Hi [[ session.user.profile.firstName ]]

How Mature is Your Data Protection? 3 Steps to Effective Data Security.

Make no mistake, consumerization of the workplace is one genie that is not about to go back into the bottle.

With the BYOD movement overwhelming IT, and the convergence between personal devices and the corporate networks set to increase, the ability to restrict-and-ban the network is d
Make no mistake, consumerization of the workplace is one genie that is not about to go back into the bottle.

With the BYOD movement overwhelming IT, and the convergence between personal devices and the corporate networks set to increase, the ability to restrict-and-ban the network is doomed to failure. Worse, they may be counterproductive to the business. Instead, IT teams must look at security in a different way, developing a holistic model that encompasses policy, education, technology and enforcement.

During this webcast we look at each of these aspects, helping you define your organization’s best practice guide. We will also be showing you how you can gauge the maturity of your security systems, allowing you to plug any holes before your valuable data starts to leak through them.
Recorded May 22 2012
64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roger Grimes, Security Columnist/Author, Ken Olsen, Microsoft and Chris Merritt, Director of Solution Marketing, Lumension
Presentation preview: How Mature is Your Data Protection? 3 Steps to Effective Data Security.
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Mature is Your Data Protection? 3 Steps to Effective Data Security.
  • Live at: May 22 2012 3:00 pm
  • Presented by: Roger Grimes, Security Columnist/Author, Ken Olsen, Microsoft and Chris Merritt, Director of Solution Marketing, Lumension
  • From:
Your email has been sent.
or close
You must be logged in to email this