Getting an Application Security program started takes a cultural shift, process changes, and a set of tools that don’t disrupt the speed and innovation of your software team. While many organizations have begun their AppSec journey, scaling those efforts from just a few applications to possibly thousands of applications per day come with a completely new set of challenges and issues. How can your organization make this transition from few to many with the current security resources, tools and expertise you have?
Join Micro Focus Fortify in this webinar, “Keys to Scaling an AppSec Program” to learn:
• The challenges in Scaling AppSec
• Common mistakes made by organizations today
• The keys to success in scaling
• How Fortify assists organizations grow and mature their AppSec programs
RecordedMay 12 202059 mins
Your place is confirmed, we'll send you email reminders
Steve Piper, CEO, CyberEdge Group and Mark Fernandes, Chief SecOps Strategist, Micro Focus
The upcoming 2020 State of Security Operations Report, with insights collected from over 400 IT security professionals across the globe, will offer a unique perspective into how security operations has changed during this unusual year.
Join us for this webinar with CyberEdge Group CEO Steve Piper and Micro Focus Chief SecOps Strategist Mark Fernandes as they discuss the results of the report, with a particular focus on people, processes, business perspective, and technology. We’ll also cover MITRE ATT&CK usage, cloud security migration, and the unique SecOps challenges brought on by COVID-19.
Paolo Balboni - EU ICT, Privacy & Data protection lawyer at ICT Legal Consulting/Daniel Clift - INTL Lead Data Privacy
In a globalized digital world, purely national thinking is no longer enough. The flow of data across national borders has become a matter of course and happens in seconds. When the EU-US Privacy Shield was put into effect in 2016, data exchange with the US was placed in a stable state. Now, however, the European Court of Justice (ECJ) has overturned the agreement, with immediate effect.
This means that data exchange with the US is not permitted in many cases, so the time has come for international companies to act. After all, businesses worldwide depend on a functioning international data exchange and, thus, corresponding data protection. How can you:
•Continue to share data with business partners in the US while reducing regulatory risks?
•Protect your sensitive data and at the same time not restrict your business partners in their work?
•Use cloud platforms and CRM systems from US companies more securely?
The answer? Encryption!
Join this exciting webinar with data privacy experts to learn how your organization can safely navigate international data exchange. We’ll walk you through practical, relevant use cases to discover answers and the actions you can take:
•What are the immediate and long-term consequences of the ECJ ruling
•What the data protection authorities require, which data you should protect, and how
•How encryption can help you meet legal requirements
•How encryption must look to meet your business needs
Andras Cser, VP, Principal Analyst, Forrester and Gireesh Kumar, Sr Product Manager, NetIQ Access Management, Micro Focus
With so much sensitive information being consumed by remote users, most organizations have some level of an access control strategy in place. Setting access control right is very hard and often results in poor user experience. While the array of potential device and network options used for access creates various blind spots, the one constant metric is the user's behavior. But effective access control is more than having the raw user metrics, but rather leveraging a solution that is simple to set up, use and maintain.
Join us for this webinar on Wednesday, October 7th, to learn about intelligent access control:
• Andras Cser of Forrester will kick off the discussion with real-world examples and observations illustrating why user context needs to play a central role in managing access, and then how User and Entity Behavioral Analytics (UEBA) helps achieve it.
• Gireesh Kumar will explain how Micro Focus can automate the assessment of behavioral analytics that finds high-risk access, invokes a higher level of identity verification and/or adjusts the user’s current authorization based on the risk at hand, all in a model that is easy for IT and security teams to apply to their environments.
Anthony Knight, Voltage Product Manager and Chip Charitat, Voltage Specialist, Micro Focus
With the mounting weight of legal and regulatory mandates, the need to ensure data security and governance amidst rising volumes of data has become a top priority for IT leaders and the C-suite. Organizations are struggling to gain control of their data, ensure that it’s secure, obtain greater insight into customer needs, address compliance and enhance overall productivity.
