Recorded: April 23 | 2014 Attend
Let's face it, there's unrelenting pressure on IT to enable competitive advantage through new technology and use of data assets‒-but the business is driving initiatives that can push sensitive production data into more and more exposed areas. The key question is 'How can you enable the business to be agile AND take a more proactive, programmatic approach to security at the same time?' With the advanced threats that are pervasive today, it's becoming increasingly dangerous for organizations to deploy new technologies and processes, and then reactively address the implications for data security in the ecosystem. You need a blueprint to reverse this trend in your organization.
Recorded: March 18 | 2013 View
Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. According to IDC, the amount of information created, captured or replicated has exceeded available storage for the first time since 2007, and many organization's are spending far more time looking for information than actually using it. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.
Recorded: August 14 | 2013 Play
Big Data is a trend that has engulfed today's IT industry and one that organizations are struggling to manage. The size of the digital universe this year will be tenfold what it was just five years earlier. Therefore, organizations must find smarter data management approaches that enable them to effectively corral and optimize their data.
When: Aug 05 2010
Presenting: Clive Longbottom, Business Processes Facililitation, Quocirca
The paraphrasing of Oscar Wilde may seem apposite, but in actuality, the loss of even one set of data will look more like carelessness - and will have legal and brand ramifications.
When: Aug 05 2010
Presenting: Moderated by Ron Condon, TechTarget; Guy Bunker, Jericho Forum
Ron Condon has been writing about developments in the IT industry for more than 30 years. In that time, he has charted the evolution from big mainframes, to minicomputers and PCs in the 1980s, and the rise of the Internet over the last decade or so.
When: Aug 05 2010
Presenting: Scott Crawford - CISSP - CISM, Managing Research Director of Security
Third-party hosted security services have taken off in recent years, as has the technology of Data Loss Prevention. Soon, these two trends can be expected to converge, as DLP as a hosted service becomes more prevalent, complementing the established domains of hosted security for inbound messages and safe Web browsing.
When: Aug 05 2010
Presenting: Dmitriy Ayrapetov; Network Security, Product Management, SonicWALL
The Web has become a bi-directional channel for communication where participation is highly encouraged. Ultimately, the benefits of Web and Enterprise 2.0 depend on it.
When: Aug 05 2010
Presenting: Mauricio Angee; Mercantil Commercebank, N.A, VP, Information Security
Data Loss Prevention is not a fixed practice, it is very dynamic in nature and it is continuously evolving. Protecting critical information assets has become the main purpose of Information Security.