Data brings value that informs the mobile device journey, helps businesses make key processing decisions, improves processing efficiency and dictates disposition path across the omni-channel. By harnessing the power of this data across the mobile device lifecycle, you can optimize value by shortening the time your devices spend in the warehouse.
Join this session to learn how to:
Simplify grading, erasure, and diagnostics across the device ecosystem
Enable solution-focused API integration with existing ERP / WMS / AMS systems
Employ lean processing principals
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
Enterprise businesses trust ITADs to securely destroy their IT assets to the point that data cannot be recovered. Adding an additional level of security with software-based data erasure guarantees that even the most challenging IT assets (like SSDs) are completely wiped prior to destruction. Erasure also fits within Article 17 of GDPR requirements, the ‘Right to Erasure, ’ which requires businesses to permanently remove customer information upon request. Learn how you can prepare your organization to meet these requirements in this session with Fredrik Forslund, Director of Cloud and Data Center Erasure Solutions for Blancco Technology Group.
We are excited to talk to you about our new and upcoming features and enhancements in our data erasure products. Russ Ernst, VP of Product Management and Cornelius Bührle, Director of Sales Engineering, will guide you through our latest improvements to show you how they can help provide the most trusted and efficient solution for your IT asset disposition.
During this webinar, you’ll learn about:
New Blancco Drive Eraser features:
NVMe Erasure
Smart Info collection
New Blancco Mobile Device Erase features:
Dynamic Workflow
Diagnostic of Devices
New Blancco Management Console features:
BI Dashboard
Export improvements (config of filename)
User Group management improvements (moving user groups + search)
No trend highlight the constant evolution of the mobile industry better than the innovations occurring in mobile banking. Dutch-based mobile-only banking firm bunq is on the forefront of this emerging industry and has chosen biometrics for security. In this webinar we discuss mobile biometrics and why bunq chose our 4 Fingers TouchlessID for its mobile banking app.
Understanding GDPR: Myths & Reality of ComplianceVeridium
Confused by the new GDPR regulation? We break it down in this webinar from June 22nd, 2017, and explain how these new regulations will affect your business and how you can achieve compliance. We also explore how biometrics fit into the picture.
Blockchain, Biometrics, and the Future of Financial ServicesVeridium
Blockchain technologies are reshaping banking as we know it. More financial institutions are embracing this technology, and consumers and enterprises alike need to know where it's going. We take a look at the evolution of digital currencies and how biometric authentication fits in, with guest speaker Barry Childe of HSCB.
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
Enterprise businesses trust ITADs to securely destroy their IT assets to the point that data cannot be recovered. Adding an additional level of security with software-based data erasure guarantees that even the most challenging IT assets (like SSDs) are completely wiped prior to destruction. Erasure also fits within Article 17 of GDPR requirements, the ‘Right to Erasure, ’ which requires businesses to permanently remove customer information upon request. Learn how you can prepare your organization to meet these requirements in this session with Fredrik Forslund, Director of Cloud and Data Center Erasure Solutions for Blancco Technology Group.
We are excited to talk to you about our new and upcoming features and enhancements in our data erasure products. Russ Ernst, VP of Product Management and Cornelius Bührle, Director of Sales Engineering, will guide you through our latest improvements to show you how they can help provide the most trusted and efficient solution for your IT asset disposition.
During this webinar, you’ll learn about:
New Blancco Drive Eraser features:
NVMe Erasure
Smart Info collection
New Blancco Mobile Device Erase features:
Dynamic Workflow
Diagnostic of Devices
New Blancco Management Console features:
BI Dashboard
Export improvements (config of filename)
User Group management improvements (moving user groups + search)
No trend highlight the constant evolution of the mobile industry better than the innovations occurring in mobile banking. Dutch-based mobile-only banking firm bunq is on the forefront of this emerging industry and has chosen biometrics for security. In this webinar we discuss mobile biometrics and why bunq chose our 4 Fingers TouchlessID for its mobile banking app.
Understanding GDPR: Myths & Reality of ComplianceVeridium
Confused by the new GDPR regulation? We break it down in this webinar from June 22nd, 2017, and explain how these new regulations will affect your business and how you can achieve compliance. We also explore how biometrics fit into the picture.
