Browse communities
Browse communities
Presenting a webinar?

Applying Strong Auth and DLP to Collaborative File Sharing

Vikas Jain (Intel), Andy Kiang (Box), Chad Holmes (McAfee)
Employees love the convenience and utility of collaborative file sharing applications like Box.com. Sharing contracts, graphics/video files, or other corporate content using a cloud based service empowers users to share information directly with external partners-outside traditional enterprise security controls. You want to encourage productivity but you also need a strategy that addresses how you’re going to control access to file sharing applications and inspect data before it leaves the enterprise.

In this webinar Intel, McAfee and Box have joined forces to discuss how content can be protected throughout the collaboration lifecycle-from access and upload to download and distribution.

You will learn:
•Overview of typical file sharing use cases and workflows
•Streamlining access for users
•Tying federated authentication to corporate id stores
•Adding 2nd factor strong authentication for sensitive document sharing
•Blocking sensitive files from upload
•On-prem, 100% in the cloud, and hybrid implementation options
As a bonus, all attendees will be eligible to receive a free enterprise trial account from Box.
Apr 26 2012
57 mins
Applying Strong Auth and DLP to Collaborative File Sharing
  • Live and recorded (2029)
  • Upcoming (59)
  • Date
  • Rating
  • Views
  • Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

    Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.
  • If you run more then one solution when backing up and recovering your data it can be hard to keep track of which solution does what. Check out how our single solution can fill in all the gaps and make it less complicated to manage multiple solutions at one time.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • The connected device has made our lives more mobile, efficient, flexible and easier to manage. Connected devices and apps help us with everything from fitness to managing our schedules and make music tailored to our current whim accessible and easy to play anywhere. Connected devices for our home such as thermostats, alarms and home automation, make managing our energy use simple and allow us to manage appliances and doors remotely. In the event of a problem they alert us so we can act wherever we are. Finally, the advantages of the connected device are making their way into our IT world.

    The limitations, complexity and fragility of traditional storage are now being supplanted by cloud connected storage. This new model for file (unstructured data) storage combines the scalability, durability, flexibility and mobility of a cloud service with performance and security of a local NAS system. Join us to learn how this new model can empower collaboration across distant locations while making IT's life easier by eliminating costly problems such as backup, DR, distribution and replication associated with the typical storage stack.
  • Inflexible, constrained, locked in, dependent are all terms we hear used to talk about the IT solutions being used in today’s datacenters. Datacenters are complex with a variety of physical, virtual, and cloud platforms for both computing and storage. Solutions that promise to make a datacenter more manageable, often lock you in to specific platforms or singular processes.

    Join this session with Andy Ebbs to learn about the top 10 technical capabilities needed to ensure that you are able to freely move your workloads to run on the best platform, and protect them wherever they are running.
  • The ability of public sector organizations to accomplish their missions depends on reliable connectivity. Now, more than ever, these network connections must be mobile, rugged, and secure – but most of all, they must be flexible.

    At the federal, state, and local level, as well as at institutions of higher learning, the opportunities to gain efficiency and manage budgets through mobile connectivity are increasing exponentially. Cradlepoint enables the public sector to quickly implement networking solutions that are powerful, flexible, easy to manage, and easy to scale; without busting tight budgets.

    Join us for a webinar to learn how Cradlepoint solutions make it easy for public sector organizations to adapt their networks to take advantage of 3G/4G LTE wireless to provide the strongest signal at the best price in any given location.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • The “consumerization of IT” is largely represented by public cloud services. But when it comes to cloud file sync – a technology that is centered on storing, accessing, and sharing data – many businesses are taking pause at public hosting. In this BrightTALK exclusive webinar, learn why deploying cloud file sync in a private environment may be worth considering.
  • IRM is leading the debate on risk culture. Drawing upon the wealth of practical experience and expert knowledge across the institute, we have developed guidance for organisations wanting a greater understanding of their own risk culture and practical tools that can be applied to drive change.

    As seen in the business press every day, embedding risk management into an organisation to the extent that it reliably makes a difference is a difficult task. To achieve this, boards must keep how to manage risks high on their agenda, and to continue asking themselves, whether they have the right culture, people and processes.

