Preventing Side Door Access: Ensuring Compliance and Data Security

Cullen Landrum, Senior Solutions Architect, Symplified
When users bypass an organization’s single sign-on solution it can create numerous compliance challenges for IT. This webcast will examine the impact of side door access on the ability of an organization to:

•Accurately report on application usage
•Successfully meet audit and compliance requirements
•Eliminate data loss from security breaches resulting from directly
accessed applications

This webcast will examine how Symplified’s solution prevents side door access, and is based on a White Paper which will be distributed to all attendees.
Jan 10 2013
32 mins
Preventing Side Door Access: Ensuring Compliance and Data Security
Join us for this summit:
More from this community:

IT Governance, Risk and Compliance

Webinars and videos

  • Live 1 and recorded (2836)
  • Upcoming (85)
  • Date
  • Rating
  • Views
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • As most IT Pros are aware, as of April 8th, 2014, Microsoft will stop releasing security patches for Windows XP. Unfortunately, most folks will not be able to migrate all Windows XP machines by that deadline. How will you limit the security risks posed by these now vulnerable assets? Join us for this webinar outlining practical strategies to help you cover your assets.
    In this session we'll cover:
    The primary attack vectors you need to consider
    Immediate actions you can take to limit the exposure of your XP assets
    Warning signs to watch out for that could signal an attack
    How to closely monitor your vulnerable assets with AlienVault USM
  • MDM implementations begin by solving the most pressing business problem in a single hub, mostly on-premise. They then expand to another use case, domain, or region, and might evolve to another MDM hub on cloud or in a different country. Whatever the journey might be, how do you tie the different hubs together in a hybrid or federated hub-of-hubs MDM architecture? Come to this session to learn how certain leading companies are solving this conundrum!

    In this webinar, you will learn:
    -What are the initial use cases that dictate MDM
    -How to determine if you should use the same MDM instance or a different one when expanding your use case
    -When to use on-premise versus cloud MDM

    In addition, we will explore examples of companies using hybrid MDM to manage multiple MDM hubs as well as evolving to the holy-grail of MDM architecture: Hub-of-hubs or federated MDM.
  • Cyberspace is typically the prime mechanism for conducting business. It also plays a key role in the socio-cultural lives of staff, customers and suppliers. By the end of 2013, revelations about how governments had been surrendering commercial and personal privacy in the name of national security left trust very badly shaken. And the timing couldn’t be much worse: many CEOs are ramping up their demands to take even greater advantage of cyberspace. So if this is where things are now, how will all of this look by 2016? How will new threats hurtling over the horizon complicate matters even further? Just what will organisations be able to rely on? And most importantly, are they powerless or can they do something now? This webcast spotlights the threats we'll be dealing with over the coming 24 months along with advice on the best ways of handling them.
  • As more and more companies look to take advantage of all of the benefits afforded with cloud-based infrastructures, the discussion often quickly turns to “How do we get there?” For some companies, this single migration question can create an insurmountable roadblock that either keeps them from moving to the cloud or severely delays their migration. Join Michael McCracken, HOSTING’s Director of Professional Services, as he explores different cloud migration strategies along with the benefits and risks associated with each of those strategies.
  • Anti-virus is not enough. McAfee Complete Endpoint Protection add defense in depth against the full threat spectrum from zero-day exploits to hacker attacks, as well as mobile devices such and tablets.
  • Protiviti has conducted the second-annual Executive Perspectives on Top Risks Survey. We obtained the views of more than 370 board members and C-suite executives about risks that are likely to affect their organisation in 2014.

    Join Managing Director, Mike Purvis and Director, Dirk Verwohlt for a discussion of the report findings.
  • With the release of PCI-DSS version 3.0 many organizations that are already PCI compliant or are working towards becoming PCI compliant are wondering what these changes will mean to their organization. In this webinar we will take a look at what has changed (and what hasn’t) and the impact this will have on how organizations approach PCI compliance.
  • As we continue to explore the ERP implementation process, we’re going to dive deeper into one technology solution you might consider for a successful ERP implementation. Join us as we discuss Oracle eBusiness Suite Release 12. You’ll want to join us if you’re:
    • Thinking about upgrading to release 12
    • On R12.1 and considering moving to R12.2
    • Just looking for a little ‘positive sell’ to add to that budget request so you can fund your upgrade

    Oracle eBusiness Suite Release 12 was defined as “The Global Business Release”. This doesn’t encompass just its geographic reach…the Suite is a comprehensive tool whose breadth and depth across industries and business functions is compelling for customers around the world.

