Hi [[ session.user.profile.firstName ]]

5 Reasons to Secure your Citrix Environment with Gemalto SafeNet Authentication

The five reasons presented will be:
• Fast deployment – With out of the box integrations, showing the different integration methods.
• Low day-to-day operational overhead – via automated lifecycle admin, self service, alerts, multi-tier architecture, etc.
• Convenience/assurance levels - Broad range of methods offer convenience and varying levels of assurance.
• Extensibility – broad ecosystem support lets you fully, centrally manage strong authentication from a single point of management, with no need for additional components and servers, etc.
• Cost – optional cloud efficiencies, software-based tokens, flexible subscription-based pricing, migration options, etc.
Recorded Sep 17 2015 35 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mor Ahuvia - Product Marketing Manager, Authentication, Gemalto
Presentation preview: 5 Reasons to Secure your Citrix Environment with Gemalto SafeNet Authentication
  • Channel
  • Channel profile
  • Are you Ready for DFARS? Sep 27 2017 3:00 pm UTC 60 mins
    Eric Avigdor, Director of Product Management at Gemalto
    With the deadline for DFARS (Defense Federal Acquisition Regulation Supplement) quickly approaching, many business are scrambling to meeting compliance requirements. An important part of DFARS addresses the need for strong, two-factor authentication, as well as physical access controls to organizational information systems, equipment, and the respective operating environments to authorized individuals.
    Are you prepared? If you’re like many other government contractors and subcontractors, a little advice may be needed to navigate the waters of physical and user access controls.
    Gemalto’s Identity and Protection expert, Eric Avigdor, will be present and informative look at DFARS and what options are available to ensure compliance. What Eric will discuss:
    •Overview of DFARS mandate
    •Use cases – our experience from the field
    •Comprehensive solutions that meet the multi-factor authentication and physical access controls required by the DFARS mandate
    •Mapping solutions to the needs of your department
  • The Blockchain Bubble: Identifying viable opportunities for blockchain Sep 26 2017 3:00 pm UTC 60 mins
    Joe Pindar, CTO Office Director of Strategy
    Blockchain technology is popping up everywhere from the currency market to smart contracts. The growth in the technology is evident from the investments being made, for example, PwC estimated that in the last nine last nine months of 2016, $1.4 billion had been invested globally in blockchain startups. This stems from its potential to enable efficiencies and cost-saving opportunities based on moving to a decentralized approach and away from the current centralized systems. With all the hype around blockchain, companies need to cut through the hype and ask the question - when does blockchain actually make business sense?

    Blockchain is not a silver bullet and cannot solve every problem. There is also the added complexity of managing the security of many distributed nodes can only be justified by gaining business benefits from using blockchain. In this webinar, we will look at a business qualifying approach to blockchain to help you evaluate valid blockchain use cases and identify the security needs surrounding blockchain operations. Join us to learn more on:
    •Securing blockchain from the edge to the core
    •The operational benefits and pitfalls of blockchain technology
    •Our 4 step qualification process for blockchain business opportunities:
    1.Is there an established business process?
    2.Are there more 3 parties involved – i.e. is it a distributed problem?
    3.Is it important that the data being exchanged is trusted and considered to be factually accurate?
    4.Would automation improve the performance of the process?
  • What is an Identity Provider (IdP) and Do You Need One? Recorded: Aug 23 2017 47 mins
    Stephen Allen, Authentication Expert at Gemalto
    The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.

    Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:

    •Cloud Single Sign-On for easy access to cloud apps
    •Regulatory compliance with standards such as PCI DSS
    •Reduced identity lifecycle overheads
    •Centralized management of cloud access policies
    •Increased security with step-up authentication
  • Securing India's Aadhaar Numbers as per UIDAI's Mandates Recorded: Aug 11 2017 60 mins
    Nanda Mohan Shenoy, CAIIB, CISA - Bestfit Business Solutions and Prasun Srivastava - Solution Expert, IDP, Enterprise & Cyber
    The India's Unique Identification numbers (UIDs), also named "Aadhaar numbers" contain Personally Identifiable Information (PII), the Unique Identification Authority of India (UIDAI) has mandated that the private cryptographic keys used to digitally sign and authenticate the UIDs must be stored in a Hardware Security Module (HSM).

    In addition to HSMs, the UIDAI has also mandated the use of tokenization – replacing sensitive data with a token that can be securely stored, processed and transmitted as of August 2017.

