InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

EC-Conference2024: Thinking Differently About How and Where to Protect Sensitive Data

Presented by

Jose Diaz, VP of Products and Services at Prime Factors

About this talk

Protecting data in applications instead of in storage can reduce attack vectors and improve overall data security, but it can be messy and impractical for most enterprises. What if it wasn’t? Learn about specific architectures that abstract how data is protected, centralize data protection policy controls, and deliver the crypto-agility needed to adapt data protection over time without expensive rework. AUDIENCE TAKEAWAYS 1. Understand the data security gaps that traditional storage security does not address and benefits of protecting data in applications. 2. Understand the challenges of trying to interweave data security into applications that can drive complexity and implementation cost and lead to higher total cost of ownership. 3. Conduct ways to deliver robust data protection and privacy using a variety of techniques in conjunction with architectures that reduce complexities, implementation times, and overall costs.
Encryption Consulting LLC

Encryption Consulting LLC

1692 subscribers64 talks
Global Leaders in Applied Cryptography!
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys, digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.
Related topics