Wherever you store it, they can’t touch it. Pragmatics of file data encryption.

Presented by

Chris Winter, Director, Product Management

About this talk

Whether you are looking for a trusted storage and archive security solution for migration to a multi-tenanted environment or for compliance and IP protection, file data can be encrypted in many locations and in many ways during its flight from first creation to its resting place in storage. The cost of dealing with a data breach vastly outweighs the costs of deploying encryption technology, but each encryption method or physical location has advantages and disadvantages and protects in different ways against potential threats. These pros and cons are dependent on currently deployed infrastructure, compliance demands, sensitivity of data, vulnerability to threats, and staffing, plus the added complication of management by different operational and IT department groups. Join your fellow professionals to understand how to identify the most cost effective storage location and understand how that meets the needs of the organization while at the same time introducing as little operational management overhead as possible. Result. Fast, Transparent, Cost-Effective Protection for File Data in Storage

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (125)
Subscribers (13598)
Today’s enterprises depend on the cloud, data and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software wherever it is created, shared or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day. We are the worldwide leader in data protection, providing everything an organization needs to protect and manage its data, identities and intellectual property – through encryption, advanced key management, tokenization, and authentication and access management. Whether it’s the securing the cloud, digital payments, blockchain or the Internet of Things, security professionals around the globe rely on Thales to confidently accelerate their organization’s digital transformation. Thales Cloud Protection & Licensing is part of Thales Group.