Hi [[ session.user.profile.firstName ]]

Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector

What does an IT/ITES organization need to consider in its efforts to protect itself from fraud, including data breaches?

These organizations need to provide assurance to customers, clients, internal stakeholders and regulatory bodies that any data being collected and processed by businesses is secure or risk massive fines, public embarrassment, loss of business, or even a closure of it.

Key learnings:

•How to manage data security on shared computing resources?
•How to secure storage and transfer of data on company-owned, or company-managed endpoints?
•How to facilitate the path to meeting organizational and industry compliances?
•How to ease the daily burden of your data security administration functions?
Live online May 23 9:30 am UTC
or after on demand 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Vaibhav Pathak, Sr. Pre Sales Engineer
Presentation preview: Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector May 23 2017 9:30 am UTC 45 mins
    Vaibhav Pathak, Sr. Pre Sales Engineer
    What does an IT/ITES organization need to consider in its efforts to protect itself from fraud, including data breaches?

    These organizations need to provide assurance to customers, clients, internal stakeholders and regulatory bodies that any data being collected and processed by businesses is secure or risk massive fines, public embarrassment, loss of business, or even a closure of it.

    Key learnings:

    •How to manage data security on shared computing resources?
    •How to secure storage and transfer of data on company-owned, or company-managed endpoints?
    •How to facilitate the path to meeting organizational and industry compliances?
    •How to ease the daily burden of your data security administration functions?
  • Spotlight on India-Encryption: A Better Way to Ensure Financial Confidentiality Recorded: Apr 19 2017 32 mins
    Raju Verranna, Sr. Pre Sales Engineer
    Financial industry is increasingly becoming the target of cyber-attacks & data breaches, despite having some of the most strict data controls.

    Learn how SecureDoc can help financial organizations to:

    •Provide simple and more efficient remote access to internal networks, without compromising system security
    •Secure storage and transfer of data on company-owned and employee-owned assets
    •Manage data security on shared computing resources
    •Prepare for the adoption of cloud services for employees, partners and clients
    •Ensure the organization meets all industry compliances
  • Spotlight on India - Are your Virtual Machines on Public & Private Cloud Secure? Recorded: Mar 21 2017 38 mins
    Vaibhav Pathak, Sr. Pre Sales Engineer
    Organizations are shifting to cloud environments and securing critical operations across multiple platforms has become very challenging. For optimum security, organizations need to ensure that the protective, encryption keys are NOT:
    •Created & maintained by the Cloud provider
    •Stored on the Cloud
    •Accessible solely from within a web-based application offered by the provider

    Key learnings:

    •How intelligent key management can assist with protecting the multiple layers of data within your Cloud environment
    •How to build a unified encryption strategy across ANY end point, virtualized or cloud IaaS environment
    •The secrets behind creating a secure, yet simple user experience
  • 5 Questions Security Professionals Should Ask Before Moving to the Cloud Recorded: Mar 15 2017 47 mins
    Aaron McIntosh, Product Marketing
    The evolving IT environment brings the Cloud into the fold, and so much more. Today, IT infrastructure is fast-moving and incredibly complex, making it difficult to secure data residing across physical, virtualized and cloud environments. But as the demand to adopt a cloud technology is ever increasing and is becoming a staple to an organization’s infrastructure, is securing the cloud a staple to an organization’s security strategy? Spend 45 minutes with WinMagic as they reveal the 5 questions that Security Professionals should ask themselves before moving to the cloud.

    Key Learnings:
    • What are the considerations for policy control
    • How to make the complexity of cloud security simple and sophisticated
    • Discover the importance of having the proper reporting and auditing controls
  • Spotlight on INDIA – Beyond Compliance: Conquering Data Security in Pharma Recorded: Feb 22 2017 39 mins
    Chaitanya Singh Rathore, Pre Sales Engineer
    Economies hit annually with billions through cybercrime & implications of cybercrime within the pharmaceutical and healthcare industry go beyond the obvious financial damage because of the:

    •Intellectual property
    •Lack of right Data Security strategy to protect against cyber-attacks
    •Insiders rather than external hackers who hold large amounts of valuable IP and trade secrets (DuPont breach in 2012)

    Key learnings:
    •The best way to protect sensitive information, including Patent Files, Legal filings, Prescription Records, Insurance Records, and Sales Details from breaches
    •How to secure private data from theft or loss to reduce liability
    •How to manage a multi-device complex IT environment with ease
  • Spotlight on EMEA:Unlock the full potential of BitLocker – with SecureDoc On Top Recorded: Feb 15 2017 33 mins
    Ben Thirlby, Corporate Account Manager
    As the simplest way to mitigate risks, many organisations are opting to deploy the Full Disk Encryption (FDE) capabilities built into their operating systems as an enterprise standard. For enterprises dominated by the Windows OS, experts highly recommend that to get the most out of BitLocker, organisations should consider a third party BitLocker management solution. So take 30 minutes with WinMagic’s Corporate Account Manager, Ben Thirlby, and learn how to achieve more robust security from your BitLocker deployment.

    Key Learnings:
    1.Why you should support a multi-OS or BYOD environment within one solution
    2.How you can reduce the current pressures on your help desk and IT Admins
    3.Discover how an intelligent key management solution can simplify your encryption needs, from deployment to compliance
  • Encryption for the Now Generation - Build Your 2017 Strategic Roadmap Recorded: Jan 11 2017 34 mins
    Aaron McIntosh, Senior Product Marketing Manager, WinMagic
    The landscape of the traditional work environment has changed and continues to evolve at a rapid pace. And while organizations are reaping the productivity rewards of an increasingly mobile workforce, data loss becomes a growing concern. Businesses need to secure their data without slowing down their employees. Spend 45 minutes with WinMagic’s Senior Product Marketing Manager, Aaron McIntosh, and learn how to be secure when embracing workforce mobility and productivity.