    Join this live webinar to know more about how to easily conform to the mandate:
    •What is UIDAI's requirements?
    •Why HSM and tokenization?
    •How to ensure Aadhaar numbers are protected?
    •What makes Gemalto's SafeNet Luna HSM and KeySecure unique?
    •How to meet UIDAI's compliance mandates?
  • 6 steps to GDPR compliance Recorded: Aug 1 2017 61 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, Jan Smets, Certified Data Protection Officer, Gemalto
    The introduction of GDPR is set to bring data protection to the top of businesses’ priority lists. So how can businesses ensure they are compliant and what steps do they need to take?
    In this webinar, certified DPO Jan Smets with provide a six-step overview to help achieve compliance:

    1) Understand the GDPR legal framework
    2) Create a Data Register
    3) Classify your data
    4) Start with your top priority
    5) Assess and document additional risks and processes
    6) Revise and repeat
  • Getting Ready for Australia’s Privacy Act Amendment (Notifiable Data Breaches) Recorded: Jun 29 2017 58 mins
    Helaine Leggat, an legal expert in data protection regulations and Graeme Pyper, Regional Director at Gemalto
    The Gemalto’s Breach Level Index reported 1.4 billion data records compromised worldwide in 2016, up 86% from 2015. Closer to home, there were 44 & 16 voluntarily reported breaches in Australia and New Zealand respectively. With the new Privacy Amendment (Notifiable Data Breaches) Act 2017 in Australia, these numbers are expected to increase dramatically as organisations are required to declare any “eligible data breaches”.

    Navigating these regulations such as the Australian Privacy Act and European General Data Protection Regulation (GDPR) and the impact they will have can be daunting. Organisations must start planning ahead to mitigate the potential risks of being non-compliant. The implications of a data breach can go beyond compliance. In 2014, the Target breach had a massive impact on the company’s brand reputation, while last year’s announcement of the Yahoo! data breach cost the company nearly $1.7 billion in stock market value.

    During this webinar, Helaine Leggat, an legal expert in data protection regulations will discuss the Australian Privacy Act Amendment in detail, what it means for businesses in Australia and internationally. Graeme Pyper, Regional Director at Gemalto will provide recommendations to help prepare for the 2018 deadline. We will share industry best practices and methodologies companies can evaluate to simplify a government audit process. Join our experts to ask questions and learn more about:

    •The local and global government data privacy regulations (Australia and Europe)
    •Gauging the true cost of a data breach and how to reduce the scope of risk
    •Understanding privacy by design throughout business
    •Strategies for simplifying operations for regulation and internal audits
    •Determining current industry compliance, which may be applicable to the APA and GDPR
  • Getting Rid of Risky Business: How contextual info is securing cloud app access Recorded: Jun 28 2017 56 mins
    Ella Segura, Identity and Access Management Expert at Gemalto
    Organizations are working across more cloud environments from CSPs to on premise. Just this year, enterprises are expected to utilize an average of 17 cloud applications to support IT, operations and business strategies. The cloud’s benefits are well-known, but for security teams managing multi-cloud ecosystems has its challenges, especially when it comes to access management.

    Behavioral and contextual analytics are helping companies mitigate risk and better secure access to cloud applications and data. Using data-driven insights to develop internal security policies takes a more preventative identity and access management strategy.

    During this webinar, we will discuss what security professionals need to assess and understand when moving towards or updating a risk-based authentication model for IAM. The presentation will outline access management policies can be identified, templated, updated and monitored to improve security around data in the cloud.

    Join us for a deep dive into:
    -Current implications of multi-cloud environments on IAM
    -Proactively using analytics to define access policies
    -Avoiding security fatigue through scenario-based authentication
    -Preparing for audits using policy implementations
    -A live demonstration of how this all fits together in a multi-cloud environment
  • Turning the Table on Hackers through Situational Awareness Recorded: May 25 2017 61 mins
    Jason Hart, CTO Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA
    Data breaches in 2016 got even more personal with big hacks of adult entertainment sites and social media databases. Hackers mined these for gold, in other words, valuable data to create social engineering attacks, ransom operations, and identity theft. According to Gemalto's Breach Level Index, the number of stolen, compromised, or lost records increased by 86% in 2016, while the number of breaches decreased by 4%. Hackers are going after more data than ever before, and they are finding it in large databases that are left relatively insecure.

