How to protect your data in the Cloud

  • LANGUAGE: English DATE: Tuesday, November 11, 2014 TIME: 11:00am CET
Upcoming Webinars
Data Centric Security approaches that work everywhere

More and more organizations and individuals are using the Cloud and, as a consequence, the information security challenges are growing. Information sprawl and the lack of knowledge about where data is stored are in stark contrast to the internal and external requirements for its protection. To meet these requirements it is necessary to protect data not only but especially in the Cloud. With employees using services such as iCloud or Dropbox, the risk of information being out of control and leaking is growing. Incidents such as the iCloud leakage of photos are just the tip of the iceberg.

There are a number of approaches to protecting information when using the Cloud. These range from the segregation of sensitive data to encryption.

Mike Small of KuppingerCole will discuss the requirements for the protection of information held in the cloud as well as the approaches to its realization. He will discuss the classes of solutions that help and how to choose between these.

In the second part of the webinar, Henk Van der Heijden, Partner TecHarbor for Covertix, will look in detail on a solution that helps securing and encrypting information in the Cloud, in a transparent way. He will talk about a number of real world use cases from customers that are protecting the information they hold in their Cloud services.

Platinum Sponsors


Mr. Henk van der Heijden is an information security professional with over 25 years’ experience in IT (Security) sales and services. Henk is co-founder and partner at a leading Security Technology firm TecHarbor where he is responsible for Strategy development, Product Selection & Sales of the...

Platinum Sponsor

In a data-driven world, sensitive information is found in all types of files. For the past decade, organizations have been spending lots of money to secure the organization's perimeter to protect the organization from external and internal threats and safeguard their intellectual property. Once the sensitive information leaves the protected perimeter, control over those files is lost.

How are you controlling your most sensitive information when it leaves the organization?

Covertix was established in 2008 to provide seamless control and transparent protection of sensitive information found in any type of file, shared internally or with external partners. Our solutions enable organizations to control and protect sensitive information, while continuing to use their preferred cloud storage, collaboration or data sharing platforms without changing existing business processes or user behaviors. Whether the organization needs to protect sensitive files from internal or external threats or keep the information compliant, the organization's policies are seamlessly embedded into the file, keeping the organization protected and compliant when the information is in motion or at rest, anywhere.

Covertix solutions enable employees and business partners to work together while significantly reducing overall risk and with a minimal interruption to the organization's workflow. Our SmartCipher™ products are currently used by a wide variety of public and private tier-one enterprise customers around the world.

The company is privately held and backed by investors.

Watch now


Trending Videos

Next Webinar


Managing Cyber Risk in a Hybrid Multi-Cloud IT Environment

Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00