Hi [[ session.user.profile.firstName ]]

Securing Virtual Environments Across the Enterprise and Cloud

Server virtualization promotes flexible utilization of IT resources, reduced capital costs, high-energy efficiency, highly-available applications, and improved business continuity. However, virtualization brings along with it a unique set of challenges around the management and security of the virtual infrastructure:

• How do you Secure VMWARE across the enterprise?
• How do you Protect your virtual infrastructure?
• How do you Control privileged users in a virtualized environment?
• How do you Integrate with your current security investment?

Technology alliance partners CA Technologies and HyTrust, Inc. have collaborated to further improve security and compliance for customers leveraging virtualized systems and cloud infrastructures with CA Access Control for Virtual Environments.

In this webcast, Todd Neilson, VP and Sr. Advisor, CA Technologies, and Eric Chiu, president and co-founder of HyTrust, Inc. will discuss how to extend visibility and control to your virtual and cloud environments, including how to:

• Control the Hypervisor and Guest Operating Systems
• Enforce privileged user control
• Extend security from physical to virtual platforms
Recorded Mar 15 2012 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Todd Neilson, VP, Sr. Advisor – North America, Security, CA Technologies, & Eric Chiu, President & Co-Founder, HyTrust, Inc .
Presentation preview: Securing Virtual Environments Across the Enterprise and Cloud

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Webinar: Cómo garantizar la seguridad en tiempos de trabajo remoto Recorded: Jun 4 2020 44 mins
    Alberto Vazquez. Solutions Architect Latinoamérica.
    Acompañenos a este webinar en el cual hablaremos de las diferentes soluciones de seguridad que son importantes en la época actual, para que su marca y su negocio estén protegidos contra los ataques de estos criminales cibernéticos. 
  • Webinar: Como garantir a Segurança nos tempos do home office? Recorded: Jun 3 2020 60 mins
    André Carraretto. Security Expert Broadcom Latinamerica
    Assista a este webinar no qual especialistas vão apresentar capacidades de segurança que são importantes nesta época, para que sua marca e seu negócio estejam protegidos contra os ataques cibernéticos.
  • Symantec Identity Management Product Roadmap Recorded: Mar 4 2020 55 mins
    Itamar Budin, Product Manager, Symantec Identity Management
    Learn about the upcoming planned features and future direction of the Symantec Identity Management product portfolio.
  • Symantec Access Management Product Roadmap Recorded: Feb 27 2020 57 mins
    Herb Mehlhorn, Head of Symantec SiteMinder
    Learn about the upcoming planned features and future direction of Symantec SiteMinder.
  • Symantec Privileged Access Management Product Roadmap Recorded: Feb 18 2020 47 mins
    Mike Dullea, Head of Symantec Privileged Access Management
    Learn about the upcoming planned features and future direction of the Symantec Privileged Access Management product portfolio.
  • Cybersecurity 101 for Digital Experience Professionals Recorded: Oct 21 2019 27 mins
    David Chiu
    An untold truth about digital is that the better the experience, the greater the risk. But based on our research, a large majority of enterprises admitted that their digital transformation efforts frequently traded security for a streamlined experience and quick time-to-market. Here's what business executives and non-security IT practitioners need to know about data and cybersecurity risks when planning, designing or deploying digital experience initiatives.
  • Digital Transformation - Identity at the Centre Recorded: Sep 26 2019 23 mins
    Grant Clements, Solution Engineer at Layer7
    We know that users expect highly personal interactions from businesses, but what makes a successful, identity-centric digital transformation? Understanding customers' identities is central to a positive user experience. This webinar highlights best in class examples of digital transformation with identity at the cente- and the associated risks.
  • Privileged Access Governance: Are You Certifying Privileged User Access? Recorded: Aug 26 2019 9 mins
    Mike Dullea
    Despite the numerous, headline-making incidents in recent years, cybercrime continues to rise while organizations must contend with an ever-increasing attack surface. Many types of attacks depend on stealing and exploiting privileged credentials and accounts. Organizations have recognized these dangers and are focusing their protection efforts in this area; but many are still failing to manage and govern their privileged users on an ongoing basis. In this session we will discuss how you can combine privileged access management and identity management technologies to enable organizations to manage and govern their privileged users more efficiently.
  • Facilitating Secure DevOps Recorded: Aug 19 2019 23 mins
    Herb Mehlhorn
    The unyielding demand facing all IT professionals today is to accelerate the ability to meet the needs of the business. Achieving that goal requires deploying applications for your internal and external constituents at a faster rate while meeting stricter and stricter compliance and security requirements. This webinar provides insight into how Layer7 SiteMinder can support that goal today and how it will evolve to simplify that support in the future.
  • How to Enable Trust, Interoperability, & Shared Credentials Recorded: Jun 21 2018 40 mins
    Ora Niknamfard, Product Marketing Manager Security at CA Technologies
    The promise of digital identity is to remove silos; minimize redundancies; facilitate better collaboration; and shape a foundation for regulatory compliance.
    The challenge with digital identity is that it requires shared credentials that force you to deliberately assess:

