Hi [[ session.user.profile.firstName ]]

How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security.

Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.

In this webinar, you will learn critical aspects to securing data in a variety of ways:

1) Three approaches to securing data-at-rest
2) How software-defined policies can ease security management
3) The role that key management plays in securing data-at-rest
4) How real-time alerting can take your security posture to the next level
Recorded Oct 26 2016 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Rothschild, Sr. Manager Product Alliances and Marketing, Vormetric
Presentation preview: How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Best Practices for GDPR when hosting data off-premises Recorded: Nov 17 2017 49 mins
    Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity
    GDPR is coming into force in May 2018. Many organisations are now getting into gear in order to ensure they are compliant by the deadline. This is even more important for those organisations who are hosting their data off premises.

    But what does GDPR really mean to businesses, how will it impact the way in which organisations handle their data and engage with trusted third parties?

    Join Matthew Johns, Product Marketing Manager of CenturyLink and Slam Laqtib, Senior Product Manager of Thales eSecurity for a thought provoking discussion drawing from real-life examples on:

    1) Organisational best practices when working with cloud service providers to adhere to GDPR

    2) Key factors organisations to take into account when complying to GDPR

    3) The steps global enterprises are taking get themselves #fit4GDPR
  • 2017 Global PKI Trends: PKI at the Crossroads Recorded: Nov 8 2017 62 mins
    Dr. Larry Ponemon, Chairman & Founder, Ponemon Institute and John Grimm, Sr Director of Security Strategy, Thales e-Security
    PKI (public key infrastructure) has quietly become one of the most critical assets for enterprises today. Our 2017 study, conducted by the Ponemon Institute and sponsored by Thales e-Security, reveals an increase in the number of applications that use digital certificates, that enterprises are investing in fortifying the security posture of their PKIs, and that the IoT is the next game-changer for the future of PKI.

    Join this webcast to learn about the top findings of this research, including:

    • The increasing influence of the IoT in PKI planning
    • The increasing security maturity of enterprise PKIs including the use of Hardware Security Modules
    • Identification of enterprise applications that commonly depend on PKI credentials
    • The ongoing challenges associated with PKI deployment and management
  • Beyond GDPR: Best Practices for Data Protection Recorded: Sep 14 2017 55 mins
    Aaron Davis, Sr Product Marketing Manager, PKI, Entrust Datacard & Juan Asenjo Sr Partner Marketing Manager, Thales eSecurity
    In this webinar, we will examine the key elements necessary to protect sensitive data. The focus will be on comprehensive security aspects that enterprises need to consider going forward. The webinar will expand on how the General Data Protection Regulation (GDPR) is just the beginning; a set of best practices that every organization should adhere to, not just in the EU but globally, to use security as an enabler for a safe digital future.
    Topics discussed will include the expanded ecosystem of users, devices, applications, and things that must coexist in a trusted environment, as enterprises transform operations to depend on an all-digital infrastructure.

    Join the webinar to learn:

    • Why GDPR is only the beginning - cutting through the noise
    • How digital business is driving new approaches to data security
    • What are the best practices for improving data hygiene
  • Combating Data Breaches: Proactive Defence during a Digital Transformation Recorded: Aug 2 2017 64 mins
    Ian Greenwood, Regional Sales Manager and Mark Penny, PKI Security Consultant, Professional Services EMEA, Thales e-Security
    Combating Data Breaches: Proactive Defence during a Digital Transformation
    Join Herjavec Group and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.
    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.
    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    Topics covered during the webinar:

     Complex and sophisticated data threat landscape

     GDPR at a glance

     Digital transformation ambitions and challenges

     Why adopt a data encryption strategy?

     Focus on how encryption and key management solutions can help you comply, secure and keep control of your data

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • Data Security – Identifying Your Last Line of Defense Recorded: Jul 13 2017 54 mins
    Jules Anderson – UK Regional Sales Manager, Thales e-Security
    Join Verisec and Thales and gain a deeper understanding into how you can review your data security in an efficient and effective way to enable your organisation to focus on the truly challenging areas of data security and compliance.

    Sensitive data continues to make it into a broader set of environments, including cloud deployments, big data platforms, virtualised systems, and more. The policies and regulatory mandates in effect continue to grow more stringent. At the same time, these groups have to guard against more sophisticated cyber-attacks, and the continuous threats posed by users that have stolen privileged user credentials.

    To adapt to these expanding demands, IT and security professionals have to leverage technologies that offer a strong mix of security, implementation flexibility, and operational efficiency.