    During this session, participants will learn about:
    • The changes to R12.2 including the foundational architecture improvements and financial enhancements
    • How the strength of Financials Release 12 allows businesses to work globally - across applications, divisions and regions and the tools necessary to achieve that.
    • Integration, data management and reporting

    Oracle eBusiness Suite Release 12 makes it easier and less expensive for customers to implement, manage and scale global applications - ultimately improving the overall ownership experience.
  • Big data has gone beyond a buzzword for businesses and is rapidly becoming embedded in the way organisations operate and make decisions. Highlighted as one of the key areas for attention in the latest ISF Threat Horizon 2016 report, Big data analytics can also mislead when decisions are based on faulty, skewed, incomplete or poorly analysed data sets, resulting in missed opportunities as organisations enter the wrong markets, or enter the right markets with the wrong products. It’s also possible that the same data sets can lead to different conclusions in different parts of the world as a result of cultural bias. Further complicating matters, attackers will target data analytics tools to ensure decisions are skewed.

    This webcast will look at the implied threats to Big Data and offer ways of communicating the challenge of effective Big Data analysis and decision making to senior management.
  • Channel
  • Channel profile
Up Down
  • Understanding IAM Part 1 Recorded: Sep 24 2013 59 mins
    Part 1 of a three-part learning series: Understanding and Selecting IAM for Cloud Services.

    Get conceptual awareness of IAM terms and concepts, bring them into sharp focus. This segment will enable you to:

    -Itemize features and benefits common to most cloud identity and access management systems
    -Be aware of key cloud identity services issues
    -Disentangle design from implementation standards by learning IAM design patterns to describe the architecture
  • Introducing Symplified, Single Sign-On for Education... Making BYOD Easy Recorded: Aug 15 2013 31 mins
    If your organization has any interest in increased productivity, enhanced security, or reduction of support costs, a serious evaluation of Single Sign-On solutions is absolutely essential. Learn how you can tackle the complexity of user access to cloud, web and internal applications and manage single sign-on, access control, account provisioning, and audit reporting under one roof.
  • Bridging the Identity Gap - 6 Identity-as-a-Service Best Practices for Education Recorded: May 28 2013 49 mins
    IT departments at schools across the country are challenged with on boarding thousands of new students and faculty users to internal and cloud applications each year. Furthermore, they are faced with a number of government compliance regulations, user privacy concerns and tasked with providing the most seamless learning experience possible. Add to this the expectation of application access from any mobile device and it becomes even more difficult to control which users have access to what applications and resources. That’s where Identity as a Service (IDaaS) comes into play.

    During this webcast, learn how you can:
    ➢Integrate disparate user types, applications, and mobile devices
    ➢Maintain visibility into user behaviors and app usage
    ➢Simplify access to applications such as Blackboard, ePals Google Apps, and Office365 as well as internal proprietary resources
    ➢Reduce help desk burden through self-service password reset functions
    ➢Increase security, meet regulatory requirements and centralize policy enforcement
  • How To Manage Identities - Symplified Recorded: May 6 2013 2 mins
    Watch this video from Symplified on how to seamlessly connect users and applications located on-premises or in the cloud, with a single sign-on.
  • BYOD: Challenges and Opportunities with a Distributed Salesforce Recorded: Apr 25 2013 56 mins
    With employees working in the cloud and bringing their own devices, IT is faced with the challenge of balancing user access controls and user experience. In 45 minutes, learn how an identity-based security model for mobile users can protect cloud apps and data, provide universal coverage for all mobile platforms, and enable single sign-on from any mobile device to all the information resources business users need.

