Hi [[ session.user.profile.firstName ]]
Sort by:
    • McAfee Endpoint Encryption: What's New Webcast for Existing Customers
      McAfee Endpoint Encryption: What's New Webcast for Existing Customers Pat Correia, Product Marketing Manager, Endpoint Encryption, McAfee & Deepak Kolingivadi, Product Manager, Management Busines Recorded: Nov 20 2013 6:00 pm UTC 20 mins
    • As an existing McAfee Endpoint Encryption customer, see what’s new in the encryption product line and what products are available to you! This webcast is provided as a 30 minute overview and includes 5 minutes of Q & A. Prior products that apply to this webcast: (1) McAfee Total Protection for Data (TDA), (2) McAfee Drive Encryption (DED) AKA EEPC, EEMAC and Endpoint Encryption for PCs and Macs, (3) McAfee File & Removable Media Protection (DFF) AKA Files & Folders, EEFF, EERM.

      Join this webinar on Endpoint Encryption and learn about:
      • McAfee Complete Data Protection Suites – New
      • How these new suites are becoming available to you
      • How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
      • Use cases on leveraging the synergy between Intel® vPro™ and McAfee Data Protection technologies
      • Management of Native Encryption v1.0
      • Reference material available to you at the Endpoint Encryption Community site

      Pat Correia is responsible for Endpoint Encryption Product Marketing at McAfee. Previous to Intel, Pat held various technical and product marketing positions at Intel for 15 years, driving many key projects in Pentium chipset, Pentium and Xeon processors, industry platform initiatives including PCI Express and Ultra Mobile PC, and corporate brand campaigns for Core 2 Duo based multi-core platforms and software, all targeted to OEMs and ODMs world-wide.
      Deepak Kolingivadi is a Product Manager in the Management Business Unit at McAfee and responsible for formulating the strategy for products like McAfee ePO Deep Command and McAfee Risk Advisor. Deepak has 15 years of industry experience, of which 11 years have been in the field of Digital Security. Deepak is experienced in developing product strategy and roadmap for security products as well as conceptualizing and engineering them.

      Read more >
    • Data Encryption for the Cloud-First Era
      Data Encryption for the Cloud-First Era Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc. Recorded: May 18 2017 5:00 pm UTC 58 mins
    • The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

      About the presenter:

      Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

      Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 

      Read more >
    • Law Enforcement Data On the Move: Don’t make CJI a Crime
      Law Enforcement Data On the Move: Don’t make CJI a Crime Stan Mesceda, Encryption Expert at Gemalto Recorded: Jul 20 2017 3:00 pm UTC 57 mins
    • Law enforcement and defense organizations need secure access to sensitive data, and to provide services and to collaborate with others, while protecting the public, and any confidential information. Faced with these challenges, meeting compliance regulations such as Criminal Justice Information Services Security Policy (CJIS-SP) , is a priority for most organizations, especially as audits draw near.
      Did you know that the Criminal Justice Information Services Security Policy (CJIS-SP) requires that data be encrypted when it is transmitted outside a secure facility, even within the same agency
      “When CJI is transmitted outside the boundary of the physically secure location, the data shall be immediately protected via cryptographic mechanisms (encryption)”

      Join us for an informative webinar where you will learn how to secure your data in transit as it moves across your internal and external network, to help ensure compliance with the FBI mandate.
      Attendee takeaways:
      •Overview of CJIS-SP mandate
      Network vulnerabilities and how Ethernet encryption can help secure data in motion
      •Use cases – hear how various agencies have successfully deployed network encryption to secure their data and meet audit requirements
      •Mapping solutions to the needs of your organization

      For more information on dealing with multi-factor authentication in the CJIS audit, check our part one in the series: https://www.brighttalk.com/webcast/2037/258091

      Read more >
    • Best Practices for Using Email Encryption in Office 365
      Best Practices for Using Email Encryption in Office 365 Michael Osterman, President Osterman Research Recorded: Jun 7 2017 6:00 pm UTC 55 mins
    • Email is the most frequently implemented application in Office 365, and whether you use a cloud or hybrid solution, email needs to be thoroughly secured. A failure to properly encrypt email can lead to loss of intellectual property, breaches of sensitive customer and employee information, and violations of data breach and privacy laws.

      Join Michael Osterman of Osterman Research and DataMotion for a
      55-minute webinar that reviews the Office 365 environment, the reasons for securing email, and addresses best practices for implementing and using email encryption.

      This webinar will address a number of important questions:

      • Why worry about encryption in Office 365?
      • Why should you encrypt email?
      • What are the best practices for securing email in Office 365?
      • Is the native Office 365 email encryption your best option for
      securing email?

      Whether you are just beginning your plans to move to Office 365, or you’re already fully implemented, you need to make sure that your organization is moving data as securely as possible.

      Read more >
    • The Key to Protecting Data: Endpoint Encryption | Featuring Gartner
      The Key to Protecting Data: Endpoint Encryption | Featuring Gartner Mark Hickman, COO Recorded: Jun 12 2017 2:05 pm UTC 2 mins
    • If there is one absolute truth in business, it’s that data is now everywhere. Big or small, companies wrestle with keeping data secure with an ever expanding mobile and agile workforce.

      Increasingly companies are turning to endpoint encryption as the answer to protecting their data. What are the methods that companies can use to defend access to business data? What are the costs of data breaches, compared to preventative measures like endpoint encryption?

      In this portion of the webcast, Mark Hickman, COO, WinMagic, discusses how you can best prevent a data leak from occurring? And how you can find the right solution to secure your IT environment?

      View the entire webcast, featuring VP and Distinguished Analyst John Girard from Gartner. Click here: http://bit.ly/2sYDiiX

      Read more >
    • Content Encryption:  Key Issues to Consider
      Content Encryption: Key Issues to Consider Michael Osterman, President Osterman Research; Andy Nieto, DataMotion Recorded: Apr 20 2017 7:00 pm UTC 53 mins
    • Osterman Research conducted an in-depth, primary market research study, surveying 150 IT professionals knowledgeable about use of encryption in their organizations. This informative webinar will provide attendees with details on the survey results, address critical issues surrounding content encryption, and offer best practice recommendations and business process improvements for decision-makers to consider.

      Highlights include the following:

      • Statistics on manual and policy based content encryption use for email and file transfer
      • Legal and regulatory impact of failing to encrypt content
      • Complications related to mobile devices and cloud-based application use
      • Barriers to adoption for content encryption
      • Best practice recommendations including risk and business case analysis

      Read more >
    • Cloud Services and Encryption: Facts, Myths, Perceptions
      Cloud Services and Encryption: Facts, Myths, Perceptions Paul Rich of Microsoft Recorded: Jul 19 2017 5:00 pm UTC 61 mins
    • Encryption and terms like "BYOK" have surged to the forefront of cloud service discussions. Both security and compliance stakeholders express great interest in encryption and its apparent promises. However, the expectations built upon encryption and control of encryption keys are often founded on assumptions that fail under scrutiny. In this session we will examine the top myths of cloud encryption and look at factors that have contributed to the growing misperceptions. We will also examine regulatory and legal pressures that impact encryption in this this fascinating and evolving area of cloud services and data privacy.

      Key takeaways:
      - The fact and fiction in myths about cloud encryption
      - The importance of thinking of encryption within legal frameworks
      - How to spot encryption snake oil

      Read more >