand the best practices and how to troubleshoot issues that may arise with inventory.
  • How to manage and protect privacy throughout the data lifecycle Recorded: Jul 26 2018 39 mins
    Marcelo Delima, Product Marketing Manager-Security and Ali ElKortobi, Director, Product Management-IM&G, Micro Focus
    It has been said that 2018 is the year we lost our privacy. But regulators are enacting new legislation--or enforcing existing laws--to ensure that we gain our privacy back. This raises the stakes for enterprises around the world to improve data governance and protection throughout its lifecycle. Strategies for risk mitigation include an interlock of tools and techniques to improve information governance and protect data.

    The Micro Focus Data Privacy Manager is a comprehensive solution to address the privacy governance needs of enterprises. The solution enables customers with the ability to manage and protect sensitive structured data throughout its lifecycle, from discovery and classification to protection and reporting from a single pane of glass.
  • Using ZENworks to Secure your Windows Devices Recorded: Jul 24 2018 56 mins
    Darrin Vandenbos and Brent Beachem, Micro Focus
    ZENworks provides advanced security capabilities that allow you to protect your Windows devices from a common set of threats. This session, presented by our Security PM Darrin Vandenbos and our Security Architect Brent Beachem will look at often overlooked ways that ZENworks can help you secure your devices.
  • Code with Speed…and Security: Gamified Developer AppSec Training (2018) Recorded: Jul 16 2018 38 mins
    Matias Madou, Ph.D., Co-Founder and CTO, Secure Code Warrior and Dylan Thomas, Sr. Product Manager, Micro Focus Fortify
    Delivering quality code on time and on budget is one of the biggest challenges of organizations worldwide. With evolving cyber security threats, security became a top of mind concern for board rooms and an essential KPI for development/testing. Since fixing security related (or any) issues later on in the software lifecycle is highly inefficient, the best approach is to blend security early on in the development/testing processes. One of the key methods of having fewer vulnerabilities in the code is through not introducing vulnerabilities in the first place. This requires increasing the security knowledge and awareness of developers through secure code development training.

    Fortify on Demand offers application security as a service with integrated secure development, security testing and continuous monitoring making securing applications easy and scalable for organizations. As part of Fortify on Demand, we offer gamified developer training as a result of our partnership with Secure Code Warrior. Secure Code Warrior addresses the root cause of security vulnerabilities in applications by educating developers on how to apply secure coding techniques. Fortify on Demand (FoD) integrates with Secure Code Warrior, so developers can not only identify but also remediate vulnerabilities in application code in a gamified manner—this appeals to the gaming mentality of developers by providing a competitive element.
Leading Security, Risk and Governance Platform
With the industry’s broadest set of integrated Security, Risk, and Governance solutions, combined with deep domain expertise and industry-leading analytics, Micro Focus is uniquely suited to help organizations take a holistic approach to protecting identities, apps, and data. Very few vendors can assure security and governance professionals that they are protecting against breaches, guarding the privacy of individuals and their data, and complying with regulatory and jurisdictional regulations – at scale, with ease, insight and confidence. Visit Micro Focus Security, Risk, & Governance at: https://www.microfocus.com/en-us/trend/security-risk-governance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Converged Security - Protect your Digital Enterprise
  • Live at: May 24 2016 3:00 pm
  • Presented by: Gerben Verstraete, HPE, John Kindervag, Forrester
  • From:
Your email has been sent.
or close