How to protect your data in the Cloud
- LANGUAGE: English DATE: Tuesday, November 11, 2014 TIME: 11:00am CET
More and more organizations and individuals are using the Cloud and, as a consequence, the information security challenges are growing. Information sprawl and the lack of knowledge about where data is stored are in stark contrast to the internal and external requirements for its protection. To meet these requirements it is necessary to protect data not only but especially in the Cloud. With employees using services such as iCloud or Dropbox, the risk of information being out of control and leaking is growing. Incidents such as the iCloud leakage of photos are just the tip of the iceberg.
There are a number of approaches to protecting information when using the Cloud. These range from the segregation of sensitive data to encryption.
Mike Small of KuppingerCole will discuss the requirements for the protection of information held in the cloud as well as the approaches to its realization. He will discuss the classes of solutions that help and how to choose between these.
In the second part of the webinar, Henk Van der Heijden, Partner TecHarbor for Covertix, will look in detail on a solution that helps securing and encrypting information in the Cloud, in a transparent way. He will talk about a number of real world use cases from customers that are protecting the information they hold in their Cloud services.
In a data-driven world, sensitive information is found in all types of files. For the past decade, organizations have been spending lots of money to secure the organization's perimeter to protect the organization from external and internal threats and safeguard their intellectual property. Once the sensitive information leaves the protected perimeter, control over those files is lost.
How are you controlling your most sensitive information when it leaves the organization?
Covertix was established in 2008 to provide seamless control and transparent protection of sensitive information found in any type of file, shared internally or with external partners. Our solutions enable organizations to control and protect sensitive information, while continuing to use their preferred cloud storage, collaboration or data sharing platforms without changing existing business processes or user behaviors. Whether the organization needs to protect sensitive files from internal or external threats or keep the information compliant, the organization's policies are seamlessly embedded into the file, keeping the organization protected and compliant when the information is in motion or at rest, anywhere.
Covertix solutions enable employees and business partners to work together while significantly reducing overall risk and with a minimal interruption to the organization's workflow. Our SmartCipher™ products are currently used by a wide variety of public and private tier-one enterprise customers around the world.
The company is privately held and backed by investors.
As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.