    Whether consciously or not, hackers have grasped the idea of situational awareness. They have figured out how to exploit these golden opportunities by keeping a finger on the pulse of what is going on. It seems too simple to be true, but it goes back to the age-old principle "information is power". Getting the information comes from being aware of one's surroundings. To become situationally aware, companies need to change their mindset—building a walled garden isn't an option anymore. During the webinar, we will look at the major data breach trends and findings from 2016 and discuss how this information can help develop your situational awareness. Join us as we cover topics like:

    •What we can learn from Jason Bourne about knowing one's surroundings
    •What we can learn from hackers to better protect valuable data
    •What we as security professionals can do by going back to the basics of accountability, integrity, auditability, availability, and confidentiality
    •How to change our mindset in a new era of a hacker-driven gold rush
  • Briefings On Demand: Getting it Right - Security & the Internet of Things Recorded: May 24 2017 58 mins
    Dave Madden – Sr Director of Business Development & Brandon Dunlap
    The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. However, securing it can be difficult. Join Gemalto and (ISC)2 for a discussion on the Internet of Things and how it will play a role in your future and what changes will be happening in security.
  • Part II – How to get started with GDPR & Applying Appropriate Security Controls Recorded: Apr 25 2017 62 mins
    Jason Hart, Gemalto, Lisa Bentall, DQM GRC, Adrian Davis, (ISC)² EMEA, Nathaniel Ford, (ISC)² EMEA
    As a follow-up to our previous webinar, this panel discussion will dive into further detail about the GDPR. Presented by compliance experts Lisa Bentall (DQM GRC) and Jason Hart (Gemalto) we will answer some of the big questions raised in the previous webinar and open up to the live audience for an interactive Q&A.
  • Getting started with GDPR, Privacy and Applying Appropriate Security Controls Recorded: Mar 23 2017 56 mins
    Jason Hart, Gemalto, Christine Andrews, DQM GRC, Adrian Davis, (ISC)² EMEA
    In this webinar, presented by compliance experts Christine Andrews (DQM GRC) and Jason Hart (Gemalto) you will learn:

    a. The background to the new General Data Protection Regulation
    b. An overview of the key areas of change from the existing Data Protection Act – and the penalties for getting it wrong
    c. A focus on the information security implications and considerations for meeting compliance
    d. An approach for understand the “Gaps” in your current compliance and, importantly, how best to move forwards
  • What’s Next In Securing Identities? Key Identity & Access Management Trends Recorded: Feb 13 2017 43 mins
    Danna Bethlehem - Director, Product Marketing, Identity Protection
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    - The status of the two-factor authentication market and what we can expect in the years to come
    - The enterprise risk issues of using social media credentials to access to corporate resources
    - The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    - The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • GDPR Blueprint; Tackling Confidentially, Integrity and Availability of Data Recorded: Nov 24 2016 63 mins
    Jason Hart, CTO, Identity and Data Protection, Gemalto, Adrian Davis, Managing Director, (ISC)² EMEA
    The new EU regulation of the Privacy world (the GDPR) is rapidly approaching. This webinar will reveal a back to basics approach in relation to GDPR. Specifically, Jason Hart - Gemalto CTO will identify a GDPR blueprint that tackles the privacy concerns around confidentiality, integrity and availability of sensitive data.
  • GDPR – The monster under the bed or an opportunity to enhance security? Recorded: Oct 13 2016 62 mins
    James Leaton Gray, The Privacy Practice, Jason Hart, Gemalto, Adrian Davis, (ISC)²
    The new EU regulation of the Privacy world (the GDPR) is frequently portrayed as a scary and formidable piece of legislation that’s going to rock the online & off-line world. This webinar will explore what the implications really are. How much will change from the present regime? How difficult will it be to comply? Also is there an opportunity hidden in the challenge? And where will security and security professionals fit in the new picture?
  • GDPR Summary: Why encryption and other measures are now a must? Recorded: May 24 2016 62 mins
    Adrian Davis, MD (ISC)² EMEA; Jason Hart, CTO Gemalto; Tom De Cordier, Lawyer and Partner, CMS DeBacker
    Until recently, EU data protection laws mainly focused on data subject consent, proportionality, purpose limitation, transparency, etc. Information security, however, was very often deemed to be an area for the techies, not an area of legal compliance.
    This will change as a result of two recent and major pieces of EU legislation: the General Data Protection Regulation (GDPR) and the Network and Information Security Directive (NIS Directive).
    Under the GDPR and the NIS Directive, businesses and operators of essential services (eg. hospitals; airports; etc.) will have to implement robust information and system security measures. In addition, the new rules contain a new name-and-shame mechanism: businesses and operators will have to inform the relevant authorities of security incidents. And they will have to inform the affected data subjects, unless the affected data were rendered unintelligible (for example by means of encryption).
    Finally, the EU wants the new data protection rules to become a board-level issue and it has therefore decided to make the rules subject to hefty fines:
    •If a business fails to comply with its data security obligations under the GDPR, it may get a fine of up to 10,000,000 EUR or 2 % of its total worldwide annual turnover, whichever is higher.
    •Worse even, if a business is found to be in breach of certain other obligations under the GDPR, the fine may go up to a dazzling 4 % of its total worldwide annual turnover.
    During this webinar, you will learn from Jason Hart, CTO at Gemalto and Tom De Cordier, an expert in data protection and information security law at CMS in Brussels, what the new rules mean in practice and what businesses should do to bring themselves in line with the upcoming requirements.
  • Data, the new oil: Find out why and what it means for your organization Recorded: May 5 2016 62 mins
    Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • What you need to know about the EU Safe Harbour Recorded: Mar 24 2016 62 mins
    Adrian Davis, Managing Director (ISC)² EMEA; Joe Pindar, Director of Strategy in CTO Office, Gemalto
    The Safe Harbor agreement allowed American and European countries to share personal data. This agreement is now invalid and a new one has taken its place. This not only impacts the ways companies conduct business and make their IT decisions, but also how they set up their data protection infrastructures.
    This webinar will present:
    • New proposed regulations
    • Business implications
    • A solution to stay compliant and avoid penalties
    Join (ISC)² and Gemalto in this webinar to find out what you should know about the Safe Harbour agreement, how its invalidation impacts you and how to be compliant with the new EU regulation framework.
  • Innovation in Payments: Experts answer 10 burning questions Recorded: Mar 16 2016 44 mins
    Konstantin Rabin (Kontomatik), Paul Hampton (Gemalto), Rashee Pandey (Bankable), Anders La Cour (Saxo Payments)
    Moderator Konstantin Rabin will provide general numbers on the payment industry, will take a look into start-up fundings and some examples of innovative companies in the payments industry.

