Designing a Cloud-ready Holistic IT Security Concept - the Business View

  • LANGUAGE: English DATE: Thursday, December 02, 2010 TIME: 17:00 CET, 4pm UTC
Upcoming Webinars

IT security is in a challenging transition period. On the one hand, threats are real and they are growing more and more sophisticated. On the other hand, the promise of cloud computing is trying to transform computing into an ubiquitous utility. The IT services world is going through a revolutionary change, making traditional, perimeter based security models obsolete. And it will not stop, it will be going even worse. If there ever has been a time to totally rethink your overall security strategy, it´s good that it is now. Join us in this session, to discuss the new holistic enterprise security concept.

.

Speakers

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Finding Your Path to Zero Trust

As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00