Micro Focus SmartCipher introduced simplified unstructured data security, delivering control over the use and proliferation of sensitive files for secure collaboration and improved privacy compliance. SmartCipher’s latest release enhances this art form by integrating with SecureMail to encrypt and inspect email content and attachments with SmartCipher policies.
Join us on this webinar to find out more how Micro Focus can help you:
• Encrypt and inspect email content and attachments with SmartCipher policies
• Ensure security and governance over your identities, applications and data—from creation to disposition and throughout the information lifecycle
• Encrypt data persistently wherever it is—in applications, databases, analytics, the cloud and files on the network and endpoint
Andrew Garrett, Rick Smith and James Rabon, Micro Focus
Did you know that the combination of static (SAST) and dynamic (DAST) application security testing methodologies provides a more comprehensive view of an application’s risk posture? Static analysis tools give security teams thorough feedback early in the SDLC, while dynamic analysis tools provide a quick win by immediately discovering exploitable vulnerabilities in either production or pre-production environments. Testing in both ways yields the most complete view of the risk posed by weaknesses and vulnerabilities within the application.
Join members of the Micro Focus Fortify team to discover five reasons why SAST + DAST is vital to a successful, comprehensive Application Security program.
Charles Davis, Full Armor Corp and Tim Sedlack, Micro Focus
Organizations must enforce security policies, configuration, and access controls consistently across their entire infrastructure, but the complexity and hybrid nature of today’s IT environments introduces new challenges. Brand new policy management solutions from Micro Focus can help.
AD Bridge extends AD controls to Linux, UNIX, and cloud resources; Policy Compliance Assessor checks cloud readiness and migrates GPOs to Azure Intune, while Universal Policy Manager helps consolidate and simplify enterprise and cloud policy management.
Attend this session to learn about these innovative and transformative solutions.
Charles Davis, Full Armor Corp and Tim Sedlack, Micro Focus
Would you like to eliminate manual, fragmented management processes and scripts by unifying how you manage authorization and authentication across your entire environment?
Securing and maintaining a Day 1 desired state configuration of your Linux, UNIX, Mac and Non-domain joined Windows servers that are on-premise and in the cloud can be extremely challenging. Micro Focus AD Bridge is ‘Next Generation’ bridging. It natively joins a variety of resources to Active Directory so that they are managed just like your Windows servers without replicating users or requiring VPN. AD Bridge extends Group Policy with extensive settings (firewall, SSH, HTTP, FTP, IPTables, sudoers, services, config files, and more) so that your IT Managed Resources are configured, persisted, monitored and audited for compliance regardless of their location.
This webinar will provide key information on AD Bridge and real life customer examples.
Michael Mychalczuk, Dir. Product Mgmt, Security Operations and Eugenio Marrero, Sales Engineering Mgr, Micro Focus
ArcSight turns 20 this year! The cybersecurity industry has experienced non-stop growth and change over the last two decades, and security solutions like ArcSight have continually worked to evolve and adapt to these changes.
Join ArcSight Specialist Gene Marrero and ArcSight Commander Mike Mychalczuk as they discuss the journey of SIEM and what lies ahead for SOC teams as they strive to advance their threat detection and response capabilities. It’s an hour you don’t want to miss as we look back on 20 years in security, and unveil the latest and greatest of our upcoming ArcSight 2020 release.
Remote work is increasing worldwide as a result of Covid-19. According to a recent survey of CFO’s by Gartner, 74% of respondents plan to shift more employees to remote work permanently. The shift to less secure and controlled home work environments puts more business critical information at risk of loss to ransomware attacks, insider threats, device loss or theft.
Join Micro Focus to discuss these challenges and to learn how a policy based enterprise endpoint backup and recovery strategy can ensure that your organization’s valued information is always protected from data loss enabling you to embrace remote work with confidence.
