Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Webcasts // Jan 2014

    CSP Analysis - Attacking XSS Mitigation

    In this webcast, the presenter will given an introduction into the \"Content Security Policy (CSP)\" HTTP header. The CSP is basically an HTTP header it requests the site and gets response from server. It allows loading sources like java script files, style sheet and images etc.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cisco IOS Attack and Defense

    In this webcast, the presenter covers the past, present and future of Cisco IOS hacking, defense and forensics. Starting from the historic attacks that still work on less well managed parts of the internet, the powerful common bugs, the classes of binary vulnerabilities and how to exploit them down to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Vulnerability Discovery in Closed Source/Bytecode Encrypted PHP Applications

    Security audits of PHP applications are usually performed on a source code basis. However, sometimes vendors protect their source code by encrypting their applications with runtime (bytecode) encryptors. When these tools are used source code analysis is no longer possible and because these tools change how PHP works internally, several...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    An Introduction to New Stream Cipher Designs

    Even with \"Nothing to hide\", the user want to protect the privacy of their bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (used in WEP/WPA, BitTorrent, SSL), A5/1 (GSM telephony), E0 (Bluetooth), as...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Full-Disk-Encryption Crash-Course

    Full-Disk-Encryption (FDE) is an important aspect of data security and everyone should use an appropriate solution to protect their (especially mobile) systems and data. In this webcast, the presenter covers the technology behind Full-Disk-Encryption (FDE) software products.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    RF Fingerprinting of RFID

    In this webcast, the presenter will present an overview of existing and their own novel methods for hacking electronic passports and driver's licenses including novel Radio Frequency (RF) fingerprinting techniques. High frequency proximity transponders (RFID tags) are already present in most new passports, and will soon be in new generations...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Methods for Understanding Targeted Attacks with Office Documents

    In this webcast, the presenter will give an overview about the office file format. The presenter also explains the in-depth technical details and practical analytical techniques for triaging and understanding these attacks, defensive mechanisms to reduce the effectiveness of the attacks, forensics evidence that can help trace the attacks, static...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Failures in Smart Card Payment Systems

    PIN Entry Devices (PEDs) are used in the Chip & PIN (EMV) system to process customers' card details and PINs in stores world-wide. Because of the highly sensitive information they handle, PEDs are subject to an extensive security evaluation procedure.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking Rich Internet Applications

    In this webcast, the presenter will examine the largely under researched topic of Rich Internet Applications (RIAs) security in the hopes of illustrating how the complex interactions with their executing environment, and general bad security practices, can lead to exploitable applications.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Intent on Being a Good Android Citizen?

    Securing intents properly requires a defensive approach of some old techniques plus an added step of validating some assumptions. In this webcast, the presenter aimed mainly for app developers - learn how intents work under the hood, how to secure the user intents and how to secure their assumptions to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Active Scan Augmenting Manual Testing with Attack Proxy Plugins

    In this webcast, the presenter will introduce ActiveScan++ and demonstrate how it can be used to easily identify complex vulnerabilities in real world applications. ActiveScan++ is an open source Python plugin that builds upon Burp Suite's basic active scanning functionality.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Monitoring Web Sites for Malware Injection with Web Detector

    It's estimated that 86% of all websites had at least a serious vulnerability during 2012. Attackers either manually or automatically (via botnets) deploy C&C servers and malware droppers within exploited websites to infect clients. When such an intrusion is not detected by the owner, the website can deliver malware for...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    OWASP Security Shepherd - Mobile Web Security Awareness and Education

    The OWASP security shepherd project has been designed and implemented with the aim of fostering and improving security awareness among a varied skillset demographic. Security shepherd covers the OWASP top ten web app risks and has recently been injected with totally new content to cover the OWASP top ten mobile...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    PCIDSS and Secure Applications

    The Payment Card Industry Data Security Standard (PCI DSS) applies to whether cardholder data is stored, processed or transmitted. In this webcast, the presenter will examine the best practices in development of bespoke or custom written applications to be used within the cardholder data environment of the PCI DSS to...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Cloud-Based Detection Techniques for Botnets and Other Malware