    Join Darren Platt, Symplified CTO and co-author of SAML and Lincoln Cannon, Director, Sales and Marketing Technology for Merit Medical, as we discuss the crucial role a centralized identity service plays to ensure both end-user productivity and IT efficiency.
  • Symplified Management Console Recorded: Mar 21 2013 39 mins
    Symplified's Management Console is a highly secure, highly monitored service enabling administrators to manage authentication, authorization, application integration and access management, among others. This webcast will specifically cover:-

    Authentication Configuration
    Defining Access Policies
    Application Integration
    Portal configuration
  • Symplified Solutions Overview Recorded: Feb 21 2013 44 mins
    Symplified provides a comprehensive cloud identity solution that helps service-oriented IT organizations simplify user access, regain visibility and control over application usage and meet security and compliance requirements. This webcast will provide a comprehensive overview of the Symplified solution, and cover key topics including: -

    · Secure single sign-on (SSO)
    · Identity & Access Management (IAM)
    · Secure Application Integration
    · Audit & Compliance
    · Directory Integration
    · Strong Authentication
    · Flexible Deployment Options
  • Making Identities Work Securely in the Cloud: Best Practices Recorded: Jan 31 2013 48 mins
    Identity Management is the great IT challenge of the SaaS computing era. Providing authentication and authorization in a way that's convenient, efficient while safe and secure from outsiders is the key. Done well, you can make IT a valuable asset in the deployment of cloud apps. This webcast will outline 7 key best practices which can
    help any IT department harness the complexity of the cloud and put it to work for the organization.
  • Preventing Side Door Access: Ensuring Compliance and Data Security Recorded: Jan 10 2013 32 mins
    When users bypass an organization’s single sign-on solution it can create numerous compliance challenges for IT. This webcast will examine the impact of side door access on the ability of an organization to:

    •Accurately report on application usage
    •Successfully meet audit and compliance requirements
    •Eliminate data loss from security breaches resulting from directly
    accessed applications

    This webcast will examine how Symplified’s solution prevents side door access, and is based on a White Paper which will be distributed to all attendees.
  • Securing and Monitoring Cloud Applications Recorded: Dec 13 2012 33 mins
    The adoption of cloud-based infrastructure introduces concerns around security and compliance. This webcast will look at controlling a decentralized environment and security, specifically:
    Activity monitoring & Governance
    Access Control
    Unified SSO
    All webcast attendees will receive a copy of Symplified's white paper, Securing & Monitoring Cloud Applications: Principles of Cloud Service Governance
  • Single Sign-On to Go! How IAM Can Support BYOD Recorded: Sep 6 2012 44 mins
    In addition to managing cloud-apps and user accounts scattered across a network, IT staff must implement a solution to manage personal mobile devices. It needs to be flexible enough to include new devices that want to join the network yet capable of securing any mobile platform and operating system. IT must strike a balance between the need to access the corporate network and the need to protect and manage access to valuable intellectual property. This webcast will explore Identity Management and how it supports mobile devices in an increasingly BYOD world.
  • Cloud Identity: Past, Present, Future Recorded: May 6 2010 55 mins
    Darren Platt, CTO, Symplified
    Russell Dietz, CTO, SafeNet
    Ravi Srinivasan, Program Director, IAM, IBM
    Anil Saldhana, Red Hat/OASIS IDtrust
  • Technology Dig: Breaking Down the Complexity of Cloud Security Recorded: Nov 12 2009 63 mins
    Understand the new challenges for identity and access management that address cloud security.

    Join this webcast and learn how to:

    * Extend your enterprise to the cloud while maintaining enterprise class security

    * Complete identity access management projects in days, not months, to quickly realize the value of cloud security

    * Eliminate custom coding using a configuration, no coding approach that does not require expert resources

    * Strengthen security and compliance for your internal and external applications

    * Increase user adoption by expanding the value and accessibility of your network

    * Quickly integrate SaaS and enterprise applications
Single Sign-On Best Practices From The IAM Experts
This channel is designed for anyone who is responsible for considering, deploying or managing single sign to cloud or SaaS apps, or identity & access management solutions, whether that solution faces internally for employees or externally for customers and partners; it is also relevant for anyone who is concerned with cloud security, audit, compliance and DLP
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Preventing Side Door Access: Ensuring Compliance and Data Security
  • Live at: Jan 10 2013 7:00 pm
  • Presented by: Cullen Landrum, Senior Solutions Architect, Symplified
  • From:
Your email has been sent.
or close
You must be logged in to email this