April 2014, Data Security
Data Security Roundtable Discussion
Welcome to ZONE SE7EN’s Data Security Virtual Roundtable.
We talked to thought leaders in the Data Security industry to gather their knowledge about key trends and technological aspects in today’s marketplace – encryption and passwords, preventing data breaches, security of data in the cloud and on mobile devices, improving corporate data security, identity and access management, and much more.
Whatever your industry sector — financial, education, retail, healthcare, government, to name but a few – ZONE SE7EN’s virtual Roundtable discussion with experts from CA Technologies, Check Point Software, Dell Software, RSA and Quocirca will help to provide you with a balanced overview of Data Security solutions, ensuring that you are fully informed and able to make that all-important decision.
Luke Forsyth from CA Technologies discusses the benefits of SSO (single sign-on) technologies, access management, and how the use of identity management solutions can help organisations meet their governance and compliance requests.
Amnon Bar-Lev at Check Point Software explains why having up-to-date threat information is becoming increasingly important, what can be done to prevent malware attacks, and how their new architecture, Software Defined Protection, can help to manage your security environment.
Ramsés Gallego from Dell Software talks about their Connected Security strategy helps organisations create a comprehensive security portfolio, and how, by going beyond regular identity and access management, the importance of access governance in today’s business world.
Robert Griffin at RSA discusses RSA’s technical strategy including risk-based authentication, advanced authentication, and security analytics, as well as the current trends in dealing with cyber security.
Bob Tarzey, a research analyst at Quocirca, talks about the growing evidence that organisations are turning to identity and access management solutions as the use of mobility and cloud increases, and how the use of federated identities can be of benefit.
View our Security Virtual Roundtable now and discover informative, reliable content that speaks your language!