    What do we mean by risk culture?

    Risk culture is a term describing the values, beliefs, knowledge, attitudes and understanding about risk shared by a group of people with a common purpose, in particular the employees of an organisation. This applies to all organisations from private companies, public bodies, governments to not-for-profits.

    What does a good risk culture look like?

    An effective risk culture is one that enables and rewards individuals and groups for taking the right risks in an informed manner.
  • With over half of companies not feeling well enough prepared for an IT disaster according to recent research, Ian Daly of Plan B Disaster Recovery will be sharing his best practices on how to build a DR solution you can trust. In this webinar we’ll cover:

    - What counts as an IT disaster?
    - What are the common causes?
    - How can you better prepare for an IT disaster?
    - Testing – what should you be testing and how often?
    - What level of reliability should you be striving to achieve?
    - How to maintain trust in your disaster recovery solution
  • Channel
  • Channel profile
  • Exposing the Beast- Custom API Management for the Enterprise Recorded: Oct 22 2013 64 mins
    Randy Heffner, Forrester Research, Blake Dournaee, Intel Sr Product Manager
    At the Enterprise level, API initiatives must serve a diverse range of
    needs: IT’s hybrid data center, traffic management & security concerns,
    complex multi-org internal dev communities, partner SLAs, public API
    programs, and legacy system integration. API Management in this context is not a “one solution fits all” approach- it requires a loose coupling of connected systems and development processes to manage APIs at Enterprisescale. In this webinar, Intel’s guest speaker, Randy Heffner of Forrester Research, outlines the key Enterprise categories for B2B, internal, & open Web API models and presents sample use cases to highlight how an API platform layer simplifies API delivery and management across teams. Intel reveals new twists on API Management including API payload data protection, incorporating SOA repository & registries, and utilizing API Portal Engines for customized deployment models. Join this expert webinar, to learn how to leverage APIs as the universal tunnel into the Enterprise.
  • API Gateways: Where Security Enables Innovation Recorded: Oct 15 2013 59 mins
    Adrian Lane, Gunnar Peterson, Travis Broughton
    Join Securosis analysts Adrian Lane and Gunnar Peterson as they discuss their new report, "API Gateways: Where Security Enables Innovation". This "speed round" style webinar will focus on API security best practices and will invite real world security questions from the audience. All attendees will receive a free copy of the report.
  • 5 Practical Steps to Building an Enterprise Class API Program Recorded: May 22 2013 60 mins
    Devon Biondi (Mashery), Andy Thurai (Intel), Joshua Greenough (CapitalOne)
    APIs are a hot topic in all sectors of IT - they have gone from being niche solutions provided by big players like Amazon and Google, to being almost as ubiquitous as corporate websites. Ad hoc API development & evangelism without a formal program can leave real revenue on the table, can unintentionally leak sensitive data, and can tarnish the corporate brand with the development community. Today, developers and partners expect to be engaged with first class API programs, while businesses expect real insights to know which APIs are profitable and which APIs to bring to market next. In this webinar, Intel & Mashery outline the baseline enterprise pillars for constructing a first class API program. Learn from CapitalOne how they strategized to build an API program grounded in core business objectives. All attendees to receive a new Mobile API Buyers Guide that presents how to optimize APIs for mobile apps.
  • Mobile Optimized Healthcare API Programs: New Revenue from Legacy Data Recorded: Mar 5 2013 61 mins
    Security Expert-Gunnar Peterson, Mashery & Aetna-Chuck Freedman, Intel-Blake Dournaee
    3 mega trends (mobile apps, partner/developer API programs, and
    healthcare data integration/portability) have converged to create a new
    revenue generating opportunity for Providers and Payers that is all the
    rage: API Developer Community Portals. In this webinar, we present
    premier case study from AETNA that illustrate best practices to building a successful API Program.From security expert Gunnar Peterson learn gateway security patterns that should be employed to safely surface legacy data & services for packaging as raw API information assets, hear from API management MQ leader Mashery how to construct, share, and promote APIs to developers using branded Portals & Partner API Workshops, and finally from Intel see how to build a mobile optimized back-end that bridges mobile friendly security/protocols (eg OAuth) with enterprise grade security &
    integration controls. All attendees will receive a Mobile API Architecture White Paper.
  • 4 Building Blocks to Mobilize your Enterprise App Strategy Recorded: Jan 24 2013 64 mins
    Forrester Analyst: Michael Facemire, Intel Architect: Travis Broughton
    A sound enterprise mobile app strategy focuses on automating and scaling 4 key pillars: back-end data/app integration, app composition/packaging/promotion, secure channel from device to enterprise, and tools to simplify app creation cross-device. Mastering these disciplines delivers native mobile apps that offer consistent and compelling user experiences and brand expansion through engaged developer communities. In this webinar, Forrester & Intel focus on how mobile middleware solutions have evolved the from traditional 3-tier web apps to provide direct access to back-end data via APIs. However, the evolution to this model presents new challenges to developers: inconsistent formats and protocols, inadequate security controls, and rapidly evolving interfaces, to name just a few.

