Hi [[ session.user.profile.firstName ]]


  • Date
  • Rating
  • Views
  • Securing Data "IN" the Cloud
    Securing Data "IN" the Cloud
    Harold Byun, VP of Product, Baffle Recorded: Apr 25 2019 38 mins
    As the wave of cloud migration continues, many organizations still face open questions about responsibility and governance of their data or their customer's data. The shared responsibility model outlines that the responsibility for security is shared, but clearly calls out that customers are responsible for security of what is put "IN" the cloud.

    Attend this webinar to learn about how you can simplify protection and security of data IN cloud to accelerate your "lift and shift" and still ensure compliance. This session will provide a live review of the AWS database migration service and integration with AWS key management services.

    Join this webinar and learn about the following:

    - Common gaps in implementing the shared responsibility model
    - Simplifying encryption for applications and data migrating to AWS
    - Leveraging cloud key management services
    - Securing cloud native architectures, microservices and serverless
  • Homomorphic Encryption for Your Business: Fact, Fiction, and Hype
    Homomorphic Encryption for Your Business: Fact, Fiction, and Hype
    Harold Byun, VP Products, Baffle Recorded: Sep 12 2018 38 mins
    In recent years, cryptographic researchers have theorized that secure computation — the ability to perform mathematical operations on encrypted data — was still decades from being realized in practice.

    This webinar will show how that timeline has been leapfrogged using a variety of cryptographic approaches to enable secure computation for real world applications today, which enable operations such as sort, search and mathematical computation. The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.

    Join this webinar to learn about the following:

    - Alternative cryptographic approaches that can enable secure computation
    - How to preserve application functionality to drive increased business user satisfaction
    - General performance impact and ranges for various techniques
    - Business use case scenarios that expose different methods to manage and secure data access

Embed in website or blog