Dennis Wild, Senior Product Manager - Supervisor and Howard Konopka, Business Consulting, eDiscovery, Micro Focus
Organizations across a variety of verticals face increasingly complex regulatory environments. Bodies such as SEC, FINRA, and IIROC in addition to privacy regulations like CCPA and GDPR require strict supervisory retention and review plus precise processes to meet requirements. Many organizations leverage supervision technology to ensure compliance with internal requirements. This is complicated by exponential data variety, growth, and velocity.
Attend this webinar and learn how you can scale to facilitate a comprehensive solution to align with your compliance processes and procedures.
David Gould, Senior Director, Secure Content Management Solutions, Micro Focus
True artists understand the skill of editing their work—leaving only what is essential to convey their message. Data security experts must also know how to edit the exponential amount of data they collect. They must understand complex data privacy laws, know what data has privacy implications, and delete the data that isn’t needed in order to comply. This challenging new paradigm means organizations must rethink how to effectively manage their data through a defined lifecycle. Join our webinar to learn how Micro Focus solutions help ensure compliance, support legal requirements, and manage the lifecycle of your data from creation to deletion
Artists take their creations through lifecycles to present important messages—even the selection of the final frame can make a difference. So, too, must organizations understand effective data management to maximize its business value, preserve data integrity, meet regulatory requirements, and reduce risk. This includes finding and analyzing key business and customer data and increasing the visibility into structured and unstructured data. Careful data lifecycle management is key to protecting your reputation, improving security, becoming more efficient, and maintaining regulatory compliance. Micro Focus solutions help customers around the world address data governance to enable greater speed, agility, and insight. Join this webinar to discover how we can help you achieve these benefits, too.
Gireesh Kumar, Sr Product Manager, NetIQ Access Management & Stephan Jou, Interset CTO, Micro Focus
As organizations elevate their security to Zero Trust level, maintaining or even improving the user’s experience remains paramount. Learn how the NetIQ Risk Service brings user and entity behavior analytics (UEBA) with out-of-the-box machine learning models. Using Micro Focus Interset powered machine learning, IT security teams now have access to personalized security to build individualized context. Organizations can use this level of personalized security to keep friction low for users accessing sensitive information while protecting themselves from malicious outsiders attempting to exploit it.
The NetIQ Risk Service is the new central point of risk evaluation and scoring for the NetIQ product line.
Ramses Gallego – International Director, Security, Risk & Governance – Micro Focus
Periods of great change can produce great art. When looking at business, an increasing pressure around data (the amount collected, its security, and governance) is contributing to great business transformation. Data privacy and protection means you need new ways to control and secure customer data. And at the same time, you want to gain greater insight into your customers, ensure compliance, and enhance your overall productivity. Join us to find out how Micro Focus offers simplified, automated solutions that can provide security and governance over your identities, applications, and data—from creation to disposition and throughout the information lifecycle.
Reiner Kappenberger, Product Management Director, Data Security, Micro Focus
As a professional “security artist,” you understand the need to master the necessary tools, technologies, and processes to enable protection and usability for your data. You also know the importance of delivering efficient, consistent, and secure access to your most valuable corporate assets. As with any art form, the critical first steps are to choose a subject and composition—that is, to establish the framework and find a leading thread that ties the disparate elements into a consistent whole. While many security professionals start at the network and take a layered defense approach, those who are cybersecurity focused work in the opposite direction and start at the data layer. Join us for this webinar to learn how to close the gaps and unify your data security. You’ll discover how to encrypt data persistently wherever it is—in applications, databases, analytics, the cloud, and files on the network and endpoint—from creation to disposition and throughout the information lifecycle.
Stephan Jou, Interset CTO, Micro Focus and Shawn Wells, VP of Global Solution Architecture, CrowdStrike
Insider threats are difficult to combat, and even harder to detect. Today, data breaches cost an average of USD $3.92 million, and roughly 1/3 of those breaches are due to insider threats. Whether out of negligence or malice, the bad actors within your organization are putting your data at risk. With billions of events, a plethora of entities, and vast attack vectors, organizations are now faced with a lack of visibility and control when it comes to insider threats, leaving them vulnerable to attacks.
