How to share your Corporate Information with whomever you want - securely?

  • LANGUAGE: English DATE: Thursday, July 03, 2014 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Secure Information Sharing: Collaborating within enterprises and with your partners while keeping your sensitive, valuable information assets protected

Organizations are facing a dilemma today. On one hand, they need to collaborate far more flexible than ever before. Employees want to use the Cloud and are mobile. Collaboration with business partners is ever-tightening. Employees already are sharing files with customers using Cloud services such as Dropbox, Skydrive, etc. On the other hand, information security concerns are growing and pressure from regulations is ever-increasing.

The solution to that dilemma is Secure Information Sharing. There is a growing number of technologies available that promise to protect information. However, not all promises are kept.

In the first part of this webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the various proposals for Secure Information Sharing and their strengths and weaknesses.

In the second part, Tzach Kaufmann, Founder and CTO at Covertix, will look in detail on various customer use cases, explaining the customer requirements for Secure Information Sharing and how to solve them in a transparent, non-intrusive, and flexible way.

Platinum Sponsors


Tzach is a technology expert with more than 15 years of experience in the cybersecurity, IT, networking, and telecom sectors. Prior to Covertix, Tzach worked in security companies managing complex international projects for industry giants like Cisco and Samsung.

Platinum Sponsor

In a data-driven world, sensitive information is found in all types of files. For the past decade, organizations have been spending lots of money to secure the organization's perimeter to protect the organization from external and internal threats and safeguard their intellectual property. Once the sensitive information leaves the protected perimeter, control over those files is lost.

How are you controlling your most sensitive information when it leaves the organization?

Covertix was established in 2008 to provide seamless control and transparent protection of sensitive information found in any type of file, shared internally or with external partners. Our solutions enable organizations to control and protect sensitive information, while continuing to use their preferred cloud storage, collaboration or data sharing platforms without changing existing business processes or user behaviors. Whether the organization needs to protect sensitive files from internal or external threats or keep the information compliant, the organization's policies are seamlessly embedded into the file, keeping the organization protected and compliant when the information is in motion or at rest, anywhere.

Covertix solutions enable employees and business partners to work together while significantly reducing overall risk and with a minimal interruption to the organization's workflow. Our SmartCipher™ products are currently used by a wide variety of public and private tier-one enterprise customers around the world.

The company is privately held and backed by investors.

Watch now


Popular Videos

Next Webinar


Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00