    During this webinar we will cover:
    - Compliance with privacy and data security requirements (helping you comply with the critical Article 32 and 34 GDPR rules)

    - Cyber-security risk management and mitigation - using Thales encryption, an organisation can render private data unintelligible to a cyber-intruder (external or internal) even in the event of a breach

    - Enabling organisations to securely drive digital transformation such as BYOD, Cloud Migration, IoT, Blockchain

    - Giving organisations capability to keep control and visibility on their data and encryption keys while moving to the cloud

    This introduction is aimed at those within your organisation looking to gain an insight into data protection and the potential challenges that your organisation could face.
  • IT Sicherheitsbedrohungen in Deutschland 2017 Recorded: Jul 6 2017 35 mins
    Mario Galatovic, Business Development Manager, and Bernd Stamp, Technical Lead DACH, Thales e-Security
    Datensicherheitsvorfälle. DSGVO Risiken. Daten in der Cloud, Big Data und das Internet der Dinge (IoT).

    95% aller deutschen Unternehmen glauben, dass sie nicht ausreichend gegen Cyberangriffe geschützt sind

    Was erleben Unternehmen in Deutschland und wie gehen sie mit den Herausforderungen um?

    Basierend auf der Forschung des renommierten IT-Marktforschungs- und Beratungsunternehmen 451 Research zeigen die Ergebnisse des Thales Data Threat Reports 2017 wie Unternehmen in Deutschland auf die Herausforderungen in Bezug auf ihre Daten reagieren. Diese beziehen sich auf die gestiegenen Anforderungen an Daten um das Geschäftswachstum zu unterstützen, und gehen bis hin zu regulatorischen Anforderungen, die Implementierung fortschrittlicher Technologien sowie Datensicherheitsvorfälle. Die Risiken für vertrauliche persönliche Informationen, Finanzdaten und kritische Unternehmensdaten steigen.
    Dieses Webinar behandelt die Sicherheitsbedrohungen in Bezug auf Daten für Unternehmen, was Organisationen machen um Daten zu schützen, und praktische Empfehlungen für die Sicherheit von vertraulichen und sensitiven Daten.

    Nehmen Sie an unserem Webinar teil und erfahren Sie mehr zu folgenden Punkten:
    • Die Auswirkungen von fortschrittlichen Technologien wie Container, IoT, Big Data und die Cloud und welche Herangehensweisen gebraucht werden um dort kritische und sensitive Daten zu schützen.
    • Die Art und Weise, wie neue Datenschutzregelungen die Strategie für Datensicherheit beeinflussen.
    • Auf welche Herausforderungen Unternehmen treffen, wenn sie Datensicherheitsinstrumente einsetzen und nutzen – und wie man diese Herausforderungen bewältigen kann
    • Die Ausgaben für IT Sicherheit steigen, Antreiber hier sind Compliance und Bedenken in Bezug auf Datensicherheit
  • eIDAS: Enabling Convenience and Confidence in Digital Transactions Recorded: Jun 22 2017 53 mins
    Juan Asenjo, Senior Manager - Partner Marketing, Thales e-Security.
    The EU’s Electronic Identification and Trust Services (eIDAS) Regulation establishes legally binding electronic signatures for secure cross-border transactions. Businesses and consumers alike stand to benefit from the convenience and confidence that the new capability enables. To make this digital transformation a reality, an ecosystem of trusted identity, signature, time stamping, and validation services is being deployed across the continent. Whether you are one of these trust service providers, an organization accepting digital transactions form clients, or that consumer end user, eIDAS will impact your daily life.

    Thales and its technology partners play a critical role in the eIDAS ecosystem. As qualified signature creation devices (QSCDs), Thales nShield hardware security modules (HSMs) establish the root of trust for eIDAS trust services. Join this webcast to learn how Thales is serving the eIDAS community and helping you achieve the digital transformation.

    WHAT YOU WILL LEARN:
    • What eIDAS means to organizations and consumers
    • How eIDAS is changing the way we all do business
    • Why a robust root of trust is so important for security
    • Where eIDAS is having its initial impact – case stories
  • NY DFS Cybersecurity Regulations - Are You Prepared? Recorded: Jun 15 2017 59 mins
    Pamela Gupta, President, Outsecure Inc., Kenneth N. Rashbaum, Esq., Cybersecurity Practice Group, Barton LLP, New York, NY
    New York State Department of Financial Services(DFS) has enacted rigorous, first-in-the-nation cybersecurity regulations for financial institutions and others that do business in the state. It is clear that regulators are raising the bar for the security of confidential and sensitive data.

