InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Data Security and Governance in the Cloud Era

Presented by

Joshua Stenhouse, Field CTO Cyber Resilience at Rubrik, Stephen Faig, Research Director Unisphere Research and DBTA, and more

About this talk

Managing and protecting information is one of the toughest challenges facing data-driven organizations today. Security threats continue to evolve along with more stringent data privacy and security standards. What's more, data at the average organization is more distributed than ever before; it is spread across different geographies, business departments, on-premises and cloud data centers, edge devices, and a myriad of file systems, databases, and applications. Ultimately, to optimize the value of data, it has to be available for employees to act upon when and where it's needed. So, this growth in complexity is not surprising. However, it makes maintaining effective data security and governance practices increasingly difficult. Join us for a special roundtable webinar that dives into new technologies and best practices for the cloud era. Speakers include: -> Stephen Faig, Research Director Unisphere Research and DBTA (Moderator) -> Joshua Stenhouse, Field CTO Cyber Resilience at Rubrik (Panelist) -> James Beecham, Founder and CEO at ALTR (Panelist) -> Eric Schoepfle, Data Enablement Solutions at Satori (Panelist) -> Kevin Pedersen, Solutions Architect at Pythian (Panelist)
Rubrik

Rubrik

21695 subscribers142 talks
Zero Trust Data Management Webcasts For IT Professionals
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.
Related topics