ZONE SE7EN > Blog > Security > Secure, Encrypt, Authenticate & Protect Your Data

Secure, Encrypt, Authenticate & Protect Your Data

  • By Allie Philpin 
  • Category: Security 
  • Comments (0) 

ZONE SE7EN has launched their latest virtual event in their Insight Zone 2014 series, focusing on the data security industry.  ZONE SE7EN brought together experts and key industry thought-leaders and subjected them to a series of probing questions, providing you with informative, enlightening answers to help with those all-important security decisions.

Insight Zone’s virtual Executive Interviews and Roundtable asks those tough questions; How can IT managers keep corporate data on mobile devices secure, yet provide the right access to the right users?  What security policies need to be in place to meet regulatory and compliance requirements?  In what way can businesses and organisations keep data in the cloud and online secure?  What are the advantages and disadvantages of passwords, encryption and authentication?

Luke Forsyth at CA Technologies discusses the benefits of SSO (single sign-on) and access management: “Single sign-on has two significant aspects; the staff and the user experience.  Access management is about authorisation and privileges.”

Amnon Bar-Lev from Check Point Software explains how their Software Define Protection architecture can help stop malware attacks: “Software Defined Protection allows you to de-couple the control from the enforcement so control can be more agile, while enforcement can be much more stable.”

Ramsés Gallego at Dell Software tells us more about their Connected Security strategy: “Connected Security is our vision on how organisations want to protect their data, no matter where it resides; be it the cloud, mobile devices, on-premise, on databases or on document management systems.”

Robert Griffin from RSA raises cyber security strategies and a new area for RSA, security analytics: “Security analytics; applying techniques, for example from big data, to the rapid identification, analysis and remediation of threats.”

Bob Tarzey, a leading research analyst at Quocirca, explains more about IAM (identity and access management) and federated identities: “You have two choices; you either create identities for all these different users within your own systems, which is a big burden, or else you accept their identities from another source, federated to your own system.”

All Executive Interview videos and the informative, virtual Roundtable discussion are available to view online now.  Register FREE via ZONE SE7EN’s Insight Zone here to receive exclusive access, or using the form below:


Subscribe to our mailing list

* indicates required Email Address * First Name * Last Name *