    Traditional techniques for detecting malware, such as viruses, worms and rootkits, rely on identifying virus-specific signature definitions within network traffic, applications or memory. Botnets are ideally suited for launching mass Distributed Denial of Services (DDoS) attacks against the ever increasing number of networked devices that are starting to form the...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Metro Down the Tube. Security Testing Windows Store Apps

    In this webcast, the presenter will cover \"Metro\", \"Modern\" or (more correctly) \"Windows Store\" apps and how to perform security reviews on them. Like it or not, this is the direction Microsoft are going in, and it seems likely that this style of centrally controlled, sandboxed application is the future...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Smart Storage Scanning for Mobile Apps - Attacks and Exploit

    Mobile application hacking and its security is becoming a major concern in today's world especially with BYOD and user's jail breaking/rooting their devices. Scanning and vulnerabilities detections are two major areas for mobile applications in current state. Attacking techniques and exploit delivery on different platform are evolving, protection is even...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting New Actionable Insights by Analyzing Web Application Firewall Triggers

    ModSecurity web application firewall was first released more than a decade ago, available as open source software that gives the ability to protect web applications. Over the years ModSecurity has matured significantly, and is the most widely deployed WAF, protecting millions of websites. In this webcast, the presenter will show...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Can Application Security Training Make Developers Build Less Vulnerable Code?

    In this webcast, the presenter will shares the results of a yearlong survey of nearly 600 software developers that captures their knowledge of application security before and after formal training. The presenter also explains the results of a \"Retest\" of a subset of respondents, to identify how much security knowledge...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Getting a Handle on Mobile Security

    Mobile development is one of the largest growth areas in all of software. The last decade has seen an explosion of mobile devices, operating systems, development environments, libraries, toolkits and app stores. Organizations are racing to construct mobile applications that harness the power of the mobile paradigm.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Implications of Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Hybrid Analysis Mapping Making Security and Development Tools Play Nice Together

    Developers want to write code and security testers want to break it and both groups have specialized tools supporting these goals. The problem is - security testers need to know more about application code to do better testing and developers need to be able to quickly address problems found by...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security of MICA-Based Wireless Sensor Networks

    In this webcast, the presenter mention an initial qualitative risk assessment, carried out by interviewing the operating manager of a large suspension bridge and a contractor responsible for part of a large subway tunnel network who want to use wireless sensor networks.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Analyzing RFID Security

    RFID tags and contact-less smart cards are regularly criticized for their lack of security. While many RFID tags have weaknesses, the security level of different tags varies widely. Using the Mifare classic cards as an example, the presenter illustrate the complexity of RFID systems and discuss different attack vectors.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    SWF and the Malware Tragedy

    In this webcast, the presenter explains possible web-based attacks using Flash with a particular focus on obfuscation, de-obfuscation and the generic detection of malicious SWF. While there are some tools out there to analyze AS2 and AS3 based SWF, using various techniques, analysis of SWF can become a nightmare.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Short Attention Span Security

    In this webcast, the presenter will explain about script injection in flex, EFI Rootkits, static analysis with Dehydra, and pattern-matching hex editors, Auto-WEP key cracking with ITX, porting network security tools to the iPhone. Along with this, the presenter can make some code available for the hex editor, a bunch...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Security Implications of the Cross-Origin Resource Sharing

    In this webcast, the presenter will analyze the Cross-Origin Resource Sharing (CORS). This HTML5 feature allows websites to load resources from other domains, even from restricted environments, using the authentication tokens saved by the browser.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Attacking and Defending Full Disk Encryption

    Many organizations are flocking to full disk encryption solutions as a solution to their data security requirements. Unfortunately, many of these installations view the deployment of full disk encryption as a panacea for any and all security concerns for their laptop fleets. All too often, these systems are not properly...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Threat Models That Exercise Your SIEM and Incident Response

    In this webcast, the presenter presents a case study on taking actual security incidents, creating threat models, and using the models to create red team exercises. The resulting red team exercises are then used to evaluate their technical controls (SIEM, vulnerability management) and incident response.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Shameful Secrets of Proprietary Protocols

    There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy....

