Webinar Recording

Bringing Data Back Under Control

Show description
Speakers
Pascal Cronauer
Head of EMEA
ShardSecure
Pascal Cronauer
Pascal has worked in the cybersecurity industry for over +20 years,  both in technical & commercial roles with numerous years focusing on security operations in particular SIEM. Pascal has developed a wealth of knowledge around cybersecurity incidents, remediation and also European and other...
View profile
Mike Small
Senior Analyst
KuppingerCole
Mike Small
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe, Middle East and Africa. Mike did work for CA between 1994 and 2009, where he developed CA’s...
View profile
Julian Weinberger
Field CTO
ShardSecure
Julian Weinberger
Julian has over 15 years’ experience in the data security industry. Based in the San Francisco Bay Area Julian is responsible for developing security solutions and business strategies for ShardSecure customers and partners.
View profile
Lead Sponsor
ShardSecure
Top related content
Webinar Recording
Why Data Resilience Is Key to Digital Transformation
Oct 21, 2022

As companies pursue digital transformation to remain competitive, they become more dependent on IT services. This increases the potential business impact of mistakes, natural disasters, and cyber incidents. Business continuity planning, therefore, is a key element of digital transformation, and must cover business-critical data and applications.

Webinar Recording
A Unified Approach to Modern Data Protection
Jul 01, 2021

Data is the lifeblood of business and government. Therefore, data breaches can be devastating in terms of disruption, damage to reputation, remediation costs, and data protection fines. But the ongoing high number of breaches shows that what many organizations are doing to protect their data is not working.

Webinar Recording
The Role of Data-Centric Security in the Cloud
Sep 29, 2020

As modern businesses across all verticals continue their rapid digitalization, the need to store, process and exchange data securely is becoming an essential factor for any company. However, this is particularly challenging for high-tech companies dealing with highly-sensitive R&D data.

Webinar Recording
How to Protect Your Data in the Cloud
Nov 11, 2014

KuppingerCole Webinar recording

Webinar Recording
Assuring and Implementing Cybersecurity and Data Protection for Public Clouds
Oct 17, 2018

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.

But things have changed substantially: The traditional security perimeter is proving to no longer be an effective cybersecurity control and fast-growing technologies, such as cloud, mobile and virtualization make the boundaries of an organization blurry. Protecting sensitive resources of modern organisations, which are becoming increasingly logically and geographically distributed, is becoming a challenge. Sensitive data and critical business processes need to be adequately protected, no matter where they are deployed and from where they are accessed. The perimeter has moved, and organizations need to move with it.

Webinar Recording
Forget Firewalls - Enterprise Data is your New Perimeter
Oct 30, 2015
One of the biggest challenges modern enterprises are facing is the evolution toward connected businesses. To survive in this fiercely competitive environment, businesses strive to be as agile as possible, to continuously adopt new business models and to open up new communication channels with their partners and customers. Thanks to rapidly growing adoption of cloud and mobile computing, enterprises are becoming more and more interconnected, and the notion of a security perimeter has almost ceased to exist.
Webinar Recording
Cloud Data Protection Done Right: When Bringing Your Own Key Just Isn’t Enough
Apr 13, 2018

Data encryption is undoubtedly the most popular technology for securing data in the cloud, but also one of the most misunderstood ones. Although most cloud service providers offer their own capabilities for encrypting data at rest or in transit, their implementations may vary dramatically in scope and quality. Without understanding of underlying principles, it is too difficult for most customers to see behind marketing buzzwords and to estimate what grade of security they are actually getting. Protecting your data from unauthorized access isn’t even your cloud provider’s legal responsibility – you are still fully responsible for all consequences of any data breach.

Event Recording
Reducing Complexity - Increasing Agility: How to Deliver Value With Hybrid & Multi-Clouds
May 13, 2022
Webinar Recording
Data Sovereignty in Public Clouds
Mar 27, 2020

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the attacker  could enter.