- TYPE: Combined Session DATE: Thursday, May 07, 2015 TIME: 12:00-13:00 LOCATION: ALPSEE
Modern organizations routinely share sensitive data both internally and externally. This session will present a solution capable of letting data owners protect, control, and track their sensitive data regardless of where it is used (or abused). We’ll specifically present solutions for both front office and industrial use cases.
In the current world of fast-moving organizations with high demands of new services and supporting IT-systems we can no longer deal with the "old" perimeterized way of protecting the organizations assets. We are in need of a much more focussed and efficient approach that will allow us to protect our assets on their needs. Classification of information and protecting at it it's source is the way forward. Solutions have evolved that can make this happen without the major downsides of previous technologies that had business users adjust their behaviour and think about the needed protection at the end-user level. Nowadays technologies can be implemented that are transparent and easy-to-use while protecting the organizations assets against abuse and misplacement. The presentation will describe the changing landscape, the methodology to such an approach and a description of technologies that can assist in moving forward protecting your information.
- Alternative view on protecting your organizations assets
- Methodological approach to such a process
- Key technologies that can assist
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- May 05 - 08, 2015 Munich, Germany
The European Identity & Cloud Conference 2015 is proud to present a large number of partners