At the Event Gemalto Will be Showcasing our SafeNet Identity & Data Protection Solutions:
-
Data Protection: Encryption and Key Management
Data Protection On Demand |
DPoD offers one marketplace for all your data protection needs, with a menu of security applications ranging from code signing to key brokering. Click and deploy services, provision users, add devices and generate usage reports with ease. |
SafeNet Luna HSM |
The new SafeNet Luna Hardware Security Module (HSM) with the industry's fastest cryptographic operations. |
SafeNet 100Gbps High Speed Encryptors |
The high-assurance SafeNet Ethernet Encryptor CN9100 provides 100 Gbps mega data security and high speed network performance with the lowest latency in the industry. |
SafeNet KeySecure |
SafeNet KeySecure and SafeNet Data Protection Encryption solutions simplify encryption with a centralized key management system. |
-
Identity and Access
SafeNet Trusted Access |
SafeNet Trusted Access (STA) is an access management service that combines the convenience of single sign-on with granular access security. By validating identities, enforcing access policies and applying smart single sign-on, organizations can ensure secure, convenient access to numerous cloud applications. |
SafeNet Authentication Service |
SafeNet Authentication Service (SAS) provides fully-automated, highly secure multi-factor authentication. |
Gemalto Sponsor Session
Date: | Thursday, August 9th |
Time: | 2:30 PM - 4:00 PM |
Location: | Oceanside E, Level 2 |
Session Title: | Digital Disruption: It’s Not Just for Business. It’s for the Cybersecurity Industry Too |
Session Abstract: |
Most people talk about digital transformation and the dramatic changes it will bring to how businesses operate and the ways individuals consume services. But the security industry has mostly overlooked how this digital disruption will put the security industry on its head. That’s because many security companies that exist today will be made irrelevant because of digital disruption. In order to develop more efficient ways of interacting with customers and producing new services, businesses will need to build security into their digital strategies because trust will be fundamental to the success of the digital transformation revolution. As organizations transform, security must be an integral and transparent part of the process. But many of today’s security technologies are not built or designed to be delivered that way. So what does this mean for traditional Information Security controls and standards? Are we going to see disruption in the cybersecurity Industry and do the controls and technology that business implement have any effect on reducing risks? Jason Hart will address these challenges and present how companies and providers need to relook how security is designed and delivered in a digital world. |
Our Presenter:
Jason Hart, CTO for Gemalto Enterprise and Cybersecurity is a former ethical hacker with 24 years’ experience in the Information Security industry, Jason has used his knowledge and expertise to create technologies that ensure organizations stay one step ahead of the risks presented by ongoing advances Cyber threats and risks. Jason continues to raise the profile of Information Security risks and solutions, and was instrumental in the introduction of the role CSO (Chief Security Officer) within business and the founder of the world’s leading Cloud Based Authentication Platform. In addition Jason has devoted his time to reducing and researching the risk of password theft and password hacking and is globally known for exposing a large number of major password vulnerabilities. Jason continues to published articles and white papers Globally and continually appears on BBC, ITV, CNN, Fox News and CNBC as well as Radio 5, Sky News and BBC World News as an expert advisor on Cyber and Information Security matters and issues. His expertise has been cited in global publications including Time, SC Magazine, InfoSec, Computing and Computer Weekly magazines and in the FT, Guardian, Times and Evening Standard and is recognized as a lead figure within the global information security industry. |
Socialize with Gemalto at Black Hat
Follow us @GemaltoSecurity for updates on all the conference news and trends.
If you wish to speak with someone from the Gemalto team, contact us to schedule an appointment.