Hi [[ session.user.profile.firstName ]]

Enabling Data Security at the Employee Level

Business professionals are faced with an overwhelming amount of information that needs to be shared, both inside the organization and with external partners. The increasing need to share data efficiently must be balanced against the need to keep that data secure, and adopting the right new technology to meet those needs can be daunting: which solution is right for you?

Join KuppingerCole Senior Analyst Graham Williamson as he discusses how organizations can create a ‘culture of protection’ by providing employees with user-friendly tools that make it easy to share information securely.

You’ll hear:
•What technologies and tools can enable the most granular data protection
•How ease of use can make security second-nature for employees sharing information
•Where to start when it comes to determining your organization’s data sharing environment

Plus, all registrants will receive a complimentary copy of the KuppingerCole Leadership Compass, a multi-dimensional view of the overall leaders in the secure file sharing market.
Recorded Oct 29 2015 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Graham Williamson, Director and Senior Analyst, KuppingerCole
Presentation preview: Enabling Data Security at the Employee Level

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Information is the New Currency: Maximizing Value Recorded: Dec 3 2015 48 mins
    Vanessa Thompson, Research Director, IDC
    The amount of information generated by organizations and individual employees will only continue to grow. A workspace tool can be critical in helping users understand and manage the "right" information at the right time, and can help streamline interactions between different users across business units. But how can organizations, especially with heightened data privacy concerns, determine which collaboration solutions are user-friendly and secure?

    Register today to hear Vanessa Thompson, Research Director for IDC's Enterprise Social Networks and Collaborative Technologies program, talk about how organizations can enable team collaboration:
    •What are the most challenging tasks for users today?
    •How do I measure the business impact of team collaboration solutions?
    •What security requirements should I look for in a solution?
    Plus, all registrants will receive a complimentary copy of the IDC report “Worldwide Team Collaborative Applications Market Shares, 2014: The Year Personal Productivity Becomes Paramount.”
  • Enabling Data Security at the Employee Level Recorded: Oct 29 2015 49 mins
    Graham Williamson, Director and Senior Analyst, KuppingerCole
    Business professionals are faced with an overwhelming amount of information that needs to be shared, both inside the organization and with external partners. The increasing need to share data efficiently must be balanced against the need to keep that data secure, and adopting the right new technology to meet those needs can be daunting: which solution is right for you?

    Join KuppingerCole Senior Analyst Graham Williamson as he discusses how organizations can create a ‘culture of protection’ by providing employees with user-friendly tools that make it easy to share information securely.

    You’ll hear:
    •What technologies and tools can enable the most granular data protection
    •How ease of use can make security second-nature for employees sharing information
    •Where to start when it comes to determining your organization’s data sharing environment

    Plus, all registrants will receive a complimentary copy of the KuppingerCole Leadership Compass, a multi-dimensional view of the overall leaders in the secure file sharing market.
  • The Top Five Things to Know About File Sharing Recorded: Sep 24 2015 40 mins
    Michael Osterman, President, Osterman Research, Inc.
    File sharing is the single most common activity on corporate networks and between companies, and email is still the most-used channel for file sharing. It’s easy, it’s ubiquitous, and it gets the information to its destination with a single click. So what’s the problem with sharing files via email?

    Register today to hear Michael Osterman, President of Osterman Research, and Peter Brown, Director of Product Marketing, Intralinks, review:

    •The drawbacks and costs of relying on email for file sharing
    •The problems organizations face when employees turn to consumer-grade file sharing tools as a solution
    •The steps that organizations should consider for enterprise collaboration

    All registrants will receive a complimentary copy of the Osterman Research report “The Critical Need for Enterprise-Grade File Sync and Share Solutions,” including data from an in-depth survey on file sharing practices.
  • Don’t go rogue: Take control of your file sharing Recorded: Aug 25 2015 47 mins
    Rajneesh Chopra, VP of Product Management, Netskope and Todd Partridge, Director of Product Marketing, Intralinks
    Be honest: you don’t know how your employees are sharing sensitive information outside the company.

    You’re not alone. Half of respondents to a recent Ponemon Research survey acknowledged they don’t have visibility into how employees are using file sharing applications. Cloud collaboration solutions make your business more productive, but without proper controls they can quickly lead to data loss, security breaches, and regulatory failures.

    Join Intralinks, a leader in secure content collaboration solutions, and Netskope, a pioneer and leader in safe cloud enablement, as they discuss:

    · How to uncover and secure file sharing applications being used in the organization
    · Ways of enforcing regulatory compliance and governance across the enterprise, to ensure that information is always within your control
    · Approaches that will help support pending data privacy legislation
  • Data Security in 2015: Is it getting better? Recorded: Jul 29 2015 49 mins
    Graham Cluley
    Join data security expert Graham Cluley as he presents a mid-year review of the information security stories that have made news so far in 2015, and how the predictions he made in our January webinar have fared.

    With over 300,000 new pieces of malware created every day, company data has never been at greater risk. Hear from Graham about the vulnerabilities and risks that remain, and what organizations can do to address them.

    All webinar registrants will receive a copy of Graham’s report “Information Security in 2015: Just how much worse can things get?” on 2015 threats and keeping your data safe.
  • From Chaos to Control: Collaborating Securely in the Cloud Recorded: Jun 18 2015 45 mins
    Garrett Bekker, Senior Security Analyst, 451 Research and Alan Pelz-Sharpe, Research Director, Social Business, 451 Research
    Organizations today are struggling to balance the needs of their employees to share information freely against the increasingly complex demands of security and compliance requirements they must abide by.

    In this point/counterpoint webinar, Alan and Garrett will review and debate the key trends that are playing out in today’s workplace that are driving inevitably to the cloud for enterprise collaboration. But how can a fluffy cloud with no physical borders be truly secure?