    Key Learnings:
    1. How you can support a multi-OS or BYOD environment with an consistent security policy
    2. How you can increase security awareness and adoption using an employee-centric mindset
    3. Discover how to build your 2017 strategic roadmap for PCs, tablets and other managed endpoints
  • Data Security in Healthcare Recorded: Dec 5 2016 4 mins
    WinMagic
    How to balance the security of patient data and the need for productivity in your healthcare organization with the right solution.
  • Keys to the Castle Recorded: Oct 20 2016 4 mins
    WinMagic
    How to protect your digital crown jewels with the most robust security measures. Don’t let digital intruders into your castle and impact your productivity.
  • Enterprise Controlled Unified Key Management & Full Disc VM Encryption for Cloud Recorded: Oct 18 2016 41 mins
    James LaPalme, VP of Business Development and Cloud Solutions
    Most enterprises that are evolving or expanding on their public cloud environments are building up different silos of security for their public and private clouds, leading to increases in complexity and management of the security environment. The recommended approach is to collapse the silos and have a multi-vendor single platform and a common encryption strategy for your entire cloud portfolio. Spend 40 minutes with WinMagic’s VP of Business Development and Cloud Solutions, James LaPalme, and learn how intelligent key management can assist with securing your sensitive data wherever it resides.

    Key Learnings:
    1.Why you should apply smart encryption to better protect your sensitive data in private, public and hybrid clouds
    2.How can you build a unified common encryption strategy across your entire enterprise from end point to cloud services
    3.Discover the importance of protecting a multi-vendor cloud environment
  • What you Never Believed BitLocker Could Do! Recorded: Oct 11 2016 22 mins
    Aaron McIntosh, Product Marketing
    As the simplest way to mitigate risks, many organizations are opting to deploy the full disk encryption (FDE) capabilities built into their operating systems as an enterprise standard. For enterprises dominated by the Windows Operating System, experts highly recommend that to get the most out of BitLocker, organizations should consider a third party BitLocker management solution. So take 30 minutes with WinMagic’s Senior Product Marketing Manager, Aaron McIntosh, and learn how to achieve more robust security from your BitLocker deployment.

    Key Learnings:
    1.Why you should support a multi-OS or BYOD environment within one solution
    2.How you can reduce the current pressures on your help desk and IT Admins
    3.Discover how an intelligent key management solution can simplify your encryption needs, from deployment to compliance
  • Spotlight on India: Data Protection on the Cloud – Public, Private and Hybrid Recorded: Jun 21 2016 44 mins
    Vaibhav Pathak, Senior Presales Engineer
    Enterprises today are progressively moving more of their infrastructure towards cloud and keeping the core functions on premise. This environment opens up some vulnerability on the cloud and not all enterprises are aware that security of data on the cloud is their responsibility. So how do you avoid the risks of the cloud? Take 45 minutes and join WinMagic’s Senior Presales Engineer, Vaibhav Pathak as he discusses how to encrypt your instances on Public, Private and Hybrid Clouds.

    Key Learnings:
    1.How it’s possible to protect data on the cloud
    2.How you can remove complexity and be compliant
    3.Discover encryption management across all cloud platforms
  • Spotlight on India: Data Security in Pharma: Are you Missing Something? Recorded: Mar 27 2016 39 mins
    Raju Verranna, Senior Presales Engineer
    The Pharmaceutical industry is increasingly becoming the target of cyber-attacks and espionage, mainly because it lags behind implementing data protection measures compared to other industries. Their intellectual property has the potential to generate vast amounts of revenue, not to mention the expense and time undertaken for their R&D initiatives. If you are in the Pharmaceutical industry, spend 40 minutes to learn from WinMagic’s Senior Presales Engineer Raju Verranna on the importance your data security.

    Key Learnings:
    1.How to address the biggest threat to your organization – insider negligence
    2.Why you need a BYOD policy implementation
    3.Discover compliant encryption solutions
  • External Media: Threat to Enterprise Security Policy Recorded: Sep 10 2015 49 mins
    Hal Hagan, Global Training Manager
    Companies today are facing a unique challenge. The challenge between telling their users not to use any removable media or letting some of their "select" users use these media rampantly. For organizations that keep highly confidential information on hand, it's extremely important to ensure that information is secure on external media. Spend 50 minutes to learn how to enable users to comfortably, seamlessly and securely share data with Hal Hagan, WinMagic’s Global Training Manager.

    Key Learnings:
    1.How to be compliant with removable media in your organization
    2.How the importance of using keys to protect specific information
    3.Discover how business enablement and security go hand in hand
WinMagic
WinMagic, one of the most respected names in the data security business, encrypts over 8 million endpoints in 84 countries. Our award winning comprehensive encryption and intelligent key management solution is the best protection against sophisticated threats and data loss. SecureDoc by WinMagic provides everything encryption, securing data wherever it is stored by enabling a unified key management strategy across any end point and virtualized or Cloud IaaS environment.

Visit: http://www.winmagic.com

WinMagic may use your contact information to send you relevant information or offers. You can unsubscribe at any time.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Spotlight on INDIA - Data Security, a Major Consideration in IT/ITES Sector
  • Live at: May 23 2017 9:30 am
  • Presented by: Vaibhav Pathak, Sr. Pre Sales Engineer
  • From:
Your email has been sent.
or close