3 steps to effective data security
Available on-demand. During this web seminar we look at how to achieve a best-in-class approach to data protection with a view to coming up with a best practice guide. We will also be showing you how you can gauge the maturity of your security systems, enabling you to plug any holes before your precious data starts to leak through them. Register for this free event now.
This web seminar is available on-demand - Click here to register and watch
Make no mistake, consumerisation of the workplace is one genie that is not about to go back into the bottle.
The rate of advance of consumer IT and the divergence between personal devices and the sort of beige boxes that are typically used in the workplace are both set to increase. This means that restrict-and-ban approaches to locking down the network are doomed to failure. Worse, they may be counterproductive to the business. Instead, IT teams must look at security in a different way, developing a holistic model that encompasses policy, education, technology and enforcement.
During this web seminar we look at each of these aspects with a view to coming up with a best practice guide. We will also be showing you how you can gauge the maturity of your security systems, enabling you to plug any holes before your precious data starts to leak through them.
Speakers Include:
Jez Clement, Head of IT Security, Towergate Partnership
Alan Bentley, Senior Vice President of International Sales, Lumension
Stuart Sumner, Chief Reporter, Computing
David Mcclelland, Consulting Editor, Computing
Click here to register and watch for free