    They will explore the answers to key questions:

    • What security options should organizations be considering?
    • Which are the best practices to keep in mind when migrating information and processes to the cloud?
    • When every supplier says their system is secure - who can you believe?
  • 5 Habits of Highly Compliant Marketers: Recorded: May 28 2015 28 mins
    Thor Johnson, CMO Intralinks and Lisa Cannon, Content Strategist and Writer
    The need to share content -- securely, collaboratively, immediately -- is critical to your job. You’re working with outside agencies and business partners, sharing documents that contain sensitive data like product designs, ad campaigns and customer data, to name just a few.

    According to research from the Ponemon Institute, more than six out of ten people report having accidentally forwarded files to individuals not authorized to see them. It’s time to create some good habits that will allow you to collaborate with internal and external resources and be 100% compliant with the regulations that govern your industry.

    Please join us for an interactive presentation about how new habits and tools can make it easy for you to be efficient and compliant, without sacrificing speed or creativity.
  • Data Sovereignty and the Cloud Recorded: May 21 2015 48 mins
    Holger Mueller, VP & Principal Analyst, Constellation Research and Todd Partridge, Director of Product Marketing, Intralinks
    Cloud computing has broken down traditional geographic borders, and defining data ‘location’ has become more complex. Global enterprises embracing the cloud must deal with the compliance and risk challenges that arise when information is distributed across multiple physical, logical, and legal locations.

    Join our guest Holger Mueller, Vice President and Principal Analyst, Constellation Research, and Todd Partridge, Product Marketing Director, as they explore the challenges of information governance in the cloud:

    - The critical emerging topic of data sovereignty and jurisdiction
    - How governments are responding in different ways to the questions of data privacy and ownership
    - What organizations must do to address the varying requirements and regulatory environments
  • Content is Still King – How to Choose a Secure Collaboration Castle Recorded: Mar 25 2015 48 mins
    TJ Keitt, Senior Analyst, Forrester Research and Peter Brown, Director, Product Marketing, Intralinks
    The continued growth of the business networks that employees, partners and customers use to share information is driving the need for collaboration tools that are available beyond firewalls, on any device. With the cloud emerging as the preferred place for these technologies, and a crowded landscape of potential vendors, how can your organization make the right choice?

    Join Forrester Research Analyst TJ Keitt and Product Marketing Director Peter Brown of Intralinks as they review:

    - The emerging types of cloud collaboration technologies and the key considerations to think through
    - The inherent value in having a collaboration platform that connects people to information
    - How to align the organizational need to collaborate while keeping information secure at every touchpoint
  • Data Security in 2014: Will 2015 be even worse? Recorded: Jan 21 2015 48 mins
    Data Security Expert Graham Cluley
    Register today to join independent data security expert Graham Cluley as he reviews the biggest computer security stories of the last 12 months, and hear his predictions of the threats in 2015 that may make headlines.

    With over 300,000 new pieces of malware created every day, your company's data has never been at greater risk.  If it wasn't bad enough staying on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, employees are potentially exposing your organization’s information by using consumer-grade cloud services that don’t employ enterprise-level security.

    Hear Graham’s review of 2014, and give his predictions about 2015 and the impact of:

    - The explosive growth of file sync and share providers and tools
    - The increased reliance on cloud storage by the enterprise
    - New technologies that protect information at the document level

    All webinar registrants will receive a copy of Graham’s upcoming report on 2015 threats and keeping your data safe.
  • Industry study: How data-centric security controls enable productivity Recorded: Dec 11 2014 48 mins
    Guest Heidi Shey, Analyst, Security and Risk, Forrester Research and Peter Brown, Direct of Product Development, Intralinks
    Do you know where your data is, and where it's going? As organizations enable employees to work anywhere, anytime, data-centric security controls are a critical part of your content management and information security strategy.

    Data classification creates a foundation for security control, while information rights management (IRM) is emerging as a new must-have capability. But IRM isn't the only control that security teams need to consider.

    Register now to hear guest speaker Heidi Shey, Analyst, Security and Risk at Forrester Research, discuss how the need for secure sharing of data within organizations are driving:

    • The future of data security
    • The key technologies to watch
    • The key considerations for securing information in the collaborative enterprise
  • New Ponemon Institute Research: The Risk of Unsecure File Sharing Recorded: Oct 23 2014 39 mins
    Dr. Larry Ponemon, Ph.D., Chairman and Founder, Ponemon Institute
    File sharing enables work and is proliferating in the enterprise environment. The unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Protecting information must be an essential requirement of any sharing solution.

    Extensive new research conducted by Ponemon Institute in North America and Europe reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control.

    - Half of all respondents lack the confidence to deal with risky file sharing practices
    - 62% of respondents accidentally sent files to unauthorized individuals outside the organization
    - 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations

    Learn more. Register now for this informative webinar with Dr. Larry Ponemon in which he will discuss:

    - Extent of the risk associated with unsecure file sharing
    - Individual behaviors driving and organizational responses to information loss
    - Key considerations for securing information in the collaborative enterprise

    And, receive a free copy of the research report from the Ponemon Institute.
Secure collaboration for the Enterprise
Maintain complete control over your information with a content management solution designed for large-scale enterprise needs and collaboration with external stakeholders.

Reduce risk while fostering greater productivity. Fully integrated IRM and detailed reporting ensure your organization is always audit-ready and working within stringent compliance regulations.

Share content, simply. And with greater flexibility. We want to change the way you think about collaboration. Work together quickly and more efficiently from your desktop, browser, and mobile device.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Enabling Data Security at the Employee Level
  • Live at: Oct 29 2015 3:00 pm
  • Presented by: Graham Williamson, Director and Senior Analyst, KuppingerCole
  • From:
Your email has been sent.
or close