Blockchain, Biometrics, and the Future of Financial ServicesVeridium
Blockchain technologies are reshaping banking as we know it. More financial institutions are embracing this technology, and consumers and enterprises alike need to know where it's going. We take a look at the evolution of digital currencies and how biometric authentication fits in, with guest speaker Barry Childe of HSCB.
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
IDC estimates that there will be 41.6 billion connected IoT devices by 2025, opening up opportunities for increased efficiencies and innovation across industries. Yet, lack of IoT security standards and typical processes such as shipping with default password credentials and manual onboarding leave devices, and the networks they operate on, open to large-scale attack.
Last summer, the FIDO Alliance announced a new standards initiative to tackle these security issues in IoT. The Alliance’s IoT Technical Working Group aims to provide a comprehensive authentication framework for IoT devices in keeping with the fundamental mission of the Alliance – passwordless authentication. These webinar slides provide an update on this new work area, including:
--How FIDO Authentication and existing specifications fit into the IoT ecosystem today
--The charter and goals of the IoT TWG, including development of specifications for IoT device attestation/authentication profiles to enable interoperability between service providers and IoT devices; automated onboarding, and binding of applications and/or users to IoT devices; and IoT device authentication and provisioning via smart routers and IoT hubs
--The progress of the working group to date, including the use case and target architectures the IoT TWG is looking at as a foundation for its specifications and certification program
Iveda (OTCQB:IVDA) enables cloud video surveillance via its Sentir® data and video management platform, utilizing proprietary video streaming and Big Data storage technology. Iveda enables a recurring revenue model by global licensing of Sentir to service providers, already earning monthly recurring revenue from their customers, such as telcos, datacenter operators, ISPs, and cable companies.
Eliminating Passwords with Biometrics for Identity Access Management WebinarVeridium
Did you know that nearly half of the calls to company help desks are for resetting employee passwords? It's a staggering amount of time, money, and productivity wasted on a single task. How would you like a solution that eliminates passwords for identity management access and uses biometrics instead?
Leveraging mobile technology, as well as blockchain and other more recent innovations, companies like Wala and Veridium are looking to bring banking services to the under- and unbanked in Sub-Saharan Africa. Tricia Martinez of Wala discusses the challenges they had to overcome in this project, and the lessons they've learned along the way, as well as why biometric authentication played an important role in making this effort possible in the first place.
Introduction to FIDO's Identity Verification & Binding Initiative FIDO Alliance
Speaker: Rob Carter, Director, Product Development and Innovation, Mastercard
Speaker: Parker Crockford, Director of Policy & Strategic Accounts, Onfido
Speaker and Moderator: Andrew Shikiar, Executive Director and CMO, FIDO Alliance
2019 FIDO TOKYO Seminar - FIDO Deployment in KoreaFIDO Alliance
Henry Lee, Senior Vice President, Mobile Security Technologies, Samsung Electronics Co., Ltd. / a Board of Directors and Co-Chair of FIDO Korea WG, FIDO Alliance
The Project to provide Security Solutions for MTA New York City Subway System. The ultimate goal is to drastically reduce storage cost for the New York Subway System and to achieve incremental profits for our parent company.
As the Xen hypervisor evolves so do the chances for a potentially exploitable bug to be introduced. This is the case for XSA-105/106, where a number of oversights in the x86 instruction emulator created the opportunity for a number of exploits.
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsVeridium
Fingerprints are one of the most common, easy to use biometric for authentication. With advances in smartphone technology, companies are innovating beyond Touch ID to new biometric capture methods. In this webinar, we discuss the state of mobile biometrics, 4 Fingers technology, and the future of contactless fingerprints.
Enabling End-to-End Mobile Customer JourneyBlancco
s your organization achieving added value by tracking mobile devices across the full customer journey?
Tracking devices from mobile device acquisition (trade-in / buy-back) to reverse logistics (mobile processing / repair / omni-channel disposition) allows businesses to make informed, timely decisions to increase efficiency, profit, and customer satisfaction.
Join this session to learn how new technologies are creating a shift in the mobile retail space and driving business intelligence across the full mobile ecosystem.
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
IDC estimates that there will be 41.6 billion connected IoT devices by 2025, opening up opportunities for increased efficiencies and innovation across industries. Yet, lack of IoT security standards and typical processes such as shipping with default password credentials and manual onboarding leave devices, and the networks they operate on, open to large-scale attack.