    You will learn:
    -Tips for integrating BYOD platforms into your enterprise app offerings
    -Tradeoffs between web app portals and native mobile apps
    -The gateway approach to streamline development while improving security
    -Tools to provide a unified foundation for mobile enterprise application development
  • Application Layer API Security & Management Recorded: Dec 12 2012 47 mins
    Andy Thurai Chief Architect, Intel Application Security and Identity Products
    As the Enterprise begins to expose application APIs as packaged products consumed by developer communities, partners, and mobile devices- they are also opening new threat vectors into their back end infrastructure. APIs include self documenting meta data that often mistakenly provides information on usage and connections that can be used for SQL injection or other content borne attacks. The application layer must deal with a wide range of protocols with potential threats… from XML/SOAP, REST/JSON, and OAuth/and API Keys used in application requests. In this webinar, we outline API best practice security measures such as encryption, SSL, key management, DLP, and schema validation. To scale deployment Intel showcases how an API Gateway combined with a portal managed service in the cloud can safely share APIs while tightly integrating cloud/on-prem applications.
  • Joint Intel & Mashery Webinar: Intel Expressway API Manager Revealed Recorded: Dec 4 2012 62 mins
    Mashery Product Manager: Chris Lippi, Intel Chief Architect-Andy Thurai
    In this product launch webinar, Intel & API Management magic quadrant leader Mashery discuss the market drivers that have created the need for enterprise class API management solutions that scale to thousands of developers and consumers. We showcase a new composite API platform solution available from Intel, that packages a cloud based API portal from Mashery for promotion, monitoring, and sharing of meta data to developer communities with the Intel gateway security & integration solution that exposes RESTful APIs for consumption at the network edge. The lifecycle for APIs will be discussed along with the typical separation of duties for API management within the enterprise: Service Administrators, Developers, and Architects. Tune in to learn how to package APIs as revenue generating products, safely expose back end applications, and drive usage with mobile consumers and developer communities.
  • Reference Architecture for Healthcare Data Exchange, Mobile Delivery, PHI Recorded: Sep 20 2012 53 mins
    Ira Rothman, Senior VP - Privacy Official, Maximus; Blake Dournaee, Intel Product Manager
    HITEC and the Patient Protection & Affordable Care Act (PPACA) are fueling the requirement for, and subsequent growth of, interoperable systems in the US -- with a common thread between all the various initiatives being the use of SOA, mobile focused information exchange, and protecting patient data privacy.