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Keynote - Copper Droid on the Reconstruction of Android Malware

    In this webcast, the presenter presents the CopperDroid, an automatic VMI-based dynamic analysis system to reconstruct the behavior of Android malware. Based on the key observation that all interesting behaviors are eventually expressed through system calls, CopperDroid presents a novel unified analysis able to capture both low-level OS-specific and high-level...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Continuous Security Testing in a Devops World

    In this webcast, the presenter will present an open source security testing framework that aims to address them through the use of Behavior Driven Development (BDD). BDD offers a communication bridge between security, development and testing so that security requirements can be defined in a natural language; and yet still...

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Locksport: A Brief Introduction

    In this webcast, the presenter will give an overview about the physical security, types of locks and how they work, how the user open locks without keys or combinations. The presenter also explains the Cleveland Locksport community, rules, and guidelines, and recommendations for enhancing security at home and elsewhere.

    Provided By SecurityTube.net

  • Webcasts // Jan 2014

    Password Defense: Controls Your Users Won't Hate

    Passwords are a necessary part of nearly every information system. From a least interesting user to the highest privileged administrator, a last line of defense to protect sensitive information is a string of characters.

    Provided By SecurityTube.net

  • Webcasts // Dec 2013

    50-30-20 Rule of Security Video

    Cyber criminals are targeting small businesses more than ever. They know small businesses often lack the strong information security defenses and resources, offering a path of least resistance to assets. While anti-virus software is an information security staple, it just isn't enough. So, where does a small business start when...

    Provided By Dell & Microsoft

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Provided By Centrify

  • Webcasts // Nov 2013

    Google Hangout Webinar On Demand

    Watch the recording as Google experts outline strategies for coping with the impending product retirements. Along with tips for staying as secure as possible in the short term, we discussed how Google’s cloud-based solutions offer future-proof alternatives to the endless cycle of upgrades and migrations. If your company may find...

    Provided By Google

  • Webcasts // Nov 2013

    Analytics: The Key to Unlocking the Intelligence in Data

    Discover the many ways Dr. Kirk Kelly of Hamilton County Department of Education uses predictive analytics to uncover hidden patterns and associations within massive amounts of data in this on-demand webinar. See firsthand how he uses business intelligence to issue daily reports so staff across the district can identify at-risk...

    Provided By IBM

  • Webcasts // Nov 2013

    On-demand Webcast- Machine-to-Machine Security: How to Stay Secure While Building an Internet of Things

    Much of what we now refer to as the Internet of Things (IoT) has existed for decades but the Internet and cloud computing have further enabled automation, data, and security problems. As powerful and as valuable as IoT is, it's important to remember the security risks involved. Connected devices can...

    Provided By Wind River

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Jan 2009

    Effective Strategies for Evaluating Your WLAN Security

    This webcast offers a practical guide for selecting a WLAN security solution. The presenter explains the prevalent methods for wireless access point detection and classification.

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Gartner Analyst, John Pescatore, Discusses Wireless Security as SaaS

    With the proliferation of wireless technology throughout the enterprise, multi-dimensional attacks combined with a lack of wireless expertise can challenge even the most experienced IT staff. Security conscious organizations are faced with 3 key wireless security requirements: protect the business from unauthorized users, safeguard sensitive data, and meet evolving compliance...

    Provided By AirTight Networks

  • Webcasts // Apr 2009

    Case Study Webinar? How to Secure Your Cisco WLAN Today

    This webcast will give attendees a real life case study of how one organization avoided pitfalls while expanding and remediating it's Cisco WLAN and achieved the best performance and robust and accurate wireless security for mission critical applications it was running over wireless.