    • Managing physical access
    • Protecting PII
    • Delivering cross-agency services
    • Revising digital consumer interaction

    In this session, Ora Niknamfard, Product Marketing Manager Security at CA Technologies will share industry best practices to help ensure credentials are, in fact, interoperable. Plus, you’ll have a unique opportunity to explore the architectural measures that can manage identity assurance levels and identity verification for both logical and physical access.

    Implementing a digital identity strategy can be complicated. Let CA help.
  • How to Reduce Excessive Access for Highly Privileged Users Recorded: May 31 2018 41 mins
    Ora Niknamfard, Product Marketing Manager at CA Technologies
    Adopting privileged access management typically means forcing users to use named accounts instead of root and administrator accounts. As a result, the volume of privileged "named user" accounts in the enterprise is increasing. Fortunately, with effective role management and certification review, organizations can streamline and reduce excessive access.

    Join Naresh Persaud, Senior Director of Security at CA Technologies as he explains the challenge of privileged user governance, explores solutions, and presents a demo on how to manage privileged "named users."
  • Security at the Speed of App Development: DevOps Meets CA Single Sign-On Recorded: May 3 2018 61 mins
    CA Hosts: Herbert Mehlhorn, Product Management & Venky Karukuri, Sr Principal Architect
    For businesses and government organizations to succeed, development and security teams must quickly build, test, and deploy secure apps and features. The challenge presented by this DevOps process? Typically, there are only a few security teams to support many development teams.

    The good news? DevOps is not just for developers anymore. Join us as we discuss how CA Single Sign-On REST APIs can help security teams:
    • Confidently create, read, update, and delete policies
    • Easily move policies from dev to staging to production
    • Efficiently keep pace with development team practices

    We’ll also cover how to apply DevOps techniques to your infrastructure, allowing security teams to better prepare for releases, minimize downtime, and avoid costly upgrades.
  • Harnessing the Power of Digital Consumer Identity Recorded: Apr 26 2018 41 mins
    Naresh Persaud, Senior Director of Security at CA Technologies
    Today’s consumers do not want to wait on the phone for customer service. Today’s consumers do not want to fill out lengthy online forms to access information or resources. In short, today’s consumers’ time is valuable and not unlimited. As a result, every company is redefining its online digital experience to maximize customer engagement, enhance brand affinity, and increase consumer wallet share.

    This is your opportunity to learn how harnessing digital consumer identity can foster an effective consumer engagement strategy. Join Naresh Persaud, Senior Director of Security at CA Technologies as he shares case studies from multiple industries that are exploiting the power of digital consumer identity to build trust and make customer interaction frictionless.
  • Agentless Access Management: Can SiteMinder Do That? Recorded: Mar 27 2018 61 mins
    Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products
    Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.

    Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:

    •Securely address critical user productivity needs
    •Transform your approach to access management
    •Foster new collaboration between security and application development teams
  • Insider Threats – Enhancing PAM as Effective Countermeasure Recorded: Mar 22 2018 49 mins
    CA Hosts: Rob Marti, Privileged Access Management Director & Alexandra Beswerchij, Product Marketing Manager
    Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:

    • 90% of organizations feel vulnerable to insider threats
    • Over 50% have experienced an insider attack in the past year
    • 67% cite phishing as the prime concern of attacks

    Insider Threats are real. Be ready. Join CA hosts - Rob Marti, Privileged Access Management Director and Alexandra Beswerchij, Product Marketing Manager - to review the research and discuss how a layered and comprehensive Enterprise IAM approach enhances PAM to provides an effective countermeasure to both insider attacks and external actors.

