As an existing McAfee Endpoint Encryption customer, see what’s new in the encryption product line and what products are available to you! This webcast is provided as a 30 minute overview and includes 5 minutes of Q & A. Prior products that apply to this webcast: (1) McAfee Total Protection for Data (TDA), (2) McAfee Drive Encryption (DED) AKA EEPC, EEMAC and Endpoint Encryption for PCs and Macs, (3) McAfee File & Removable Media Protection (DFF) AKA Files & Folders, EEFF, EERM.
Join this webinar on Endpoint Encryption and learn about:
• McAfee Complete Data Protection Suites – New
• How these new suites are becoming available to you
• How to securely manage your endpoints from a single console while simultaneously providing self-service features for your end-users
• Use cases on leveraging the synergy between Intel® vPro™ and McAfee Data Protection technologies
• Management of Native Encryption v1.0
• Reference material available to you at the Endpoint Encryption Community site
Pat Correia is responsible for Endpoint Encryption Product Marketing at McAfee. Previous to Intel, Pat held various technical and product marketing positions at Intel for 15 years, driving many key projects in Pentium chipset, Pentium and Xeon processors, industry platform initiatives including PCI Express and Ultra Mobile PC, and corporate brand campaigns for Core 2 Duo based multi-core platforms and software, all targeted to OEMs and ODMs world-wide.
Deepak Kolingivadi is a Product Manager in the Management Business Unit at McAfee and responsible for formulating the strategy for products like McAfee ePO Deep Command and McAfee Risk Advisor. Deepak has 15 years of industry experience, of which 11 years have been in the field of Digital Security. Deepak is experienced in developing product strategy and roadmap for security products as well as conceptualizing and engineering them.
Data breaches are reaching epidemic proportions. According to the 2011 Verizon Report, there were more breaches in 2010 than the previous three years the study was conducted. The report also revealed that a whopping 79 percent of organizations were not fully compliant with the Payment Card Industry Data Security Standard (PCI DSS), despite validation a year earlier.
To combat this growing trend, many businesses are turning to tokenization and encryption to increase data security and reduce the challenge of PCI DSS compliance. This discussion will take a closer look at the state of the industry, provide a technological overview of tokenization and encryption, cite specific case studies and explain how to use tokenization and encryption as a one-two punch.
Not surprisingly, companies are continuing to increase their use of encryption and other data protection techniques in response to data breaches and cyber attacks. But some of the other top deployment reasons – and techniques being used -- may surprise you.
Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:
• Variation in encryption and key management trends across multiple vertical industries
• Attitudes regarding protection of sensitive data in the cloud
• Types of data that are most commonly encrypted
• Common use cases for encryption, and where Hardware Security Modules are most commonly deployed for key protection and management
Interested in encryption, but not sure where to start? Watch “Encryption: Decoded” for insights on how to select the right solution for your environment.
Join an ESET sales engineer for this in-depth review:
• What pain points encryption can address
• What to ask encryption solution providers
• How to successfully implement encryption policies
Join us in collaboration with 451 Research on March 23rd for "Are You the Keymaster? Encryption, Key Management and Data Control in the Cloud".Read more >
Email continues to be the number one source of data loss risks. If your organization handles data governed by regulations such as PCI, HIPAA or GLBA, you need to ensure that your email system can protect sensitive information from improper exposure, while also enabling secure communication your customers, clients and business partners. Join this discussion to learn more about requirements for protecting sensitive data in email. You’ll learn how automatic, policy-based email encryption can provide effective protection for sensitive information in email and why it be should be a central part of your approach to compliance.Read more >
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 25th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.Read more >
IT organizations face rising challenges to protect more data and applications in the face of growing data security threats as they deploy encryption on vastly larger scales and across cloud and hybrid environments. By moving past silo-constrained encryption and deploying encryption as an IT service centrally, uniformly, and at scale across the enterprise, your organization can benefit from unmatched coverage— whether you are securing databases, applications, file servers, and storage in the traditional data center, virtualized environments, and the cloud, and as the data moves between these different environments. When complemented by centralized key management, your organization can apply data protection where it needs it, when it needs it, and how it needs it—according to the unique needs of your business. Join us on November 10th to learn how to unshare your data, while sharing the IT services that keep your data secure, efficiently and effectively in the cloud and across your entire infrastructure.Read more >
Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.Read more >
Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. Attendees of this presentation will learn:
- Principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit
- Why certifications are important for meeting compliance regulations such as PCI-DSS and HIPAA/HITECH
- How key management systems work and how to evaluate vendor solutions.
This is a non-technical session but will be of value to developers and implementers. Attendees will learn the core principles of effective and secure encryption key management. These principles can be used in developing in-house key management solutions or in evaluating vendor solutions.
What you'll learn:
- What is encryption key management and why is it important?
- Principles of industry-standard key management
- Industry must-haves for effective key management
- Challenges of home grown key management solutions
- Important certifications for meeting compliance and evaluation vendors
Most corporate networks are complex and include various operating systems, servers and massive amounts of data. This data is transferred, stored and accessed across the network. In 2014, 43% of data breaches were classified as a result of lost or stolen drives or due to accidently making data public . Encrypting this data is a great way to protect against these risks but with so many different platforms, operating systems, servers and applications, the task can be daunting.
In this webcast, we’ll show you how Symantec’s Encryption solutions can help you achieve heterogeneous encryption across your entire network and of all critical data whether it’s at rest or in motion.
Join us on January 26th at 10am PT to learn how.
Join Gemalto on April 29th to hear Stan Mesceda, Senior Product Manager at Gemalto give his expertise on data in motion and the importance of High Speed EncryptionRead more >