Last summer, the FIDO Alliance announced a new standards initiative to tackle these security issues in IoT. The Alliance’s IoT Technical Working Group aims to provide a comprehensive authentication framework for IoT devices in keeping with the fundamental mission of the Alliance – passwordless authentication. These webinar slides provide an update on this new work area, including:
--How FIDO Authentication and existing specifications fit into the IoT ecosystem today
--The charter and goals of the IoT TWG, including development of specifications for IoT device attestation/authentication profiles to enable interoperability between service providers and IoT devices; automated onboarding, and binding of applications and/or users to IoT devices; and IoT device authentication and provisioning via smart routers and IoT hubs
--The progress of the working group to date, including the use case and target architectures the IoT TWG is looking at as a foundation for its specifications and certification program
Iveda (OTCQB:IVDA) enables cloud video surveillance via its Sentir® data and video management platform, utilizing proprietary video streaming and Big Data storage technology. Iveda enables a recurring revenue model by global licensing of Sentir to service providers, already earning monthly recurring revenue from their customers, such as telcos, datacenter operators, ISPs, and cable companies.
Eliminating Passwords with Biometrics for Identity Access Management WebinarVeridium
Did you know that nearly half of the calls to company help desks are for resetting employee passwords? It's a staggering amount of time, money, and productivity wasted on a single task. How would you like a solution that eliminates passwords for identity management access and uses biometrics instead?
Leveraging mobile technology, as well as blockchain and other more recent innovations, companies like Wala and Veridium are looking to bring banking services to the under- and unbanked in Sub-Saharan Africa. Tricia Martinez of Wala discusses the challenges they had to overcome in this project, and the lessons they've learned along the way, as well as why biometric authentication played an important role in making this effort possible in the first place.
Introduction to FIDO's Identity Verification & Binding Initiative FIDO Alliance
Speaker: Rob Carter, Director, Product Development and Innovation, Mastercard
Speaker: Parker Crockford, Director of Policy & Strategic Accounts, Onfido
Speaker and Moderator: Andrew Shikiar, Executive Director and CMO, FIDO Alliance
2019 FIDO TOKYO Seminar - FIDO Deployment in KoreaFIDO Alliance
Henry Lee, Senior Vice President, Mobile Security Technologies, Samsung Electronics Co., Ltd. / a Board of Directors and Co-Chair of FIDO Korea WG, FIDO Alliance
The Project to provide Security Solutions for MTA New York City Subway System. The ultimate goal is to drastically reduce storage cost for the New York Subway System and to achieve incremental profits for our parent company.
As the Xen hypervisor evolves so do the chances for a potentially exploitable bug to be introduced. This is the case for XSA-105/106, where a number of oversights in the x86 instruction emulator created the opportunity for a number of exploits.
Beyond Touch ID: Mobile Fingerprinting & Advances in BiometricsVeridium
Fingerprints are one of the most common, easy to use biometric for authentication. With advances in smartphone technology, companies are innovating beyond Touch ID to new biometric capture methods. In this webinar, we discuss the state of mobile biometrics, 4 Fingers technology, and the future of contactless fingerprints.
Enabling End-to-End Mobile Customer JourneyBlancco
s your organization achieving added value by tracking mobile devices across the full customer journey?
Tracking devices from mobile device acquisition (trade-in / buy-back) to reverse logistics (mobile processing / repair / omni-channel disposition) allows businesses to make informed, timely decisions to increase efficiency, profit, and customer satisfaction.
Join this session to learn how new technologies are creating a shift in the mobile retail space and driving business intelligence across the full mobile ecosystem.
Blancco Mobile Diagnostics enables mobile network
operators/carriers, device manufacturers, retailers,
customer service centers, insurers and resellers to
quickly and accurately find the source of device issues
and resolve them.
Microsoft Power Platform Governance with RunpipeRunpipe
www.runpipe.com
This Slide Deck is designed for anyone responsible for the governance and adoption of Power Apps and Power Automate and Power Bi in a large organisations.
It will list all the features, tools and practices available in the Power Platform to help you monitor, protect and support your data and applications, while also enabling and encouraging innovation from your makers.
It shares top tips and best practice suggestions for governance, security and monitoring, and strategies employed by customers to enable digital transformation with the Power Platform.
Runpipe provides an intuitive platform that brings together security, governance and enablement for multiple Low-Code Platforms, all in one place.