    August 30 2017 is the first milestone date for this regulation. What is the state of your compliance?

    Join us for a lively discussion with a panel of experts around the following topics:

    •Understanding the legal drivers for the DFS regulation In addition to the directly covered entities of DFS, FINRA & SEC covered entities should be closely following the DFS
    •What this new regulation means to you
    •Why a thorough risk assessment is necessary
    •Best practices and tools for fully complying with this new regulation
  • Key Management in the world of Multiple Cloud providers Recorded: Jun 6 2017 55 mins
    Adrian Lane, Analyst and CTO, Securosis and Vikram Ramesh, Sr. Director of Solutions and Partner Marketing, Thales e-Security
    Controlling encryption keys — and thus your data — while adopting cloud services is one of the more difficult puzzles in moving to the cloud.

    Customers need to know if there is a consistent way to handle this across all their cloud services.

    In this webinar Adrian Lane (Securosis) and Vikram Ramesh (Thales e-Security) will discuss challenges specific to multi-cloud key management and why customers may need something different than the native encryption options offered by their cloud providers. They will help you select the right strategy from the many possible combinations, how each customer requirement maps to different deployment options, and what to look for in a key management system.
  • Tick, Tock: Just 1 Year to GDPR Enforcement – How to be technology ready Recorded: May 25 2017 56 mins
    Derek Brink, VP, Research Fellow, Information Technology
    Just one year remains before enforcement of the EU General Data Protection Regulation (GDPR) goes into effect. It’s arguably the most important privacy regulation in a generation. But it’s time to move beyond mere awareness and understanding of what GDPR is, and start making decisions about how you’re going to address it.

    In this webinar, join Derek Brink, vice president and research fellow for Aberdeen Group, and Neil Cooper, Regional Sales Manager, UK&I, for Thales eSecurity, as they share the following helpful insights:

    • Short synopsis of the timeline and key provisions of GDPR
    • Quantify the business risk of GDPR, in terms of both the likelihood and the business impact of non-compliance
    • Summarise the six fundamental strategies for safeguarding sensitive data
    • Identify the three most important capabilities for addressing GDPR requirements
  • Data Encryption for the Cloud-First Era Recorded: May 18 2017 58 mins
    Doug Cahill, Senior Analyst, at Enterprise Strategy Group, Inc.
    The broad adoption of cloud applications has resulted in more and more data assets leaving the corporate perimeter and being stored in the cloud. However, many organizations need to retool their cybersecurity processes, skills, and technology to be ready for the Cloud First Era. This webinar will explore how bring your own key (BYOK) and Key Management as a Service (KMaaS) offers flexible enterprise-class data encryption capabilities to secure cloud-resident data and meet and maintain compliance with industry regulations.

    About the presenter:

    Doug Cahill is a senior analyst covering cybersecurity at Enterprise Strategy Group drawing upon more than 25 years of industry experience across a broad range of cloud, host, and network-based products and markets.

    Prior to joining ESG, Doug held executive leadership positions at security firms Threat Stack and Bit9 where he launched market leading products and forged strategic partnerships. Over the course of his career, Doug has also served in product management, marketing, and business development roles for cybersecurity, storage management, networking, and database vendors, and started his career in IT as a business analyst. 
  • Data Protection for IoT – Securing Enterprise Business Intelligence Recorded: May 17 2017 58 mins
    Jay Irwin, Director, Teradata InfoSec COE and Andrew Lance Sr. Manager, Business Development at Thales e-Security
    The Internet of Things (IoT) has us now counting data elements in the trillions. Collecting, storing, and analyzing this data is transforming business intelligence. However, with this new capability, security is also essential. Teradata offers a best-in-class platform for IoT data processing, storage, and analytics. Together with Thales, the solution address the evolving business intelligence needs of enterprises, while protecting data elements and business intelligence. In this webinar, we will examine the key elements necessary to process IoT data, and the security aspects that enterprises need to focus on to safely harness the power of the technology.

