Hi [[ session.user.profile.firstName ]]

CA Single Sign-On r12.52 – Extending Your Security Investment

As the dynamics of IT security continue to change, CA Technologies maintains its commitment and investment in the CA SiteMinder family. Following on the heels of the CASingle Sign-On 12.51 family release, we are pleased to announce CA Single Sign-On r12.52, which will continue to help you manage users’ access and single sign-on via a single, scalable and reliable platform. This webinar will highlight some of the new capabilities including the patent-pending Enhanced Session Assurance with DeviceDNA™, improved federation management, and enhanced OAuth to simplify deployment and reduce implementation times.
Recorded Nov 19 2013 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Chris Wraight, Director, Security Solutions and Aaron Berman, Security Solutions Advisor at CA Technologies
Presentation preview: CA Single Sign-On r12.52 – Extending Your Security Investment

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Agentless Access Management: Can SiteMinder Do That? Mar 27 2018 5:00 pm UTC 60 mins
    Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products
    Today’s CA Single Sign-On (SSO) solution is not the CA SiteMinder of yesterday. Yes, SSO continues to offer seamless access management services using traditional agents, but it also offers a new range of agentless approaches. So now, you can use single sign-on and access management for applications of all shapes and sizes.

    Join CA solution leaders − Herbert Mehlhorn, Product Management and Aaron Berman, SSO and Directory Products − to learn how agentless access management can help you:

    •Securely address critical user productivity needs
    •Transform your approach to access management
    •Foster new collaboration between security and application development teams
  • Insider Threats – Using Privileged Access Management as Effective Countermeasure Mar 22 2018 5:00 pm UTC 60 mins
    Rob Marti, Director of Privileged Access Management at CA Technologies
    Have you reviewed the 2018 Insider Threat Report from Cybersecurity Insiders? The results are dramatic:

    • 90% of organizations feel vulnerable to insider threats
    • Over 50% have experienced an insider attack in the past year
    • 67% cite phishing as the prime concern of attacks

    Insider Threats are real. Be ready. Join Rob Marti, Director of Privileged Access Management at CA Technologies to review the research and discuss how a layered and comprehensive privileged access management approach provides an effective countermeasure to both insider attacks and external actors.

    Exploit key security tactics and strategies.
  • Preparing for GDPR Compliance and Measuring Governance Mar 15 2018 4:00 pm UTC 60 mins
    CA Technologies hosts: Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor
    Today, it’s estimated that 80% of companies are not prepared to comply with GDPR. The most challenging use cases are managing portability, conducting certification campaigns, and overseeing data access approval. Are you ready?

    Join CA Technologies hosts, Ora Niknamfard, Security Product Marketing Manager and Rusudan Losaberidze, Security Advisor as they review:

    • How compliance requirements align with legislation
    • What data collection and analysis are required
    • Informative case studies on GDPR readiness

    What’s more, we’ll demo a dashboard for the Data Protection Officer to use for compliance reporting .
  • GDPR & Privileged Access Management … Are You Ready? Mar 1 2018 6:00 pm UTC 60 mins
    Cullen Lemley, Cybersecurity Consultant at CA Technologies
    May 25, 2018. It’s a date that is approaching quickly. It’s also the deadline for GDPR compliance. For companies that fail to comply, the cost can be high - as much as 4% of annual turnover.

    Note: There is a misconception is that the regulation affects only companies in the European Union. In fact, it applies to any company that has dealings or plans to have dealings with citizens that reside in the EU.

    Take the lead and get ready to initiate GDPR. Join Cullen Lemley, Cybersecurity Consultant at CA Technologies, for an overview of the impending regulations. Learn the important security facets of GDPR, the challenges for Privileged Access Management, and how businesses around the globe are preparing for the deadline.
  • Next-Gen Directory Services: How CIAM and IoT Drive Security & Performance Recorded: Feb 15 2018 38 mins
    CA Technologies: Clayton Donley, SVP Software Engineering, Security & Rob Lindberg, Sr Principal Product Mngr, CA Directory
    The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:

    • How are potential risks being monitored and secured?
    • How are users and devices being managed?
    • How are directory services being configured?

    Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.

    Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
  • Advanced Access Management for the Modern Enterprise Recorded: Feb 8 2018 37 mins
    CA Technologies hosts: Martin Yam, VP Authentication & Cloud Solutions, Carol Alexander, Senior Director, Security Products
    It’s a dilemma. Today, security must be built into mobile applications to fight rampant online fraud, but many App Developers don't have the necessary skill set … nor the time required to become proficient coders. What is the answer?

    Join CA Technologies hosts - Martin Yam, VP, Authentication & Cloud Solutions and Carol Alexander, Senior Director, Security Products - to learn how to quickly build and maintain modern, frictionless, and secure apps for your customers. It’s true. With CA Rapid App Security, developers can easily and rapidly:
    • Integrate device security and multifactor and risk-based authentication into apps
    • Eliminate dozens of complex steps, typically required for coding user and device security

    Let your developers focus on mobile applications requirements, while your business delivers a trusted user experience.
  • Show Me the Mandates! How to Interpret PSD2 RTS SCA / GDPR / 3DS 2.0 Recorded: Jan 25 2018 59 mins
    CA Technologies Payment Security gurus, Product Management Advisor Jayakuma & Presales Director Matt Berryman
    Recently, there have been several payment industry initiatives designed to make electronic payments safer. Consequently, financial entities like merchants, PSPs, and consumers will soon face many changes. Although the initiatives’ premise − to eliminate vulnerabilities in the payments cycle − is welcome; businesses must now prepare to comply. Are you ready?

    Join our CA Technologies Payment Security gurus, Product Management Advisor Jayakumar Krishnasamy and Presales Director Matt Berryman to find out:
    • How to interpret the recent payment initiatives
    • If risk-based authentication satisfies mandates
    • Which strong authentication methods are compliant
  • From Where You Are to Where You Want to be with 3DS 2.0 Recorded: Jan 18 2018 23 mins
    Hannah Preston, Solution Strategist, Payment Security, CA Technologies
    3-D Secure 2.0’s impact on the financial industry will be one of the most significant in recent years. Built around the increasing popularity of mobile commerce, 3-D Secure 2.0 is predicated on risk-based authentication, leveraging data points for accurate verification, while optimizing the consumer experience.

    But, what about migration? How do you get from where you are to where you want to be? It’s time to fine-tune your authentication strategy. Join Hannah Preston, Solution Strategist, Payment Security at CA to learn how to:

    • Design the best payment security architecture for your business
    • Exploit the power of a consistent device identity across online channels
    • Incorporate a global network of devices to shut down fraud fast
  • CA Briefings Part 2: How to Control Risk & Enable Trust in the Digital Economy Recorded: Jan 11 2018 61 mins
    Speakers - David Duncan, VP, Security, CA Technologies; Brandon Dunlap, Moderator
    The application economy is altering the way we live, work, and interact. As a result, organizations are transforming the way they provide services to customers, employees, and partners. But no matter how these services are accessed, a fundamental concern remains: How does an organization protect sensitive data, while still allowing a frictionless and enjoyable user experience?Join David Duncan, VP, Security of CA Technologies and (ISC)2 on Thursday, January 11, 2018 at 1:00PM Eastern for examination of the cybersecurity risks that can result from application development and what it takes to future-proof business trust.
  • Insider Threats: Exclusive Peer Perspectives, Strategies and Tactics Recorded: Dec 12 2017 53 mins
    Rob Marti, Director of Privileged Access Management, CA Technologies
    Discover the trends and opinions about insider threats that your peers have revealed in the recently published Cybersecurity Insiders report.

    Join Rob Marti, Director of Privileged Access Management at CA Technologies, as he guides you through the report and examines technologies and preventative measures.

    Selecting the right insider threat solution is a pivotal decision; make sure you know your options.
  • CA Briefings Part I: Privileged Access Management in a DevOps environment Recorded: Dec 7 2017 59 mins
    Steven McCullar, Advisor, Solution Strategy, CA; Scott Willson, Product Marketing Dir, Release Automation, CA; B. Dunlap,
    Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.
  • How to Use Attack Path Mapping to Prescribe Security Controls. Hosted by ISACA Recorded: Dec 5 2017 64 mins
    Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies
    A new technology has emerged called Attack Path Mapping (APM). APM lets you evaluate the probability of the hacker kill chain and quantify the risks, significantly reducing risks through more effective controls.

