Webinars Search 12 ITEMS

image of sigma printer

Sigma: Impressão de cartão Smart ID

March 18, 2021 | 12:00 pm
Nossa nova solução de emissão de cartões de identificação, Sigma, é simples, segura e inteligente, resultando na impressora de cartões de identificação mais avançada do mundo.
Man and woman looking at laptop

Secure Identities for the New Normal

11 am EST / 4 pm GMT
The new normal is rapidly taking shape. Accelerated by the pandemic, IT teams have enabled remote work, and expanded digital transactions for customers, healthcare delivery, remote government services and more.
Server room

Protection des clés de chiffrement dans un environnement hybride

Alors que la plupart des secteurs adoptent davantage de services basés dans le cloud afin de répondre au mieux aux exigences de leurs clients et gagner en souplesse, en efficacité et en rentabilité, ils doivent garder à l'esprit que la perte, le vol ou l'utilisation abusive d'une seule clé cryptographique critique suffit à avoir un impact significatif sur l'entreprise.
Server room

Managing secrets sprawl – 3 reasons why you need a root of trust

On-Demand
As organizations migrate to the cloud to manage workloads in a more flexible and cost-effective manner, the number of passwords, PINs, keys, tokens, and other secrets used to access application platforms and data is increasing exponentially.
Man and woman talking

Building IoT security: cloud connected does not mean less protected

On-Demand
The Internet of Things (IoT) presents a business opportunity across almost every industry. But to be successful, IoT security must become a primary focus.
scy scrapers

Why trust integrity and control are more important today than ever before

On-Demand
Today’s interconnected business environment and data-driven economy depend on trust. As a critical resource, the security of data in storage, transit, and use is vital.
Woman in hallway

Fully digital, trusted, and open for business

On-Demand
Now, more than ever, we need to be taking every opportunity to create a secure, cashless and paperless world, one that appropriately supports citizens and businesses.
Man holding laptop

Pragmatic Key Management for Data Encryption

On-Demand
Over the years, key management has developed a dubious reputation – in a large part due to numerous crypto-enabled products failing to meet enterprise requirements for full lifecycle key management and few being genuinely easy to use.
Man holding laptop

Scalable web traffic visibility with Gigamon and nCipher

On-Demand
This presentation highlights the importance of having web traffic visibility and ensuring that your tools can keep a watchful eye over the whole of your network using technology from Gigamon and nCipher.
Server equipment

Virtual Lunch and Learn: What you don’t understand about crypto can hurt you

On-Demand
We know from the Hong Kong Encryption Trends Study that many Hong Kong enterprises have adopted encryption to protect their data. But what kind of encryption should you choose?
Product Categories
Product Categories
Chat Now