Hi [[ session.user.profile.firstName ]]

Baffle.io

  • Date
  • Rating
  • Views
  • Preventing Data Leakage in Cloud Development Environments
    Preventing Data Leakage in Cloud Development Environments
    Harold Byun, VP of Product, Baffle Recorded: Jun 27 2019 38 mins
    A lot of companies have been using the cloud for test and development spin-ups to make dev instances available quickly for their application development teams.

    This enables organizations to "shift left" and develop faster, but also introduces increased security risks when production data or data snapshots are used in test dev environments. For example, there have been several widely publicized data exposures that have been left unattended or have been leaked due to cloud misconfigurations.

    Attend this webinar to learn how you can support development teams and secure production data in the cloud at the same time. This session will provide a live review of database migration services and simplified data protection options that help prevent the accidental data leakage from your test dev environments.

    Join this webinar and learn about the following:

    - Some common security gaps in test dev environments
    - How to simplify and secure the migration of production data to development environments
    - How to enable simplified masking of data so developers can do their work
  • Securing Data "IN" the Cloud
    Securing Data "IN" the Cloud
    Harold Byun, VP of Product, Baffle Recorded: Apr 25 2019 38 mins
    As the wave of cloud migration continues, many organizations still face open questions about responsibility and governance of their data or their customer's data. The shared responsibility model outlines that the responsibility for security is shared, but clearly calls out that customers are responsible for security of what is put "IN" the cloud.

    Attend this webinar to learn about how you can simplify protection and security of data IN cloud to accelerate your "lift and shift" and still ensure compliance. This session will provide a live review of the AWS database migration service and integration with AWS key management services.

    Join this webinar and learn about the following:

    - Common gaps in implementing the shared responsibility model
    - Simplifying encryption for applications and data migrating to AWS
    - Leveraging cloud key management services
    - Securing cloud native architectures, microservices and serverless
  • Homomorphic Encryption for Your Business: Fact, Fiction, and Hype
    Homomorphic Encryption for Your Business: Fact, Fiction, and Hype
    Harold Byun, VP Products, Baffle Recorded: Sep 12 2018 38 mins
    In recent years, cryptographic researchers have theorized that secure computation — the ability to perform mathematical operations on encrypted data — was still decades from being realized in practice.

    This webinar will show how that timeline has been leapfrogged using a variety of cryptographic approaches to enable secure computation for real world applications today, which enable operations such as sort, search and mathematical computation. The session will provide an assessment of cryptographic techniques and live demonstrations to show how advanced encryption can protect your sensitive data without breaking application functionality for your business.

    Join this webinar to learn about the following:

    - Alternative cryptographic approaches that can enable secure computation
    - How to preserve application functionality to drive increased business user satisfaction
    - General performance impact and ranges for various techniques
    - Business use case scenarios that expose different methods to manage and secure data access

Embed in website or blog