Designing a Cloud-ready Holistic IT Security Concept - the Business View

  • LANGUAGE: English DATE: Thursday, December 02, 2010 TIME: 17:00 CET, 4pm UTC
Upcoming Webinars

IT security is in a challenging transition period. On the one hand, threats are real and they are growing more and more sophisticated. On the other hand, the promise of cloud computing is trying to transform computing into an ubiquitous utility. The IT services world is going through a revolutionary change, making traditional, perimeter based security models obsolete. And it will not stop, it will be going even worse. If there ever has been a time to totally rethink your overall security strategy, it´s good that it is now. Join us in this session, to discuss the new holistic enterprise security concept.

.

Speakers

Watch now

Downloads

Presentation, Martin Kuppinger

Presentation, Novell

Video download

Popular Videos

Next Webinar

Webinar

Four Key Components Critical to the Future of Privileged Access Management

Privileged Access Management (PAM) has assumed a critical role in protecting the most valuable data and services within organizations from theft, loss, and unauthorized access. But as companies and other organizations have become more complex and embrace digital transformation, PAM is also taking on a core operational function to achieve better insight into data usage and contribute to agile working processes.

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00