Hi [[ session.user.profile.firstName ]]

Simplified email data security for mobile smartphones and tablets

Legacy approaches to securing email communications usually leave a lot to be desired or just plain don’t work, with usability being the number one barrier to adoption. They also require complex configuration files, key management, administration and provisioning – not to mention the multiple end-use
Legacy approaches to securing email communications usually leave a lot to be desired or just plain don’t work, with usability being the number one barrier to adoption. They also require complex configuration files, key management, administration and provisioning – not to mention the multiple end-user steps to access encrypted emails and attachments. In many cases, inconsistent delivery methods even from a single solution results in clunky or unusable experience for mobile users.

But what if your mobile users could send and read encrypted email on leading iOS, Android, and Blackberry devices using the native experience without the hassle of web browsers, managing certificates, or awkward proxy servers? What if you could manage granular email data protection policies across corporate and personal mobile devices, both inside and outside the enterprise, from a unified console?

Join David Strom, expert on networking and communications technologies, and Mark Schweighardt, Director product management at Voltage Security, to learn:

-The challenges posed by current mobile device security solutions for securing email communications on smartphones and tablets

-How Voltage SecureMail Mobile Edition extends data-centric protection of emails seamlessly to and from desktops, applications, gateways, laptops, mobile devices, and cloud inboxes

-How to read and send encrypted email via the Voltage SecureMail mobile apps, and the benefits to mobile users and IT security operations

-How Voltage SecureMail Mobile Edition integrates with your existing compliance solutions such as DLP, archiving, and e-discovery, and with your existing email and IT infrastructure
Recorded Jul 12 2012
60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Strom, networking and communications expert & Mark Schweighardt, Director product management, Voltage Security
Presentation preview: Simplified email data security for mobile smartphones and tablets
Recommended for you:
  • Date
  • Rating
  • Views
  • 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 『ベトナム:アジアの次なるエマージングマーケットにおけるリスクとビジネスチャンス』 影山正:シニア・マネジング・ディレクター、アジア太平洋地域統括責任者、坂出國雄:マネジング・ディレクター、ジャパンデスクヘッド、オットー マンフレッド 倉雄:ドウェイン・モリス・ベトナム法律事務所 Recorded: May 24 2016 89 mins
    ベトナムは、アジア太平洋地域のなかでも引き続き海外からの直接投資が多い国のひとつです。堅調なGDP増加、多くの自由貿易協定、インフラ改善、多い若年層、安価な労働力といったマクロ経済視点での好材料がビジネスを呼び込む要因となっています。一方で今年1月に開催された第12回共産党大会で選出された新指導部の動向は、投資家にとって不確定要素やリスクが残ります。また、南シナ海を巡る地政学的な状況についてもベトナムでビジネスを展開する際の懸念材料であり、さらに、政府による情報統制は、ディールの行使に際して大きな課題となっています。

    投資先としてのベトナムについて、クロールのシニア・マネジング・ディレクター、アジア太平洋地区統括責任者である影山正と、マネジング・ディレクター、東南アジアのジャパンデスク・ヘッドである坂出國雄がセミナーを開催し、クロールが過去にベトナムで行なった調査を踏まえながら、ベトナムでのビジネス上および政治上のリスク、新指導部の動向、自由貿易協定が海外からの投資に与える影響、事業運営する際の留意点やビジネスリスクについて紹介します。皆様のご参加を心よりお待ち申し上げております。
  • PWC and Palo Alto Networks Discuss Security Framework PWC and Palo Alto Networks Discuss Security Framework Chad Kinzelberg, SVP of Business Development at Palo Alto Networks and David Burg, Global Cybersecurity Leader at PWC Recorded: May 23 2016 59 mins
    Palo Alto Networks and PwC have established a strategic partnership to help customer organizations build security architectures, organizational structures, and computing processes optimized to prevent successful cyber breaches.

    At the core of this partnership is a jointly-developed state-of-the-art security framework, designed to assist corporate executives and boards of directors address the people, process, and technology elements of managing cybersecurity risk.

    To learn more about the framework and the value it can bring to your organization, register to attend this webinar with Chad Kinzelburg, SVP of Business and Corporate Development at Palo Alto Networks and David Burg, Principal and Global & US Cybersecurity Leader at PwC.
  • Cyber - Angriffe schneller erkennen und abwehren Cyber - Angriffe schneller erkennen und abwehren Pascal Cronauer Recorded: May 23 2016 49 mins
    Im Webcast zeigen wir Ihnen, was Unternehmen tun können, um das Risiko für einen Angriff auf ihr Netzwerk deutlich zu reduzieren. Dabei werden vielfältige Ereignisse mit Big-Data-Analysen ausgewertet, bei einer drohenden Gefahr starten sofort automatisiert intelligente Gegenmaßnahmen. Dank fortschrittlicher Techniken wie maschinellem Lernen lassen sich so Bedrohungen zum Vorschein bringen, die ansonsten unbemerkt geblieben wären.