How can you best detect, react to, and mitigate insider threats in your organization? It comes down to leveraging the right endpoint data with unsupervised machine learning to find what may otherwise go unseen.
Join industry and subject matter experts, Stephan Jou, Interset CTO and Shawn Wells, VP of Global Solution Architecture, CrowdStrike on June 29 to get an inside look at how you can defend against insider threats with Interset and CrowdStrike.
Brent Jenkins, Jimmy Rabon and Dylan Thomas, Micro Focus
The Micro Focus Fortify 20.1 release, available now, provides a continued march towards the key strategic initiatives of the product suite with accelerated language support, providing end users with actionable results, continuing to expand our open source solution with Sonatype, hybrid delivery methods and shifting application security left. These initiatives and updates to the products support why Fortify was not only named a leader in the Gartner Magic Quadrant for Application Security Testing for the 7th consecutive year, but also named #1 for Enterprise organizations in Gartner’s Critical Capabilities report.
In this webinar we will cover the newest and best features of Fortify Software Security Center, Fortify Static Code Analyzer, Fortify WebInspect, and Fortify WebInspect Enterprise. These added features, along with the current capabilities, prove why Micro Focus Fortify leads the market for Application Security.
Stephen Cohen, Senior Systems Engineer, Micro Focus
Microsoft Office 365 offers customers a wide range of products and services with one monthly subscription fee. However, their one size fits all approach to digital archiving and compliance might not be suitable for everyone.
Join this webinar to learn:
• How Micro Focus Retain Unified Archiving and eDiscovery can augment governance across all your digital communications
• Provide coverage across more internal, mobile, and social communication platforms
• Decrease costs and improve usability and performance for multiple user bases
Andras Cser, VP, Principal Analyst, Forrester, Kent Purdy, Product Marketing & Troy Drewry, Sr Product Mgr, Micro Focus
As an organization's hybrid-cloud environment continues to expand far and wide beyond their control, the need for a zero-trust model is becoming mandatory. This higher level of digital security morphs identity verification from onetime event to a model where nothing consuming protected information is trusted by default.
In this webinar, Andras Cser, VP, Principal Analyst with Forrester, and Kent Purdy and Troy Drewry of Micro Focus discuss how the zero-trust security model has forced a new paradigm onto authentication implementations as well as best-practices to secure all of your environment.
Of course, criminals and other malicious actors are taking advantage of COVID-19. Of course. Anything is fair game to this crowd of bad actors. On top of dealing with unprecedented numbers working from home, Security Operations now must deal with the most unscrupulous group who are ramping up their attacks and targeting some of the most vulnerable amid the chaos.
When a change of this magnitude happens, you hope you’re set up to adjust, and fast. If you don’t, either your workforce is caught flat-footed, or you’re vulnerable.
These are both bad outcomes.
That’s why speed and agility are not just for Olympians (who will sadly miss the 2020 games - here’s hoping it’s just a one-year delay!). If you have the right technology setup, where it requires minimal overhead and gives the most flexibility, you give yourself a fighting chance to adjust quickly and safely, keeping folks working remotely where possible, and minimizing business slowdown.
Join Jeremy Lahners and Mario Daigle as they talk about the current Security Operations climate, new attack methods that are emerging, maybe do a little venting, and share ideas from successful customers that have managed to stay safe and productive.
With the industry’s broadest set of integrated Security, Risk, and Governance solutions, combined with deep domain expertise and industry-leading analytics, Micro Focus is uniquely suited to help organizations take a holistic approach to protecting identities, apps, and data. Very few vendors can assure security and governance professionals that they are protecting against breaches, guarding the privacy of individuals and their data, and complying with regulatory and jurisdictional regulations – at scale, with ease, insight and confidence. Visit Micro Focus Security, Risk, & Governance at: https://www.microfocus.com/en-us/trend/security-risk-governance.