    Exploit key security tactics and strategies.
  • Preparing for GDPR Compliance and Measuring Governance Recorded: Mar 15 2018 48 mins
    CA Technologies hosts: Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor
    Today, it’s estimated that 80% of companies are not prepared to comply with GDPR. The most challenging use cases are managing portability, conducting certification campaigns, and overseeing data access approval. Are you ready?

    Join CA Technologies hosts, Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor as they review:

    • How compliance requirements align with legislation
    • What data collection and analysis are required
    • Informative case studies on GDPR readiness

    What’s more, we’ll demo a dashboard for the Data Protection Officer to use for compliance reporting .
  • Threat Intelligence – Hype or Hope? Recorded: Mar 8 2018 53 mins
    Mark McGovern, Vice President, Product Management, CA Technologies
    As threats and attacks become more frequent, the alerts and alarms to be investigated become more unmanageable. Plus, by the time the warnings are checked, the damage may already be done. We need a new paradigm that moves the enterprise from reactive to predictive. Can user behavior analytics and machine learning deliver the threat intelligence that is needed, and if so, how do we start to use it?

    Join Mark McGovern, Vice President, Product Management, CA Technologies as he takes a closer look at threat intelligence and its unique capabilities. The session will uncover the:

    • Challenges and benefits of collecting the data needed to detect threats
    • Immediate value and risks posed by a shared threat intelligence model
    • Advantages of applying advanced machine learning to specific problems

    Whether you are new to cybersecurity or an experienced professional, threat intelligence should be on your “need to know” security agenda.
  • GDPR & Privileged Access Management … Are You Ready? Recorded: Mar 1 2018 56 mins
    Cullen Lemley, Cybersecurity Consultant at CA Technologies
    May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • The Network Effect: Leveraging the Power of Consortium Data Recorded: Feb 27 2018 51 mins
    CA hosts: James Rendell, VP, Product Management, Payment Security & Paul Dulany, VP, Data Science
    Today, consumers are using millions of devices to buy whatever, whenever, and wherever. However, this rapid evolution of e- and m-commerce has created a target for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions. So, how can you stay ahead of sophisticated cybercriminals, reducing CNP Fraud Losses by 25% or False Positives by 35%.

    Banks maintain a wealth of valuable data, take advantage of it. Join CA Technologies hosts, James Rendell, Vice President, Product Management, Payment Security and Paul Dulany, Vice President, Data Science to explore the benefits of CA Risk Analytics Network. This is your opportunity to learn:

    •How neural network models, machine learning & artificial intelligence can help financial services
    •How to unlock the unique data advantage that can prevent CNP fraud losses
    •How the “network effect” and real-time learning stop online fraud instantly
    •How to identify which techniques and technologies will be important in the future
    •How banks have improved their bottom line; insight from our case studies

    Webcast Hosted by ISMG
  • Insider Threats – Best Practices for Detecting and Preventing an Attack Recorded: Feb 22 2018 50 mins
    David Duncan, VP Security Marketing at CA Technologies
    Your biggest security risk may be inside your organization. Today’s most damaging threats don’t originate from criminal outsiders or malware but from insiders - both malicious and careless. So, are there preventative options?

    Join this candid discussion of cybersecurity experts – featuring David Duncan, VP Security Marketing at CA Technologies – as they reveal best practices to protect your organization and review key findings from the latest 2018 Insider Threat Report, including:

    • Why 90% of organizations feel vulnerable to insider attacks
    • How the use of behavior and data monitoring is accelerating
    • What popular technologies can help detect, deter and prevent insider attacks

    All registrants will receive a full copy of the new 2018 Insider Threats Report.

    This Panel Discussion is hosted by Cybersecurity Insiders
Discuss Strategies, Explore Trends
This channel covers Symantec Privileged Access Management, Symantec Authentication, Symantec Identity Management, and Symantec SiteMinder. We will focus on topics including identity, privileged users, access management and other top cybersecurity trends in the industry.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securing Virtual Environments Across the Enterprise and Cloud
  • Live at: Mar 15 2012 4:45 pm
  • Presented by: Todd Neilson, VP, Sr. Advisor – North America, Security, CA Technologies, & Eric Chiu, President & Co-Founder, HyTrust, Inc .
  • From:
Your email has been sent.
or close