It's No Mystery... Mobile BI Will Rule in 2015Smartbridge
*** Watch the webinar that goes with the slides! http://bit.ly/mobilebiwebinar ***
Mobility is one of the biggest and most significant trends in enterprise and consumer technology right now. Business intelligence is no exception and is one of the biggest enterprise categories where mobile is making big changes.
From situational awareness and real-time operations insights, to enabling a mobile workforce, mobile BI is changing business operations.
Many organizations are behind the curve when it comes to mobile BI, yet it does not have to be herculean effort to get started.
Learn the value of mobile BI, where to start, and best practices that will ensure a successful transition to mobile for your BI users and increased adoption.
A few topics that will be covered:
- Why you should use mobile to transition users away from traditional reports
- Why many organizations haven’t made the transition yet
- How to overcome these roadblocks to kick-start your project
- The top challenges faced with mobile BI projects
- Lessons learned on driving mobile BI projects
- Mobile Refurbished Market Data
- New Blancco Mobile Diagnostics & Erasure releases
- Potential time savings from Blancco Mobile Diagnostics app
- Mobile Carrier Insights integration overview
- Blancco cosmetic grading overview
- Events & industry news
- Q&A
Ian Uriarte Timbergrove at IBM IoTExchange 2019IanUriarte2
Industrial IoT and AI: The new internet and cloud that will disrupt your business overnight. Building a stronger market differentiator, fast in the age of disruption. Presented at IBM's IoT Exchange conference in 2019 by Ian Uriarte CEO and Founder at Timbergrove.
https://www.timbergrove.com
Cisco Tech Advantage Webinar. June 4th, 2014
Video: http://youtu.be/RkmMi9qea5Y
IoT is everywhere, from smart meters on houses to parking sensors in the ground – all devices are connected to the Internet. Internet engineers are helping traditional industries solve new industrial world challenges by connecting billions of new devices. An exciting part of the IoT journey is the integration between both worlds: Information Technology (IT) and Operation Technology (OT). For that a systems approach is required to scale the existing Internet infrastructure to accommodate IoT use cases, while making IT technology easy to adopt for OT operators.
In this session you will learn:
IoT infrastructure challenges and the need for open standards and partner ecosystem
Key elements to build large-scale IoT systems as IPv6, access control, plug and play, distributed intelligence and contextual awareness
Introduction to fog computing and advantages of extending cloud computing and services
Looking ahead to the future
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications without a separate VPN connection. Web@Work preserves a native and high-fidelity web browsing experience.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
FIDO Alliance Webinar: Intuit's Journey with FIDO AuthenticationFIDO Alliance
Millions of customers trust Intuit with their most sensitive financial information. With that in mind, Intuit recently rolled out FIDO Authentication on its mobile apps to provide additional layers of security while simultaneously making the user experience more convenient. In this webinar, Marcio Mello, director & head of Product Management – Intuit Identity & Profile Platform, presents Intuit’s approach to enable FIDO Authentication, including:
Intuit’s priorities in choosing a mobile strong authentication solution
--The steps Intuit took to evaluate strong authentication solutions that met its security and usability requirements
--Intuit’s evaluation of FIDO authentication vendors and solution chosen
--The steps Intuit took to roll out FIDO Authentication, challenges faced and how they were overcome
--Intuits login time and security results after deploying FIDO
--Intuit’s advice for other service providers deploying FIDO
Speakers:
Marcio Mello, Director & Head of Product Management – Intuit Identity & Profile Platform
Andrew Shikiar, Executive Director & CMO, FIDO Alliance
Similar to Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Processing (20)
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitise advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitising data in live/active environments
See the slides to learn how your data center can minimise business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...Blancco
Data center managers are facing mounting pressure from both internal and external audit teams to keep their operations clean, efficient and compliant.
See actionable tips to solve your toughest compliance challenges slowing down your data center operations.
Challenge #1: The server decommissioning process is manual and time-consuming
Challenge #2: It’s difficult to sanitize advanced media, like NVMes
Challenge #3: You don’t have a defined process for sanitizing data in live/active environments
See the slides to learn how your data center can minimize business risk, reduce operating expenses, enhance operational efficiencies and ensure responsible end-of-life IT asset management.
Making the Case- Blancco Data Center Eraser Solution Blancco
Ready to make your data center more secure and efficient? Find out how data erasure can benefit your data center, then use these slides to make the case to your Data Center Manager, CIO or other C-Suite exec. This quick overview of the Blancco Data Center Eraser solution and the issues it addresses will have you dubbed “The Data Center Problem-Solver” in no time.