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    PCI DSS and the Wireless Connection: Pay Attention - TJX Was No Accident!

    There's a New Sherriff in Town and He's Getting Tough on Wireless Security. His name is the PCI DSS 1.2 and wireless security has finally been recognized as an important component of protecting the network and the WLAN.

    Provided By AirTight Networks

  • Webcasts // Oct 2009

    Preparing for a Wireless Audit for PCI DSS Compliance

    Whether or not wireless is deployed in the cardholder data environment, every organization subject to PCI has a minimum set of wireless security requirements. Preparing the organization to comply with the PCI DSS Wireless Requirements does not have to be a daunting task. The presenters of this webcast will demystify...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    Case Study Webinar - How to Secure Your Cisco WLAN Today

    This webcast shows how to secure Cisco WLAN. The attendee will learn about the Effective pre-deployment planning including predictive RF planning, RF site survey, etc. The presenter gives key best practices to follow for securing WLAN.

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Windows 7 - A New Wireless Security Risk to the Enterprise

    There was a New Wireless Security Risk to the Enterprise edition of windows when it was launched in November 2009, and not many have written about this issue, or how vulnerable the issue is. This webcast discusses the application which has the capability to turn the employees' Wi-Fi enabled corporate...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Wireless Security: The Easiest PCI Investment to Justify

    As there is development in technology there is simultaneous growth of various risks that are connected to the industry. This webcast offers the attendee information regarding the Wireless Security, and many more things that are related to this issue. The webcast is presented by John Kindervag who is the Senior...

    Provided By AirTight Networks

  • Webcasts // Jan 2010

    Conquering the Minefield of Soft Rogue APs in Enterprise Networks

    A soft Access Point (AP)is a device such as a laptop or other wireless enabled device which performs traffic forwarding between its wireless interface and some other interface which is in turn connected to a secure network. The major advantage of using the soft AP is that this can show...

    Provided By AirTight Networks

  • Webcasts // Jan 2009

    The Role of PCI in a Security Strategy

    Following multiple data breaches at "PCI Compliant" organizations, there has arisen a chorus of voices who are discovering that complying with PCI does not make an organization secure. This, while not a surprise to anyone who has either looked at PCI or worked in security, is evidently news enough to...

    Provided By Ounce Labs

  • Webcasts // Jan 2009

    The Path to a Secure Application

    The presenter of this webcast details the path one must follow to find and eliminate the coding errors and design flaws that expose data, threaten operations, and cost the organization time and money.

    Provided By Ounce Labs

  • Webcasts // Mar 2009

    Mobile Strategies: Why It's Time to Make the Switch From IPSec to SSL VPN

    In today's economic climate, increasing employee productivity and reducing infrastructure costs are at the top of every organization's agenda. Enabling employees to access network resources, from wherever they are and from whatever device, is a key strategy for improving productivity and saving money. As a result, IT is under pressure...

    Provided By Ziff Davis Enterprise Holdings

  • Webcasts // Apr 2013

    Webinar: PC Refresh in the Consumerized IT Environment

    Intel IT experts discuss the positive impact of PC refresh on security and manageability, user productivity, and TCO.

    Provided By Intel Corporation

  • Webcasts // Dec 2009

    Moving Beyond AV to Ensure Secure and Compliant Endpoints

    In today's Web 2.0 world, software is more distributed than ever before. Employees download a variety of Internet applications on a regular basis, with each new download altering system configurations and increasing your exposure to malicious software. Financially motivated cybercriminals are designing malware attacks to specifically bypass traditional security methods...

    Provided By Lumension

  • Webcasts // Dec 2009

    Harmonizing Controls to Reduce Your Cost of Compliance

    Mounting regulations across the globe have increased the cost and burden on organizations. The high cost is especially felt by organizations which must adhere to multiple requirements - 75 percent of organizations must comply with two or more regulations and corresponding audits and more than 40 percent must comply with...