    • Examine the realities of IoT data processing and analytics
    • Describe the architectures needed to support the capability
    • Analyze drivers and technique to secure IoT data elements
  • 2017 Global Encryption State of the State: The Latest Cloud Trends and More! Recorded: Apr 19 2017 62 mins
    Dr. Larry Ponemon, Chairman & Founder of Ponemon Institute, John Grimm, Sr. Director of Security Strategy, Thales e-Security
    This twelfth installment of the Ponemon Global Encryption Trends study, sponsored by Thales e-Security, reveals both deployment plans and pains associated with increasingly aggressive cloud and data protection strategies. Although compliance remains a top driver for encryption, the gap has narrowed as organizations move to protect sensitive IP and customer information from both external and internal threats. Join Larry Ponemon and John Grimm to learn about some of the top findings in this year’s Global Encryption Trends Study, including:

    • Variation in encryption and key management trends across multiple vertical industries
    • Attitudes regarding protection of sensitive data and control of keys in the cloud
    • Types of data most commonly encrypted, and associated applications that perform the encryption
    • The role of Hardware Security Modules (HSMs) in addressing cloud and enterprise encryption and key management use cases.
  • 2017 Data Threats – The Big Disconnect Recorded: Feb 8 2017 53 mins
    Andy Kicklighter, Director - Product Strategy, Thales e-Security
    Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect.

    In this webinar Andy Kicklighter with Thales e-Security, and four time prime mover behind the Thales Data Threat Report, reviews the detailed findings of the report.

    The 2017 Data Threat Report – Global Edition will be showcased with an emphasis about the data threats that enterprises are experiencing, what they are doing to secure their data and actionable recommendations that can be used today to secure their sensitive data from data threats.

    • IT Security spending is increasing at 73% of enterprises driven by compliance and data security concerns
    • Data breaches at enterprises are also up - with 68% of enterprises experiencing a breach, 26% in the last year
    • What’s behind the big disconnect? And what should you be doing?
  • How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security. Recorded: Oct 26 2016 28 mins
    Michael Rothschild, Sr. Manager Product Alliances and Marketing, Vormetric
    Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.

    In this webinar, you will learn critical aspects to securing data in a variety of ways:

    1) Three approaches to securing data-at-rest
    2) How software-defined policies can ease security management
    3) The role that key management plays in securing data-at-rest
    4) How real-time alerting can take your security posture to the next level
  • Protecting Data in line with the Australian Data Breach Notification Recorded: Sep 15 2016 36 mins
    Brian Grant, Vormetric & Marta Ganko, Deloitte Touche Tohmatsu
    Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities.
    With cybercrime and cyber threats exponentially increasing, organisations need to ensure their data security strategy is both comprehensive and stringent enough to deal with internal, external threats, audits and legislation.
    This webcast will explain and guide organisations in order to effectively prepare for the forthcoming legislation but to also better prepare your business to thwart the on-going cyber risks it faces daily.
    During the session, you will:
    a)Understand how the complexity and sophistication of cyber threat can damage your business
    b)Outline the proposed data breach notification and what it means for your business
    c)Highlight a best practice approach to safe-guarding your data
  • Virtualization Unwrapped – How to Scale While Remaining Secure Recorded: Jul 27 2016 57 mins
    Chris Olive, Vormetric & Adam Sekora, SimpliVity
    There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.
  • Scalability & Security – Will we always be playing catch-up? Recorded: Jun 9 2016 42 mins
    Michael Rothschild - Vormetric & Rohit Goyal - Nutanix
    With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in more locations using more cloud based applications – both public and private - and transferring huge amounts of data. Is it even possible to ensure always-on capabilities while also being secure?
    Join us for this exciting webcast where we will talk about the security and scalability challenges that organizations face as well as the enterprise cloud concept – the new approach many organizations are turning to in order to ensure secure “any-to-any service”. Any app, anywhere, anytime, always secured.
  • The Eye of The Security Cyberstorm Recorded: May 11 2016 50 mins
    Chris Olive, Vormetric & Kevin Jackson, FireEye
    It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust most, namely people that have access to your privileged information and data. This insider threat can be your customers, partners and even your employees that accidentally or purposefully release or acquire sensitive data and use it for something other than what it was meant for.

    Just imagine if you had a complete and panoramic scene sizeup along with the ability to proactively address potential threats of both the traditional threat vector of outsiders gaining information as well as the increasingly common and dangerous internal threat. Join us as we discuss this important topic as well as how you can ensure that your organization does not find itself in the eye of the security cyberstorm..
  • Making The Migration From EOPS to Vormetric Data Security Recorded: Apr 11 2016 36 mins
    Brent Hansen & Michael Rothschild, Vormetric, a Thales Company
    RSA has notified current users of End Of Product Support (EOPS) for their Data Protection Manager (DPM). Join us to hear about Vormetric's accelerated and proven migration for current RSA DPM customers to the Vormetric Platform.
Vormetric
Vormetric

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security.
  • Live at: Oct 26 2016 4:30 pm
  • Presented by: Michael Rothschild, Sr. Manager Product Alliances and Marketing, Vormetric
  • From:
Your email has been sent.
or close