    In this webinar, Intel looks specifically at the Health Insurance Exchange (HIX) ecosystem and posits a "Service Gateway Reference Architecture" that incorporates legacy protocols, the workflows involved in information exchange, information delivery to mobile APIs, and PHI data protection. Maximus, a leader with programs in health and human services, that has partnered with state, local, and Federal government - discusses how to protect PHI for HIPAA compliance.
  • Using API Gateways to Securely Expose Legacy Apps to Devices Recorded: Sep 11 2012 39 mins
    Blake Dournaee, Product Manager, Intel Expressway Service Gateway
    The issue with the predominant multi-tier data center application architecture is that it is designed with a browser in mind. Mobile Device Management and Web-only Firewalls do not address how to incorporate server side applications, legacy data, and identity infrastructure with the sea of heterogeneous mobile platforms, operating systems, and programming languages used today. We present how Service/API Gateway enables the mobile application economy via REST APIs with JSON and mobile friendly tokens such as OAuth. Finally we outline an end-to-end mobile enablement architecture to expose app data via APIs, advertise APIs to developers via a portal, and tools that make it easy for developers to use those APIs to create mobile apps.
  • Rise of the Cloud Service Broker Role for IT Recorded: Aug 9 2012 64 mins
    Gartner Analyst: Benoit Lheureux, Blue Cross Blue Shield Assoc Chief Arch.: Plamen Petrov, Intel Chief Arch.: Andy Thurai
    Cloud Service Brokerage (CSB) presents an emerging operational role where IT aggregates services from multiple cloud providers, applies corporate policies, & exposes a simplified consumption API for internal developers and partners. Its clear point-to-point management of billing, SLAs, API versioning/governance, integration connectors, and security cannot be managed by individual developers or departments in a controlled compliant way. Gartner discusses different CSB types, market spend, required technical capabilities, and where enablement solutions exist on the technology adoption curve. Chief Architect, Plamen Petrov presents a real world CSB deployment that Blue Cross Blue Shield Association implemented to help aggregate 3rd party services & deliver integration/security services for 38 independent BCBA companies.
  • Using Strong Authentication to Protect Sensitive IT Assets in the Cloud Recorded: Jul 18 2012 58 mins
    Jesper Tohmo, CTO, Nordic Edge; Ho Chang, CEO, BioID; Vikas Jain, Director, Product Management, Intel
    Organizations need something stronger than a simple UserID/password logon to protect sensitive data in the cloud. Strong authentication is the industry standard for protecting personal, financial, healthcare or confidential corporate information. In this webinar, identity security experts from Intel/McAfee, Nordic Edge and BioID discuss the various types of multi-factor authentication that are available, and when, where and how they can be deployed to provide essential protections.
  • Manage Identity & Access to All Your External SaaS Apps from Salesforce Recorded: Jun 25 2012 58 mins
    Pat Patterson, Vikas Jain
    Over the past decade, Salesforce.com has evolved from a CRM destination to a suite of platforms that enable social enterprise collaboration. Now identity and access management are at the forefront of the latest capabilities enabled by Salesforce.com and its ISV partners Intel & McAfee. Not only can an enterprise enable seamless SSO access into Salesforce.com from corporate ID stores, they can manage access to any external SaaS app or up-level cloud provider authentication with multi-factor authentication, all managed 100% within the Salesforce platform.

    In this webinar, Salesforce.com’s identity experts present their latest platform capabilities for cloud security & outline new areas of focus in federation standards, such as provisioning and support for mobile apps. Intel presents their experience in leveraging the Force.com platform to build their Identity-as-a-Service offering: Intel Cloud SSO - now available on AppExchange.

    You will learn:

    * How to enable seamless SSO into custom apps deployed on Force.com
    * How to leverage resident Salesforce.com identities for cloud access
    * How to implement SSO across large multi-org Salesforce.com hierarchies
    * Mobile cloud SSO design patterns and emerging standards
    * How to apply Multi-Factor Authentication for access to Salesforce or SaaS
    * How to leverage Active Directory for access to external SaaS apps
    * New Force.com cloud security capabilities
  • 3 Core PCI-DSS Tokenization Models- Choosing the right PCI-DSS Strategy Recorded: Jun 14 2012 61 mins
    Adrian Lane, Analyst-CTO Securosis, Blake Dournaee, Intel
    When securing credit card data, the imperative to be PCI DSS compliant remains a constant, while the actual solution implemented by merchants can vary depending on the size and nature of an organization. A solution for a small merchant with low transactions will differ from mid-sized retailers with a web presence…from a large merchant with POS & back-office payment infrastructure. Securosis.com’s expert PCI-DSS analyst Adrian Lane, dissects the deployment models with pros and cons of: on-prem vs outsourced models, proxy based tokenization, and format preserving encryption. Adrian covers base tokenization flows for newbies and reflects on detailed cost, pricing, & vendor lock-in concerns for deployments in progress. You will learn:

    •3 Core Models: Tokenize all infrastructure, modify point apps with API/SDK, Proxy-modify data in transit
    •Patterns for tightly coupled payment & back office systems
    •Tokenization as a Service- expense of token format migration
    •Cost considerations to consider
  • Identity of Data Recorded: Jun 5 2012 51 mins
    Steve Coplan-Research Manager, Enterprise Security Practice, 451 Research and Vikas Jain-Director, Product Management, Intel
    As organizations move to the Cloud, concerns arise about retaining control of data resident on third-party services. At the same time, distributing information and protecting intellectual property across a distributed, cloud-based supply chain is a business and IT concern, since there is a need for verifiable trust and persistent visibility into the flow of information. An emerging white space exists for the glue between identity logic, data properties, storage and key management in terms of defining, managing and enforcing policies across SaaS, cloud, mobile and hybrid environments. In this webinar we present the concepts and review solutions that are beginning to address this white space: the cloud service broker role, API/Service Gateways, & Identity as a Service.
  • First Look - Intel Cloud SSO Deep Dive Recorded: May 24 2012 50 mins
    Vikas Jain, Dir. Product Mgt., Intel; Kamal Elharam, Dir. IT, Senior Service America, Inc.
    Outsourcing identity management to the cloud allows you to reduce costs, improve productivity, strengthen security, and streamline IT operations.
    Join us for a first look at Intel’s new identity as a service offering that simplifies the cumbersome process of providing users with access to hundreds of SaaS apps. We provide an overview of the multi-tenant platform architecture, strong auth security controls and unique configuration capabilities gained through our deployment on Force.com. Hear about first impressions from customers.
    You will learn about:
    •Benefits of outsourcing identity to the cloud
    •How & when to incorporate corp id stores
    •Cloud access scenarios where 2nd Factor Auth should be applied
    •100% in cloud, on-prem, or hybrid- which is right for you?
    •Decision criteria used by customers to choose IDaaS

    Bonus: All attendees will receive 30 day free trial + new Gartner “Evaluate IDaaS” report
  • API Security: A Deep Dive into Authentication, DLP, and Validation Controls Recorded: May 10 2012 54 mins
    Dan Woods-CTO Tech Analyst, Chad Holmes-McAfee DLP, Blake Dournaee-Intel Gateway Product Manager
    As APIs enable organizations to extend their products into broad-based platforms and as applications are shared outside the protective firewall to/from the cloud and among cloud providers--Security, Governance, Control, and Managment of these APIs have never been more important. API Security necessarily deals with four major issues: Identity and Authentication, Access Control and Authorization, Input Validation, and Misconfiguration. As a follow on to the introductory Enterprise API Requirements webinar, this technical session will take a deep dive into Enterprise API Security including:

    • Relevant API authentication and authorization standards like OAuth & XACML
    • The intersection of Data Loss Prevention technology and Service APIs
    • The growing importance of Threat Protection applied to APIs
    • Best practice construction of a rich audit/log trail for API security
    • Leveraging corporate identity infrastructure for service authentication
    • Throttling and QOS as it relates to security processing
    • Overview of API Gateway design pattern in context of the McAfee Cloud Security Platform
    Bonus: All webinar attendees will receive a technical API white paper + 50% off discount code for the new Oreilly API Strategy Guide e-book– both by industry analyst Dan Woods
  • Applying Strong Auth and DLP to Collaborative File Sharing Recorded: Apr 26 2012 57 mins
    Vikas Jain (Intel), Andy Kiang (Box), Chad Holmes (McAfee)
    Employees love the convenience and utility of collaborative file sharing applications like Box.com. Sharing contracts, graphics/video files, or other corporate content using a cloud based service empowers users to share information directly with external partners-outside traditional enterprise security controls. You want to encourage productivity but you also need a strategy that addresses how you’re going to control access to file sharing applications and inspect data before it leaves the enterprise.