    Provided By Lumension

  • Webcasts // Dec 2009

    Keys to Aligning Security and Compliance - How to Connect the Dots

    The pressure is on as organizations today face mounting demands to maintain an enterprise-wide security posture while adhering to the growing number of compliance regulations. Without the right processes and tools to effectively navigate through the security and compliance maze, IT professionals often resort to manually poring through spreadsheets and...

    Provided By Lumension

  • Webcasts // Jun 2009

    Live Event: Profile of the World's Top Hackers

    Data theft and breaches from cybercrime may have cost businesses as much as $1 trillion globally in lost intellectual property and expenditures for repairing damage. And this current economic climate has undoubtedly created more opportunities for hackers, criminals, and industrial espionage firms who are targeting critical infrastructures and systems to...

    Provided By Lumension

  • Webcasts // Nov 2009

    Demystifying DLP: Solving the Mystery of Data Loss

    Companies today are increasingly challenged to protect their sensitive data. Whether they need to protect customer credit card information, patient healthcare records, sensitive intellectual property, non-public financial information or other company data, there are strong drivers for increased vigilance. Additionally, protecting data is becoming more difficult. Innovations in Data Loss...

    Provided By Technology Executives Club

  • Webcasts // Jan 2009

    Authentication's Past, Present and Future

    The presenter of this webcast will explore the topic of authentication completely. It will begin with a look at authentication methods of the past in computing. There will be special attention paid to means of authentication still in use, and a discussion of why those methods are still around. Then...

    Provided By Technology Executives Club

  • Webcasts // Jan 2009

    Identity-Enabled Web Services - Securing Application Access

    Web Services are becoming the leading method for application-to-application communication across corporate networks and the Internet. Until recently, proprietary end-to-end authentication and authorization schemes violated Web Services design principles and were expensive and difficult to implement and maintain. The emergence of the OASIS "WS-Security" Web Services standards have solved many...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Internet SSO: Build or Buy

    More often than not, today's economy stipulates that the lowest cost solution to satisfy a given business challenge should be utilized. When considering the options for deploying Internet Single Sign-On, User Account Management and Identity-Enabled Web Services, building an in-house solution may at first appear to be the most viable...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Become a Business Hero - The Value of Internet Single Sign-On

    Today's business climate is tough. The ongoing recession has driven virtually every dollar of Capital and Operational Expenditures under a financial microscope. Prospective IT investments must be reinforced with a strong business case in order to gain approval, and those that demonstrate a high return on investment coupled with a...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    What's New With PingConnect? Plenty!

    PingConnect provides on-demand SaaS Single Sign-On and automated user account management that configures in hours and deploys in days with no on-premise hardware or software required. Dozens of SaaS applications are supported, including Salesforce CRM and Google Apps. The attendee will hear what's new with PingConnect. PingConnect is providing an...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Rapid Delivery of Internet SS0 to 60+ Apps

    The attendee of this webcast will learn how PingConnect delivers SaaS Single Sign-on and automated user account management. PingConnect is providing an easy way to universally access multiple SaaS applications without requiring costly and complicated new IT tools and support.

    Provided By Ping Identity

  • Webcasts // Jan 2009

    SIEM & SAML: Secrets to Securing the Cloud

    While CIOs and CISOs are weighing through a broad range of cloud services to cut costs and streamline operations, they all share one common concern: how to retain visibility over user activity when applications move to the cloud? The presenters of this webcast discuss best practices for better security and...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Federated Identity Management: A Comparison of Various Approaches

    This webcast explores the four common methods for achieving Federated Identity Management. The presenters will discuss these approaches and compare the relative costs, benefits, issues and considerations associated with each of them.