    Join Ed Parsons, Associate Director at MWR InfoSecurity and Naresh Persaud, Sr. Director of Security at CA Technologies as they share how APM can help companies think like a hacker, leveraging insight to resolve vulnerabilities.

    What’s more, find out how Scotia Gas Network and National Center for Cyber Security are successfully employing Attack Path Mapping … today.
  • Securing Identities & Earning Consumer Trust in the Mobile Commerce World Recorded: Nov 30 2017 62 mins
    Al Pascual, Research Dir, Javelin Strategy & Research & Carol Alexander, Sr Dir, Digital Payments Security, CA Technologies
    Mobile is increasingly becoming a part of every consumers’ identity. In fact, it has proven to be at the center of consumers’ financial lives, providing a boon for financial institutions. However, the increasing use of this digital channel is escalating the security risks faced by consumers and institutions.

    Join Javelin Strategy & Research and CA Technologies to learn about such advances in authentication as, real-time behavioral analytics, machine learning, and 3-D Secure 2.0. Advancements that are designed to secure accounts and payments, without overburdening consumers with a friction-laden experience.

    Explore:
    •How the confluence of mobile banking and payments is influencing future standards
    •How consumer expectations are evolving with their mobile channel experiences
    •How financial institutions and service providers should be securing their accounts
  • Adaptive Thinking: How Capital One Combats Fraud Recorded: Nov 16 2017 40 mins
    Dave Laramy, Director of Fraud Strategy, Capitol One & Hannah Preston, Solution Strategist, Payment Security, CA
    Capital One is a Top 10 credit card issuer in the UK and is recognized as an award winner for its exceptional customer experience. The team's philosophy to continually try new things, allows them to successfully balance tighter fraud prevention and increased customer satisfaction. In fact, Capital One readily adopted the CA Payment Security Suite to help ensure that balance.

    Join Dave Laramy, Director of Fraud Strategy at Capital One and Hannah Preston, Solution Strategist, Payment Security at CA as they share tactics to eliminate legacy fraud controls and embrace more efficient ways to battle the bad guys with intelligent data and authentication.

    Tune in and explore how to:
    • Implement best practices and strategies for leveraging data and authentication
    • Improve fraud prevention and the checkout experience with 3DS 2.0
    • Prepare for regulatory changes, scheme mandates, and future transformations
  • Using Managed Security Services? You Need Identity Management! Recorded: Nov 9 2017 56 mins
    Naresh Persaud, Sr. Dir. Security, Prod. Mgmt. CA; Greg Shanton, VP Cyber Security, Neovera; B. Dunlap
    Set to double in the next two years, the managed security services market is being driven by the rising cost of security. One MSP found the formula for success by using Identity Management not only to streamline internal security controls but to also help customers reduce risk. If you are using or planning to use managed security services, join CA and (ISC)2 on November 9, 2017 at 1:00PM Eastern to discover the security requirements that require identity and access. We'll discuss use cases managed security companies are addressing and provide insight on how best of breed companies are adapting.
  • CA PAM 3.0.1 - What's New Recorded: Nov 2 2017 39 mins
    Mike Dullea, Senior Director of Product Management for PAM. CA Technologies
    The recently updated CA Privileged Access Manager provides a simple, secure, and scalable Privileged Access Management capability that organizations can use to meet their current and evolving needs. The release includes:

    • Graphical redesign of the user interface to provide consistency, improved usability and a modernized look
    • New management console to offer greater visibility into clustered environments for large multi-department and Managed Service Provider (MSP) environments
    • Augmented session recording, encryption and crypto module enhancements to support deployments of all sizes
    • And more

    Please join Mike Dullea, Senior Director of Product Management for PAM at CA Technologies, as he guides you through many of the new use cases in this release and demonstrates the enhanced user experience.
  • A Crisis of Trust: The Vulnerabilities of Usernames & Passwords. Recorded: Nov 1 2017 43 mins
    David Duncan, Vice President, Product & Solutions Marketing, Security, CA Technologies
    ***Security Alert: Unusual Activity Detected. Your company has suffered a data breach.***

    In today’s brave new world, where the Internet is used for everything from finance to heathcare, traditional usernames and passwords are, in fact, reckless. If we want to erase Hacker Headlines, we need a new model of Trust for Digital Identities.