    In this webinar Intel, McAfee and Box have joined forces to discuss how content can be protected throughout the collaboration lifecycle-from access and upload to download and distribution.

    You will learn:
    •Overview of typical file sharing use cases and workflows
    •Streamlining access for users
    •Tying federated authentication to corporate id stores
    •Adding 2nd factor strong authentication for sensitive document sharing
    •Blocking sensitive files from upload
    •On-prem, 100% in the cloud, and hybrid implementation options
    As a bonus, all attendees will be eligible to receive a free enterprise trial account from Box.
  • Enterprise API Requirements and Best Practices- with ProgrammableWeb Recorded: Apr 4 2012 59 mins
    ProgrammableWeb Founder: John Musser; Blake Dournaee-Intel Product Manager
    While APIs have been ubiquitous within the enterprise for many years, today they are emerging as the new enterprise control point for cloud applications. In the modern API economy, every enterprise with an Internet presence has an opportunity to expose APIs to third-party access, unlocking value in data and services that would otherwise be hidden behind monolithic legacy systems. While API management might be an old concept, cloud-based API management presents a new discipline with added security, visibility, integration, and scale requirements.

    In this session, John Musser, Founder of ProgrammableWeb.com and Blake Dournaee, Product Manager, Intel will discuss:
    •API Evolution – Where did they come from?
    •Open APIs vs Private APIs
    •Hosted APIs vs On-premise APIs
    •Enterprise Usecases
    •API Abstraction
    •Introduction to API Security
    •Customer Examples
  • Identity & Access Management in the Cloud: Real or Mirage? Recorded: Mar 29 2012 60 mins
    Dave Kearns, Sr. Analyst, KuppingerCole
    New approaches to identity and access management based on leveraging the powerful, elastic, and cost-effective cloud model are emerging. In this webinar, Dave Kearns, Sr. Analyst at KuppingerCole, will discuss the benefits and challenges of moving use identities to the cloud. Vikas Jain, Director of Product Management at Intel, will follow with an overview of Intel Cloud SSO, Intel’s newest identity and security solution for the cloud.
  • Solving Cloud Complexity with Service Brokers Recorded: Jan 10 2012 64 mins
    NIST- John Messina, Cloud Security Alliance-Jim Reavis, InfoSys-Suresh Karra, Intel/McAfee-Blake Dournaee
    The recommended cloud security stack, standards, and operating frameworks have rapidly evolved into a set of production quality best practices for the Enterprise as they engage each cloud provider. However, as scale is applied, managing 1-n cloud relationships and services across hybrid environments points to a brokered or intermediary model to solve integration/security complexity, aggregate services, & add new value. This is not new- B2B EDI evolved much the same way from point-to-point, to IT department managed gateway VANs, to 3rd party industry B2B exchanges. Join this webinar to prepare your organization for Cloud Service Brokerage - Gartner’s Daryl C. Plummer has forecast this as “the biggest growth area for cloud computing.”

    You will learn:

    *Industry definitions of Cloud Service Broker roles
    *When do organizations know if they need a CSB? What kind?
    *Relevant CSA operating standards that apply to brokers
    *NIST research solicited from 500 industry experts
    *NIST’s Reference Architecture for broker platforms
    *What capabilities do CSBs ‘own’ and what they ‘
    *Intel/McAfee explain core broker API, security, governance, and integration capabilities
    *Insight into expected adoption paths & early field use cases from InfoSys
    *Attendees receive: complementary Gartner Analyst Report on Cloud Service Brokers
    *References to standards documentation & working groups
Secure the Hybrid Enterprise
Application security & analytics software that help enable the Hybrid Enterprise model where data and apps are deployed across on-prem and cloud environments. Transform how services & sensitive data are exposed as APIs to developers/mobile, aggregate and analyze corporate data for new insights, and ensure data level security and compliance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Applying Strong Auth and DLP to Collaborative File Sharing
  • Live at: Apr 26 2012 5:00 pm
  • Presented by: Vikas Jain (Intel), Andy Kiang (Box), Chad Holmes (McAfee)
  • From:
Your email has been sent.
or close
You must be logged in to email this