Hi [[ session.user.profile.firstName ]]

Keys to the Castle

How to protect your digital crown jewels with the most robust security measures. Don’t let digital intruders into your castle and impact your productivity.
Recorded Oct 20 2016 4 mins
Your place is confirmed,
we'll send you email reminders
Presented by
WinMagic
Presentation preview: Keys to the Castle

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What would you do if you lost all your data…? Recorded: Jul 19 2018 32 mins
    Ben Searle, EMEA Alliance Manager @ WinMagic
    Data is the cornerstone of every organisation. Join WinMagic and Bechtle at this webinar where we’ll discuss how to protect your data from endpoint to cloud. You’ll learn the steps you need to take to ensure you’re confident that your data is secure.
  • Encryption – An Important Pillar of Data Security Strategy Recorded: Jul 17 2018 34 mins
    Rahul Kumar, Country Manager, India, SAARC
    How do you prevent the loss of secure or confidential information of your organisation to an untrusted environment or user?
    Have you met various regulatory requirements regarding financial, health or personal Identifiable Information to avoid risk of massive fines if a breach occurs?
    Join Rahul Kumar, Country Manager India, WinMagic, for a 30 min webinar and ask him why Encryption should be an important pillar of your data security strategy.
  • GDPR has arrived. Have you done enough? Recorded: Jun 6 2018 24 mins
    Chaitanya Singh Rathore, Pre Sales Engineer
    Is your organization compliant? Are you still evaluating your readiness as per GDPR?

    Join us for a 30 mins webinar to have a quick peek into what specific steps to be taken for you to be compliant, who should be responsible for compliance, etc. And, learn how to tackle the many nuances of the EU GDPR.
    •Securing data at rest
    •State-of-the-art protection
    •Access management and monitoring
    •Compliance and reporting
  • Combating Cloud Security Challenges in BFSI: Tips, Tricks for protecting data Recorded: May 8 2018 25 mins
    Vaibhav Pathak, Sr. Pre Sales Engineer
    Join our experts for a 30-minute webinar to learn more about the tools available to reduce data security risk in virtualized and cloud environments.

    From:

    - Installing encryption as a foundation element of your data security strategy

    - Deploying strong cryptographic key management to support the requirements for protecting personally identifiable information (PII),

    - Account data and cardholder data under multiple regulatory standards

    Let us help you get headed on the right path.
  • Are Indian businesses ready for GDPR adoption? 5 tips to consider when assessing Recorded: Apr 18 2018 31 mins
    Raju Verranna, Sr. Pre Sales Engineer
    Learn more about GDPR, what specific steps you should take to be compliant, who should be responsible for compliance, etc. And, learn how to tackle the many nuances of the EU GDPR.
    •Securing data at rest
    •State-of-the-art protection
    •Access management and monitoring
    •Compliance and reporting
  • Simple and Secure OS Lifecycle Management Recorded: Apr 11 2018 45 mins
    Marc Roth, VP Sales, SWIMAGE || Marty Milbert, VP Enterprise, WinMagic || Aaron McIntosh, Channel Marketing, WinMagic
    Like other aspects of information processing systems, OS migration, deployment, and reimaging, and security of these processes is most effective and efficient if it is planned for and managed throughout a system's lifecycle - from initial planning through design, implementation, and operation to disposal. But does the process need to be as complex as you’re accustomed to? Are there better ways to manage it all? Are there ways to reduce time, effort, and risk when it comes to deploying and managing operating systems?

    Join SWIMAGE and WinMagic as they walk through the common challenges faced by organizations in managing the OS lifecycle, and discover some of the simple steps that can be taken to reduce process complexities and security risks – all while reducing costs.
  • How to Simplify and Secure Enterprise Clouds with Winmagic and Nutanix Recorded: Jan 18 2018 34 mins
    Aaron McIntosh, Senior Marketing Manager, WinMagic | Amanda Martinez, Alliances, Nutanix | James LaPalme, VP of BD, WinMagic
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models.

    WinMagic’s SecureDoc product suite, coupled with Nutanix, provides customers greater control and certainty over their data security through intelligent enterprise-controlled, cloud-agnostic key management & VM-level encryption.

    Join us as we unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment.

    In this webinar you will learn:
     
    Simplicity: Discover how to converge your entire datacenter stack into one solution, reducing silos, and simplifying your operations
    Scalability: Learn how you can flexibly and securely scale out to support dynamic workloads and evolving business needs of any size
    Manageability: Reduce the complexity of managing traditional infrastructure and security across a disparate array of platforms. Gain simplicity in meeting Compliance audits
  • Simplifying Security across your Universal I.T. Infrastructure Recorded: Nov 28 2017 50 mins
    Alan Conboy, Scale Computing, Office of the CTO | James LaPalme, WinMagic, VP of Business Development | Scott Van Woudenberg
    The future lies in turnkey cloud solutions like hyper-convergence, which is set to displace traditional server and storage models. Join leaders from Scale Computing, WinMagic and Google as they unravel some of the most critical considerations for establishing a high performance IT infrastructure that is not only flexible, fluid, and affordable, but provides the consistent security and simplicity needed across your entire environment – so that you can keep compliant within increasing data privacy regulations.

