Hi [[ session.user.profile.firstName ]]

Making The Migration From EOPS to Vormetric Data Security

RSA has notified current users of End Of Product Support (EOPS) for their Data Protection Manager (DPM). Join us to hear about Vormetric's accelerated and proven migration for current RSA DPM customers to the Vormetric Platform.
Recorded Apr 11 2016 36 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Brent Hansen & Michael Rothschild, Vormetric, a Thales Company
Presentation preview: Making The Migration From EOPS to Vormetric Data Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing the IoT with Teradata and Thales May 17 2017 3:00 pm UTC 60 mins
    Jay Irwin, Director, Teradata InfoSec COE and Andrew Lance Sr. Manager, Business Development at Thales e-Security
    The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.

    • Examine the realities of IoT data processing and analytics
    • Describe the architectures needed to support the capability
    • Analyze drivers and technique to secure IoT data elements
  • 2017 Global Encryption State of the State: The Latest Cloud Trends and More! Recorded: Apr 19 2017 62 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute, John Grimm, Sr. Director of Security Strategy, Thales e-Security
    This twelfth installment of the Ponemon Global Encryption Trends study, sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies. Although compliance remains a top driver for encryption, the gap has narrowed as organizations move to protect sensitive IP and customer information from both external and internal threats. Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Variation in encryption and key management trends across multiple vertical industries
    • Attitudes regarding protection of sensitive data and control of keys in the cloud
    • Types of data most commonly encrypted, and associated applications that perform the encryption
    • The role of Hardware Security Modules (HSMs) in addressing cloud and enterprise encryption and key management use cases.
  • 2017 Data Threats – The Big Disconnect Recorded: Feb 8 2017 53 mins
    Andy Kicklighter, Director - Product Strategy, Thales e-Security
    Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect.

    In this webinar Andy Kicklighter with Thales e-Security, and four time prime mover behind the Thales Data Threat Report, reviews the detailed findings of the report.

    The 2017 Data Threat Report – Global Edition will be showcased with an emphasis about the data threats that enterprises are experiencing, what they are doing to secure their data and actionable recommendations that can be used today to secure their sensitive data from data threats.

    • IT Security spending is increasing at 73% of enterprises driven by compliance and data security concerns
    • Data breaches at enterprises are also up - with 68% of enterprises experiencing a breach, 26% in the last year
    • What’s behind the big disconnect? And what should you be doing?
  • How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. Recorded: Oct 26 2016 28 mins
    Michael Rothschild, Sr. Manager Product Alliances and Marketing, Vormetric
    Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.

    In this webinar, you will learn critical aspects to securing data in a variety of ways:

    1) Three approaches to securing data-at-rest
    2) How software-defined policies can ease security management
    3) The role that key management plays in securing data-at-rest
    4) How real-time alerting can take your security posture to the next level
  • Protecting Data in line with the Australian Data Breach Notification Recorded: Sep 15 2016 36 mins
    Brian Grant, Vormetric & Marta Ganko, Deloitte Touche Tohmatsu
    Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities.
    With cybercrime and cyber threats exponentially increasing, organisations need to ensure their data security strategy is both comprehensive and stringent enough to deal with internal, external threats, audits and legislation.
    This webcast will explain and guide organisations in order to effectively prepare for the forthcoming legislation but to also better prepare your business to thwart the on-going cyber risks it faces daily.
    During the session, you will:
    a)Understand how the complexity and sophistication of cyber threat can damage your business
    b)Outline the proposed data breach notification and what it means for your business
    c)Highlight a best practice approach to safe-guarding your data
  • Virtualization Unwrapped – How to Scale While Remaining Secure Recorded: Jul 27 2016 57 mins
    Chris Olive, Vormetric & Adam Sekora, SimpliVity
    There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
  • Scalability & Security – Will we always be playing catch-up? Recorded: Jun 9 2016 42 mins
    Michael Rothschild - Vormetric & Rohit Goyal - Nutanix
    With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in more locations using more cloud based applications – both public and private - and transferring huge amounts of data. Is it even possible to ensure always-on capabilities while also being secure?
    Join us for this exciting webcast where we will talk about the security and scalability challenges that organizations face as well as the enterprise cloud concept – the new approach many organizations are turning to in order to ensure secure “any-to-any service”. Any app, anywhere, anytime, always secured.
  • The Eye of The Security Cyberstorm Recorded: May 11 2016 50 mins
    Chris Olive, Vormetric & Kevin Jackson, FireEye
    It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust most, namely people that have access to your privileged information and data. This insider threat can be your customers, partners and even your employees that accidentally or purposefully release or acquire sensitive data and use it for something other than what it was meant for.