    Then, he will ask the esteemed panel of experts the following questions:

    1) What are the main drawbacks of the current payment options?
    2) What should be the primary focus of the innovation in payments and why? (speed, cost reduction, transparency or anything else)
    3) Name a greatest innovation in payments happened till date
    4) Importance of cryptocurrencies in the realm of payments
    5) How do millennials change the way payments are going to develop?
    6) What are the main obstacles that prevent innovation in payments? (regulation, lack of funding, absence of common technology or anything else )
    7) What is more important to innovate, online or offline payment systems?
    8) What is the most crucial part of the Payment Service Directive 2? (or perhaps any other local directive)
    9) How large will be a share of businesses using alternative payments in 3 years from now?
    10) How would just a regular payment look in 2026?
  • Securing Office 365, AWS Workspaces and SFDC with SafeNet Authentication Service Recorded: Mar 9 2016 52 mins
    Mor Ahuvia – Product Marketing Manager, DP Product Marketing – Gemalto
    As the switch to the cloud blurs the boundaries of the traditional enterprise security perimeter, organizations are challenged with maintaining visibility into access events and enforcing consistent access controls across their data estate, which spans on-premises, virtualized and cloud-based applications. Applying uniform authentication policies on different types of applications may often require diverse integration methods, such as the RADIUS and SAML 2.0 industry standards, as well as custom agents or APIs. In this webinar, you will learn how Office 365, AWS Workspaces and SFDC—as well as other SaaS applications—can be easily secured using SafeNet Authentication Service.
  • 암호화 키가 안전하게 저장되어 있나요? PCI DSS 규제 준수를 위한 제안 Recorded: Dec 8 2015 40 mins
    Kevin Park - Sales Manager, Korea, IDP, APAC
    암호화 키가 안전하게 저장되어 있나요?
    • 암호화 일반 (암호화 관련 용어 정의)
    • 암호화 키 관리 방안
    • PCI-DSS 및 각종 규제에서의 키관리 요구 사항
    • HSM 일반
    • HSM 활용 사례
SafeNet APAC Data Security Solutions Webinars
SafeNet APAC Data Security Solutions webinars designed for enterprise and users, distributors and resellers.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 5 Reasons to Secure your Citrix Environment with Gemalto SafeNet Authentication
  • Live at: Sep 17 2015 6:00 am
  • Presented by: Mor Ahuvia - Product Marketing Manager, Authentication, Gemalto
  • From:
Your email has been sent.
or close