    Key Learnings:

    • Simplicity: Discover why managing infrastructure and security across a disparate array of platforms doesn’t need to be difficult
    • Scalability: Learn how you can start with a small deployment, and then flexibly and securely scale out to support dynamic workloads and evolving business needs
    • Portability: Virtualization and cloud offer a whole new realm of possibilities, so why limit your business to a single platform? Learn how to securely and efficiently move data from node to node, cluster to cluster, cloud to cloud.
    • Availability: Identify best practices for using and managing the data security within local, remote, and cloud-based backups to achieve high-availability and resiliency
    • Affordability: Find out how to achieve enterprise-grade hyper-convergence and data security on an SMB budget
  • A Data-Centric Approach to GDPR Recorded: Nov 7 2017 59 mins
    Simon Taylor, VP of Americas Enterprise
    So you’ve heard. EU GDPR is around the corner, with compliance expected by May 25th 2018. Understanding data as the core of GDPR compliance is essential to successful strategy. But where do you begin? According to Gartner, more than 50% of global companies will struggle to meet compliance by the expected deadline. So, how do you pragmatically plan for the short term without losing focus of a long term strategy?

    Join Simon Taylor as he discusses a data-centric approach to security across complex networks of physical, virtual and cloud infrastructure. Find out where encryption applies, and how it can help improve governance, reduce the risks of data loss, and lower compliance costs over the long-term.

    Key Learnings:
    Fundamentals and key components of EU GDPR
    Practical insights, best practices and where to begin
    Beyond compliance with a data-centric approach to security
  • Are your Virtual Machines on Public & Private Cloud Secure? Recorded: Sep 5 2017 32 mins
    Chaitanya Singh Rathore, Sr. Pre Sales Engineer
    Organizations are shifting to cloud environments (private, public or hybrid) and securing critical operations across multiple platforms has become very challenging. For optimum security, organizations need to ensure that the encryption keys are NOT:
    •Created & maintained by the cloud provider
    •Stored on the cloud
    •Accessible solely from within a web-based application offered by the provider

    Employing the right data security solution for the cloud can not only help you manage this complexity, but also saves on total IT costs, and improve end-user and IT Admin experience.

    ________________________________________
    REGISTER NOW to learn how to:
    •Protect multiple layers of data within your cloud environment with intelligent key management
    •Build a unified encryption strategy across any end point, virtualized or cloud IaaS environment
    •Overcome global IT geography (data governance) issues relating to Cloud
    •Create a secure and simple user experience
  • Windows 10: How to Protect your Data and Manage Compliance Recorded: Aug 2 2017 44 mins
    Ryan Sanders, Sales and Product Enablement Specialist & Daniel Reppmann, Director of Sales for Central and Eastern Europe
    As we move closer to a Windows 10 world, businesses need to secure their data without slowing down their IT staff or employees. Forward-thinking businesses are realizing the security and productivity benefits of migrating to Windows 10 as drastic improvements to BitLocker Drive Encryption have made it a viable option for data protection and compliance.

    WinMagic's Director of Sales for Central and Eastern Europe, Daniel Reppmann, and Sales and Product Enablement Specialist, and Ryan Sanders discuss how to improve security without compromising mobility and productivity using BitLocker and SecureDoc - Together.

    Key Learnings:

    ·Learn the security advantages of Windows 10 and BitLocker Drive Encryption
    ·Understand potential security gaps and roadblocks to productivity
    ·Discover 5 ways that you can leverage the best of BitLocker with SecureDoc
  • Does your data security create more pain than it solves? 5 steps to get it right Recorded: Jul 25 2017 36 mins
    Raju Verranna, Pre Sales Engineer
    Protecting sensitive client and corporate data is one of the most important responsibilities in any organization. So if your current solution isn’t working for all stakeholders, is it really working at all?

    Key learning:
    1. Increase security and compliance, while maintaining user-friendliness
    2. Deploy encryption without interrupting normal business processes
    3. Ease the daily burden of your data security administration
  • Cloud Security in Practice: PART 3 - A Guide to Facilitating DevOps Recorded: Jul 12 2017 31 mins
    Aaron McIntosh and Guests
    How do you maintain the flexibility and agility required while keeping your data secure at the same time? By eliminating the need to turn down a VM in order to encrypt it, by managing your process from image to server standup and by having proper auditing and control when turning up and down VMs. Join WinMagic to learn how encryption can be deployed without disrupting your DevOps environment.

    Key Learnings:

    •What are the benefits of encrypting in an active environment
    •How to ease daily administration burdens in a Cloud IaaS environment
    •Discover what steps can be taken to securely delete your data
  • Spotlight on India-How secure is your data in the Cloud? Secure before you share Recorded: Jun 21 2017 18 mins
    Raju Verranna, Sr. Pre Sales Engineer
    Employees use cloud based file sharing services like Dropbox, OneDrive for Business to store and share files. In most cases, these file sync services are quick to install, easy-to-use, consumer services that present unacceptable security, legal and business risk in a business environment.
    Register for our webinar to avoid risks associated with unprotected file sharing.
  • The Key to Protecting Data: Endpoint Encryption | Featuring Gartner Recorded: Jun 12 2017 2 mins
    Mark Hickman, COO
    If there is one absolute truth in business, it’s that data is now everywhere. Big or small, companies wrestle with keeping data secure with an ever expanding mobile and agile workforce.

