Forget Firewalls – Enterprise Data is your New Perimeter

  • LANGUAGE: English DATE: Thursday, October 29, 2015 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Upcoming Webinars

Classification, Encryption, File Protection - How to use Data-centric Security

One of the biggest challenges modern enterprises are facing is the evolution toward connected businesses. To survive in this fiercely competitive environment, businesses strive to be as agile as possible, to continuously adopt new business models and to open up new communication channels with their partners and customers. Thanks to rapidly growing adoption of cloud and mobile computing, enterprises are becoming more and more interconnected, and the notion of a security perimeter has almost ceased to exist.

Protecting sensitive resources of a modern company, geographically distributed and increasingly mobile, is becoming a challenge that traditional security tools like DLPs can no longer perform: too many attack vectors and threat types are out there to defend against. Thus, the focus of information security has gradually shifted from trying to keep intruders out of the corporate network toward detection and defense from internal threats and protecting the information regardless of its current location or state.

The growing number of large-scale data breaches clearly shows that even the largest companies cannot keep intruders and malicious insiders from accessing their sensitive data. A paradigm shift from protecting the network infrastructure to securing the information itself regardless of its location is now required to ensure that all sensitive data is accounted for, classified according its sensitivity, and consistently protected at rest, in use, and in transit.

In this webinar, you will learn:

  • The security challenges modern connected enterprises are facing;
  • The concept and essential components of Data-centric Security as the last line of protecting sensitive corporate information;
  • The critical role of flexible and dynamic classification for data protection;
  • The importance of an agnostic solution that can protect the information on any platform.

In the first part of the webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will outline the challenges modern businesses are facing when protecting their sensitive information from unauthorized access and will talk about the essential components of data-centric security such as information discovery, classification and encryption.

In the second part of the webinar, Yoran Sirkis, CEO of Covertix, will give insights into best practices for how the benefits of data centric security can make your business more agile, efficient and secure.


Platinum Sponsors

Speakers

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Yoran Sirkis is a seasoned senior executive with deep domain expertise in information security and well-rounded experience in Leadership, Business Development, Professional Services, Consulting, Customer Management, and International Management. Yoran served as a Managing Partner of...


Platinum Sponsor

In a data-driven world, sensitive information is found in all types of files. For the past decade, organizations have been spending lots of money to secure the organization's perimeter to protect the organization from external and internal threats and safeguard their intellectual property. Once the sensitive information leaves the protected perimeter, control over those files is lost.

How are you controlling your most sensitive information when it leaves the organization?

Covertix was established in 2008 to provide seamless control and transparent protection of sensitive information found in any type of file, shared internally or with external partners. Our solutions enable organizations to control and protect sensitive information, while continuing to use their preferred cloud storage, collaboration or data sharing platforms without changing existing business processes or user behaviors. Whether the organization needs to protect sensitive files from internal or external threats or keep the information compliant, the organization's policies are seamlessly embedded into the file, keeping the organization protected and compliant when the information is in motion or at rest, anywhere.

Covertix solutions enable employees and business partners to work together while significantly reducing overall risk and with a minimal interruption to the organization's workflow. Our SmartCipher™ products are currently used by a wide variety of public and private tier-one enterprise customers around the world.

The company is privately held and backed by investors.

Watch now

Downloads

Presentation, KuppingerCole

Presentation, Covertix

Webcast download

Popular Webcasts

Next Webinar

Webinar

Getting Rid of the Password – How to Increase Safety Affordably

Despite compromised passwords being the leading cause of data breaches, most online businesses still rely on solely using passwords for logins. While getting rid of password authentication is desirable from a security standpoint, organizations fear that it is a costly endeavor that can also affect user experience.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00