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Leveraging Federated Identity and Virtual Directories to Deploy Secure Internet Single Sign-On

    According to Gartner Group, both federated identity and virtual directories are well on their way to mainstream market adoption. The attendee will find out how these capabilities can be used together to facilitate implementing SSO with SaaS and BPO providers, business partners and trading partners. The attendee of this webcast...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    The Secret Behind 30 Day Deployments of Secure Internet SSO: PingEnable

    With hundreds of possible ways to implement Single Sign-On (SSO) that works over the Internet, it is easy to see why many organizations' identity federation projects fail. Without an experienced methodology and practice, identity federation projects can take six months or even longer to complete. The attendee of this webcast...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Can Federation Solve the SaaS Phishing Problem?

    News about phishing attacks on SaaS providers has made security a top-of-mind issue with SaaS providers and clients alike. The presenters of this webcast discuss the issues such as what kinds of attacks are taking place? What is at risk? And what role can identity federation play in solving this...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Secure Internet Single Sign-On to SiteMinder

    SiteMinder is the most widely deployed Web Access Management system on the market today. The presenter explores how PingFederate, the market leader in federated identity management, can extend SiteMinder to support internal and external Single Sign-On (SSO).

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Provisioning Options for Internet Single Sign-On

    Internet SSO is great for providing seamless and secure access to Internet-facing applications like SaaS services and supply chain portals. However, some applications require the creation of user accounts in their directories before SSO can take place. PingFederate now has two distinct mechanisms for provisioning user accounts over the Internet:...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Identity Integration for SaaS: Avoiding the Mulitple Directory Nightmare

    Just how should enterprise identity management and outsourced SaaS applications integrate securely? The presenter of this webcast outlines four basic areas of identity integration with SaaS: provisioning, authentication, SSO and authorization. Both the SaaS provider and SaaS customer perspective will be addressed, as both play roles in the SaaS Identity...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Single Sign-On for Salesforce CRM

    Ping Identity automates Salesforce CRM user account management while at the same time providing single sign-on for all of the ways users access it. These solutions deploy rapidly and they work with the existing infrastructure. The presenter will help to explore which Internet SSO Solution for Salesforce CRM is the...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Webinar: 5 Steps to Ensure Security of Internet SSO

    In recent news, phishing attacks have been targeted at the online services and Software as a Service (SaaS) providers are paying the price if they don't protect their customers. No one wants to be front page news for a security breach, that is why one has to protect themselves, whether...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Federated Identity Management: How to Increase Partner Adoption

    The biggest hurdle the customer's face is related to getting all of their Identity Federation partners on the same page. The presenter will review the issues that one can expect to encounter as well as the best practices developed to help to resolve them.

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Secure Single Sign-On to Citrix

    Until now, Single Sign-On (SSO) has been limited to web applications. The PingFederate Citrix Integration solution extends the reach of SAML SSO beyond web applications to include any applications that have been virtualized using Citrix Presentation Server. The attendee of this webcast will learn how to reduce IT administration overhead...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Easy Endpoint Connectivity Through SAML-Based Internet SSO

    A common challenge shared by Identity and Service Providers who have standardized on SAML technologies for Internet Single Sign-On often occurs when the "Partner" side of the desired SAML connection, referred to as an "Endpoint," does not support SAML. This often requires the Endpoint partner to undertake a full-scale SAML...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Secure Internet Single Sign-On for Service Providers

    If a customer called and wants single sign-on that works over the Internet and that all of their security policies are maintained as well. This is not the first time the request from a customer or partner for single sign-on has come in, but this time there is no procrastinating....

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Reduce Account Sharing With Federated Single Sign-On

    The attendee of this webcast will discover how Federated Single Sign-On can help to eliminate account sharing while delivering higher levels of service to the customers. A common problem for Software on Demand vendors is unauthorized user account sharing. According to research conducted by the Information Systems Security Association, 64%...

    Provided By Ping Identity

  • Webcasts // Jan 2009

    Strategies for Making OpenID More Secure

    OpenID has attracted a lot of attention lately, but security experts are warning of significant vulnerabilities with the system. The attendee of this webcast will learn how to improve the security of OpenID deployments. Plus, attendee will have the opportunity to see secure OpenID in action.

    Provided By Ping Identity