    Increasingly companies are turning to endpoint encryption as the answer to protecting their data. What are the methods that companies can use to defend access to business data? What are the costs of data breaches, compared to preventative measures like endpoint encryption?

    In this portion of the webcast, Mark Hickman, COO, WinMagic, discusses how you can best prevent a data leak from occurring? And how you can find the right solution to secure your IT environment?

    View the entire webcast, featuring VP and Distinguished Analyst John Girard from Gartner. Click here: http://bit.ly/2sYDiiX
  • Cloud Security in Practice Series: PART 1 - Intelligent Security for Cloud IaaS Recorded: Jun 7 2017 30 mins
    WinMagic Cloud Team
    What are the 4 key considerations for establishing a smart policy for cloud IaaS protection and what is the best way to implement them? Join WinMagic to learn your role in the shared responsibility model, how to establish data governance protocols, meet auditing requirements, and implement the right level of granular policy control.

    Key Learnings:

    •Why you can’t defer responsibility to protect your data
    •What are the considerations for compliance and reporting in constantly changing regulatory conditions
    •Discover how flexible and granular control will grant better security
  • Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector Recorded: May 30 2017 34 mins
    Vaibhav Pathak, Sr. Pre Sales Engineer
    What does an IT/ITES organization need to consider in its efforts to protect itself from fraud, including data breaches?

    These organizations need to provide assurance to customers, clients, internal stakeholders and regulatory bodies that any data being collected and processed by businesses is secure or risk massive fines, public embarrassment, loss of business, or even a closure of it.

    Key learnings:

    •How to manage data security on shared computing resources?
    •How to secure storage and transfer of data on company-owned, or company-managed endpoints?
    •How to facilitate the path to meeting organizational and industry compliances?
    •How to ease the daily burden of your data security administration functions?
  • Spotlight on India-Encryption: A Better Way to Ensure Financial Confidentiality Recorded: Apr 19 2017 32 mins
    Raju Verranna, Sr. Pre Sales Engineer
    Financial industry is increasingly becoming the target of cyber-attacks & data breaches, despite having some of the most strict data controls.

    Learn how SecureDoc can help financial organizations to:

    •Provide simple and more efficient remote access to internal networks, without compromising system security
    •Secure storage and transfer of data on company-owned and employee-owned assets
    •Manage data security on shared computing resources
    •Prepare for the adoption of cloud services for employees, partners and clients
    •Ensure the organization meets all industry compliances
  • Spotlight on India - Are your Virtual Machines on Public & Private Cloud Secure? Recorded: Mar 21 2017 38 mins
    Vaibhav Pathak, Sr. Pre Sales Engineer
    Organizations are shifting to cloud environments and securing critical operations across multiple platforms has become very challenging. For optimum security, organizations need to ensure that the protective, encryption keys are NOT:
    •Created & maintained by the Cloud provider
    •Stored on the Cloud
    •Accessible solely from within a web-based application offered by the provider

    Key learnings:

    •How intelligent key management can assist with protecting the multiple layers of data within your Cloud environment
    •How to build a unified encryption strategy across ANY end point, virtualized or cloud IaaS environment
    •The secrets behind creating a secure, yet simple user experience
  • 5 Questions Security Professionals Should Ask Before Moving to the Cloud Recorded: Mar 15 2017 47 mins
    Aaron McIntosh, Product Marketing
    The evolving IT environment brings the Cloud into the fold, and so much more. Today, IT infrastructure is fast-moving and incredibly complex, making it difficult to secure data residing across physical, virtualized and cloud environments. But as the demand to adopt a cloud technology is ever increasing and is becoming a staple to an organization’s infrastructure, is securing the cloud a staple to an organization’s security strategy? Spend 45 minutes with WinMagic as they reveal the 5 questions that Security Professionals should ask themselves before moving to the cloud.

    Key Learnings:
    • What are the considerations for policy control
    • How to make the complexity of cloud security simple and sophisticated
    • Discover the importance of having the proper reporting and auditing controls
WinMagic
WinMagic, one of the most respected names in the data security business, encrypts over 8 million endpoints in 84 countries. Our award winning comprehensive encryption and intelligent key management solution is the best protection against sophisticated threats and data loss. SecureDoc by WinMagic provides everything encryption, securing data wherever it is stored by enabling a unified key management strategy across any end point and virtualized or Cloud IaaS environment.

Visit: http://www.winmagic.com

WinMagic may use your contact information to send you relevant information or offers. You can unsubscribe at any time.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Keys to the Castle
  • Live at: Oct 20 2016 3:55 pm
  • Presented by: WinMagic
  • From:
Your email has been sent.
or close