InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Wherever you store it, they can’t touch it. Pragmatics of file data encryption.

Presented by

Chris Winter, Director, Product Management

About this talk

Whether you are looking for a trusted storage and archive security solution for migration to a multi-tenanted environment or for compliance and IP protection, file data can be encrypted in many locations and in many ways during its flight from first creation to its resting place in storage. The cost of dealing with a data breach vastly outweighs the costs of deploying encryption technology, but each encryption method or physical location has advantages and disadvantages and protects in different ways against potential threats. These pros and cons are dependent on currently deployed infrastructure, compliance demands, sensitivity of data, vulnerability to threats, and staffing, plus the added complication of management by different operational and IT department groups. Join your fellow professionals to understand how to identify the most cost effective storage location and understand how that meets the needs of the organization while at the same time introducing as little operational management overhead as possible. Result. Fast, Transparent, Cost-Effective Protection for File Data in Storage
Thales - Cybersecurity Solutions

Thales - Cybersecurity Solutions

97189 subscribers699 talks
Building a future we can all trust
Thales is a global leader in cybersecurity, helping the most trusted companies, organizations and governments around the world protect critical applications, sensitive data, and identities anywhere at scale. Through our innovative services and integrated platforms, Thales helps customers achieve better visibility of risks, defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day.
Related topics