    So, what’s the answer? Join David Duncan, Vice President, Security at CA Technologies, to discuss:
    • Risks posed to your business by legacy authentication
    • Problems inadvertently created by human behavior
    • New model for digital identity that leverages user Digital DNA and risk analytics

    Let us show you how CA Technologies can help you reduce identity theft and fraud, while building sustainable online Trust.
  • Business Insight: How to Interpret the Gartner Market Guide for PAM Recorded: Oct 19 2017 36 mins
    Suresh Sridharan, Director Privileged Access Management, CA Technologies
    The Gartner 2017 Market Guide for Privileged Access Management (PAM) reviews 24 vendors across various categories. This comprehensive information can help you find an ideal solution for your unique business needs. Yet, selecting the right PAM solution is a pivotal decision; it is critical to weigh your options.

    Make an informed decision. Join Suresh Sridharan, Director Privileged Access Management at CA Technologies, as he guides you through report recommendations, evaluates the latest tools and technologies, and compares and contrasts industry choices.
  • PSD2 and 3-D Secure 2.0: Setting New Standards - Hosted by PYMNTS.com Recorded: Oct 18 2017 60 mins
    Michael Sass, Mastercard; James Rendell, CA Technologies
    The Payment Industry has seen its fair share of innovation, but there’s never been a more exciting time for Payments than now. New technology is everywhere – Selfie Pay, Tokenization, Biometric Authentication. And with new technology, there is the inescapable need for advanced security.

    In fact, several global initiatives have surfaced to make electronic payments safer – including PSD2 and 3-D Secure 2.0. This means big changes for banks, merchants, PSPs, and consumers. Are you prepared?
    Join industry leaders from Mastercard and CA Technologies for a straightforward look at how to take advantage of these innovations. You’ll be briefed on:
    • Regulatory technical standards on strong customer authentication
    • Best practices to reduce abandonment rates and fraud
    • Key dates, choices, and planning considerations to implement the new protocols

    Host: Karen Webster, CEO, PYMNTS
    Guests:
    • Michael Sass, Vice President, Market Product Management, Security Solutions, Europe, Mastercard
    • James Rendell, Vice President, Product Management, Payment Security, CA Technologies
  • A NIST Guide on How Identity Management is Reshaping Cyber Security Recorded: Oct 12 2017 60 mins
    Bill Newhouse, Deputy Director, NICE; Naresh Persaud, Sr. Dir. Security; Prod Mktg, CA; Spencer Wilcox; Brandon Dunlap
    Did you know that 80% of data breaches implicate lost, stolen and weak credentials, as well as excessive access as culprits? NIST’s National Cybersecurity Center of Excellence (NCCoE) is helping companies better understand how to apply standards-based, commercially available technologies to improve their cybersecurity posture. The NCCoE’s security control mappings, reference designs, and lab implementations can be used as roadmaps or checklists for organizations looking to bolster their cybersecurity programs. Join CA and (ISC)2 on October 12, 2017 at 1:00PM Eastern for our ThinkTank where our expert panel will take an in depth look at how Identity Management is shaping the recommendations and requirements for the next generation of cyber security controls.
Discuss Strategies, Explore Trends
CA Technologies’ end-to-end identity and access management Security Solutions give you the freedom to connect everyone to everything from everywhere—along with the confidence that your critical corporate data is still safe and secure.

Join us for informative security discussions and technical insights led by CA Security leaders and third-party experts. We’ll cover topics around identity, privileged users, payment security, access management and other top cybersecurity trends in the industry.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: CA Single Sign-On r12.52 – Extending Your Security Investment
  • Live at: Nov 19 2013 6:00 pm
  • Presented by: Chris Wraight, Director, Security Solutions and Aaron Berman, Security Solutions Advisor at CA Technologies
  • From:
Your email has been sent.
or close