    Just imagine if you had a complete and panoramic scene sizeup along with the ability to proactively address potential threats of both the traditional threat vector of outsiders gaining information as well as the increasingly common and dangerous internal threat. Join us as we discuss this important topic as well as how you can ensure that your organization does not find itself in the eye of the security cyberstorm..
  • Making The Migration From EOPS to Vormetric Data Security Recorded: Apr 11 2016 36 mins
    Brent Hansen & Michael Rothschild, Vormetric, a Thales Company
    RSA has notified current users of End Of Product Support (EOPS) for their Data Protection Manager (DPM). Join us to hear about Vormetric's accelerated and proven migration for current RSA DPM customers to the Vormetric Platform.
  • NoSQL – No (Security) Problem Recorded: Apr 5 2016 48 mins
    Brent Hansen, Vormetric & Don Pinto, Couchbase
    It’s unmistakable. Organizations both big and small are moving to Big Data because of the information they can gather and leverage. This data is so valuable because of the insights it provides and its ability to better position the company with the customer as well as the board. But these are not the only groups that are interested in Big Data. Criminals, miscreants and evildoers are also interested in getting their hands on this information to exploit credentials and other secret information for their own gain.

    In this session, we will discuss the common security issues that companies must deal with when moving to Big Data, as well as key steps you can take when deploying NoSQL to ensure that Big Data works for you rather than opening additional vulnerabilities in places you may have never considered.
  • Vormetric and EMA present: The Data Security Offense Playbook Recorded: Mar 24 2016 60 mins
    Michael Rothschild, Sr. Mgr Product & Alliances Mkting and Analyst Enterprise Management Assoc.
    By now, we all recognize the need of securing our data against the inevitable breach – but in doing so, is the business being put at risk in other ways? Often times putting security in place means the IT and security departments having to take a lot of time to learn, deploy, fine-tune and monitor the solution, effectively ‘back-burnering” initiatives that can drive the business forward. This can ultimately costs the business money. What security makes sense and is there a way to make it transparent to the IT and security manager? With more data in more places being more critical than ever, is it possible to deploy effective security that leverages and works in conjunction with your existing environment AND provides a great user experience for IT and the business?

    Join us for this Intel Security/Vormetric webcast where Analyst, EMA, will frame this increasing problem that often pits the business & IT folks against each other. Gain real knowledge into the issues confronting both, as well as real ways to solve some of the most daunting security issues without hitting the speedbumps to the business.

    Key take aways:
    1.Understand the challenge IT organizations must address today specifically with securing data against increase security threats
    2.Learn how security the joint Intel Security / Vormetric solution can help solve the need to secure environments specifically with McAfee DSM & ESM and Vormetric encryption and reporting
    3.Understand the applicability to the attendee’s business by learning about real use cases that are relevant to them
  • How Hyperconverged, Hypersecure Is Your Organization? Recorded: Dec 3 2015 41 mins
    Arun Gowda, Vormetric; Amit Jain, Nutanix
    With today’s speed of business and competitive marketplace, spending too much time having to test, deploy and fine tune your infrastructure needlessly consumes resources and puts you at a disadvantage. Just imagine an infrastructure that was flexible and simple and transparent security that while invisible, was highly secure.

    Join us for the Nutanix – Vormetric webcast which will discuss the most common infrastructure and security concerns that are draining valuable resources in organizations like yours and how you can stop the bleeding. Join us to learn about the Nutanix Hyperconverged Infrastructure & Vormetric Transparent Encryption.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Making The Migration From EOPS to Vormetric Data Security
  • Live at: Apr 11 2016 6:00 pm
  • Presented by: Brent Hansen & Michael Rothschild, Vormetric, a Thales Company
  • From:
Your email has been sent.
or close