Download the slides to learn about:
What constitutes data erasure and how and when to perform data erasure across the entire data lifecycle
How secure server decommissioning at-scale helps you meet security and compliance without compromising efficiency
Benefits of implementing a company-wide data sanitization solution vs. keeping assets on site or outsourcing destruction
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Blancco
Learn how to protect data throughout its lifecycle- from initial creation through destruction. View the presentation to get specific tips on how to protect your business.
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...Blancco
From the IAPP Canada Privacy Symposium in May 2017. This is the full upload of Blancco Chief Strategy Officer Richard Stiennon's presentation, "Data Retention Is a Team Sport: How to Get It Right."
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesBlancco
Solid state drives are fast, efficient and outperform many other storage technologies. But they also come with hidden risks when they reach end of life. Data erasure
Security Regulations & Guidelines: Is Your Business on the Path to Compliance? Blancco
Explore key stats from our data protection research study and learn how you can stay compliant with security regulations.
See the full research study here: https://www.blancco.com/resources/research-studies/data-protection-prioritizing-regulations-guidelines/
An Introduction to Live Environment and Cloud EraserBlancco
Session slides from our recent “Today’s Data Security Risks: How to Reduce Your Attack Surface” event in Singapore. Director of Cloud and Datacenter Eraser Solutions, Fredrik Forslund provides a thorough intro to LEE and cloud eraser.
Data erasure's role in limiting cyber attacksBlancco
With over 300 million records leaked and over $1 billion stolen in 2015, chances are your organization has been, or will be, affected by a cyber attack. But with a few data retention policies and enforcement mechanisms, the future landscape of data security could drastically improve.
Longtime cyber security expert and Blancco Technology Group’s Chief Strategy Officer, Richard Stiennon, sheds light on how organizations should think about data lifecycle management to limit their exposure to cyber attacks.
What You’ll Learn:
The current landscape of cyber risks and threats
How to prioritize data lifecycle management within your overall security objectives
How organizations can establish policies to reduce the impact of cyber hacks by continuously removing data from IT assets, devices, storage environments and virtual machines
Why organizations should leverage data erasure as an indispensable tool in fending off cyber attacks
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...Blancco
Do organizations have a defined process for wiping sensitive company information before discarding/reselling old drives and mobile devices?
In this webinar, Randy F. Smith and data security experts from Blancco Technology Group explore the following topics:
- How easily residual data can be recovered from hard drives and mobile devices
- The risks leftover data can pose to organizations
- The most secure ways to wipe company data from end-of-life devices and drives
As we start working with our device processes – we are on the forefront of helping shape some of these regulations. Why? Because we need to protect our consumers. We hear a lot of the data breaches that happen out there on the network end, and a lot of happening because of mobile devices.
iPhone retain better value, but they also have ore frequent turn-overs. Users want the latest and greatest – and will turn in their old iPhones.
We are on the forefront of trying to shape those regulations to protect and do what is right for the consumer. Our device processors have to process tens or maybe hundreds of thousands per month. How do they that? How do they manage that process? How do they erase to level necessary? How do they optimize the value? We offer a solution that can address all of that.
And although iOS comes with encryption, for some instances, such as Government, they have to erase the devices to a certain standard. We can support and verify the encryption key has been properly.
This means making sure that data that has been rendered unrecoverable has been proven to do so. There are many cases of cryptographic erasure being executed and telling the user that it was successful when it was not. Even casual spot-checking is not enough. Some Crypto Erase methods work well enough to make the drive appear as disabled and unusable, but only a small portion of the disk was erased or protected. With a closer examination and the right equipment, it’s discovered that the software did not complete its entire mission.
Blancco provides reliable verification by testing and checking for recoverable keys and data across the entire drive medium. The best indication of a successful cryptographic erasure is the inability to find any non-random strings of data. Without this type of test, verification is guessing.
We have ability to provide both erasure and diagnostics in a single solution. We operate from a multi-channel approach when it comes to this. We’ve been vey strategic when it comes to our portfolio when it comes to the mobile space.
This allows us to help our clients scale and adapt to the rapid changes of the industry. Especially when it comes to mobile, it is a immature market and we can expect future regulations and standards will also shift.