    - Sie sollten sich diesen Webcast ansehen, wenn Sie
    - frühe Anzeichen für eine Bedrohung Ihres Unternehmens erkennen wollen;
    - in Ihrem Unternehmen auf eine Attacke schneller reagieren wollen;
    - automatisierte Möglichkeiten haben wollen, um den Angriff zu vereiteln;
    - merken, dass es Ihren derzeitigen Verteidigungsmaßnahmen an Automatisierung und Effizienz mangelt;
    - Sie bereits eine SIEM-Plattform der ersten Generation einsetzen, aber wegen ihrer Komplexität frustriert sind, oder wenn Sie merken, dass Sie noch an manchen Stellen verwundbar sind;
    - die Nadel im Heuhaufen der Security-Events nicht finden können
  • Cloud Trust Protocol (CTP) Demo Cloud Trust Protocol (CTP) Demo Alain Pannetrat of Cloud Security Alliance Recorded: May 20 2016 12 mins
    The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of the services they use in the cloud, promoting transparency and trust.

    This video illustrates in concrete details how CTP can be used to monitor the security level of cloud assets. We follow Alice, a cloud customer, who provisions a set of webservices from a SaaS provider and uses the CTP API to monitor two security parameters in real time: uptime and SSL/TLS cryptographic strength. The presented demo was constructed to mimic a real cloud service using software containers and the open-source CTP prototype implementation currently developed by CSA.
  • Using Chef Compliance to Secure your Servers Using Chef Compliance to Secure your Servers Joe Gardiner, Field Solutions Architect, Chef Recorded: May 20 2016 33 mins
    Chef Compliance lets you express your compliance rules as code. You can easily run those rules as tests whenever you want. You get immediate feedback on whether your servers are configured as they should be.

    Chef Compliance scans your servers to see if they are configured in accordance with your rules and generates a report that identifies the issues it found. You can then use Chef to remediate those problems.

    In this webinar, Joe Gardiner will demonstrate how Chef Compliance works by scanning a default installation of RHEL 7.0 on the public cloud to see if it is CIS compliant. After the scan identifies the problem areas, Joe will use Chef to bring the server in line with the CIS benchmarks.

    You’ll also learn about an offer from Chef to help you perform a scan of your infrastructure and get you started on the road to compliance.
  • Go to the head of the class with Palo Alto Networks Go to the head of the class with Palo Alto Networks Toby Guthrie Systems Engineer Palo Alto Networks and Peter Stojkovski Managing Director Plenary Logic Recorded: May 20 2016 47 mins
    The IT environments of educational institutions have become increasingly complex with the increased proliferation of devices, applications and increased expectations around the safe delivery of education programs, research and information to the right people at the right time. Increased competition means that schools and universities must transform to attract and retain the best students and faculty.

    This exclusive webinar will address key challenges including:

    •How to strike a balance between being open to students, teachers and parents while also maintaining a secure environment to protect research and personal information while preventing threats.
    •How to manage access by users to specific content via a wide variety of applications
    •Provide next-generation firewall protection, and ensure safe student digital behaviour

    Find out how to go to the head of the class to enable innovation securely at this important webinar with Palo Alto Networks and Plenary Logic.
  • Go to the head of the class with Palo Alto Networks Go to the head of the class with Palo Alto Networks Toby Guthrie Systems Engineer Palo Alto Networks and Peter Stojkovski Managing Director Plenary Logic Recorded: May 20 2016 47 mins
    The IT environments of educational institutions have become increasingly complex with the increased proliferation of devices, applications and increased expectations around the safe delivery of education programs, research and information to the right people at the right time. Increased competition means that schools and universities must transform to attract and retain the best students and faculty.

    This exclusive webinar will address key challenges including:

    •How to strike a balance between being open to students, teachers and parents while also maintaining a secure environment to protect research and personal information while preventing threats.
    •How to manage access by users to specific content via a wide variety of applications
    •Provide next-generation firewall protection, and ensure safe student digital behaviour

    Find out how to go to the head of the class to enable innovation securely at this important webinar with Palo Alto Networks and Plenary Logic.
  • May 19th 2016 - PROTECT Webcast May 19th 2016 - PROTECT Webcast Edward Preston Recorded: May 19 2016 60 mins
    Join us on May 19th 2016 for the "Introducing PROTECT" webinar, offering a complete look at HOW our solution works to find threats that the others simply miss

    You'll learn:

    WHO CylancePROTECT was built to protect
    WHY math and machine learning are the future of security
    HOW CylancePROTECT catches what the others miss

    To reserve your spot, please register today!
  • Life after platform EOS: Vulnerabilities keep coming…and they don't expire Life after platform EOS: Vulnerabilities keep coming…and they don't expire Steve Neville, Director of Hybrid Cloud Security Solutions, Trend Micro Recorded: May 19 2016 31 mins
    If you’re like 58% of organizations out there, you're still in the process of migrating off Windows Server 2003...almost a year after it went End of Support. Regardless of the end of support environment you’re dealing with, vulnerabilities will still keep coming...and so will the attacks looking to take advantage of them, including high profile varieties like Ransomware. The good news is that there are effective ways to deal with end of support platforms while you transition. In this session you will learn about:
    • The latest in vulnerabilities, including those affecting EOS platforms like Windows Server 2003
    • Best practices for protecting EOS platforms from attacks, including Ransomware
    • How Trend Micro’s proven security can help

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Simplified email data security for mobile smartphones and tablets
  • Live at: Jul 12 2012 5:00 pm
  • Presented by: David Strom, networking and communications expert & Mark Schweighardt, Director product management, Voltage Security
  • From:
Your email has been sent.
or close
You must be logged in to email this