Enterprise Encryption and Key Management Strategy : The Time is Now
Data Encryption: If they Can't Sell It, They Won't Steal It
Enterprise Encryption and Key Management Strategy : The Time is Now
Date: Wednesday, June 20th
Time: 11:00 a.m. PT / 2:00 p.m. ET
CISOs and their peers realize that ad hoc encryption is no longer adequate – leading to higher costs and increased risk. So, what's needed? An enterprise encryption and key management strategy that can extend across all sensitive data, in all formats, across the entire organization.
Hear a leading industry analyst from Enterprise Strategy Group (ESG) and Vormetric share their tips and tricks to make an enterprise encryption strategy work:
- Central command and control – Including policy management, configuration management and reporting/auditing
- Distributed policy enforcement – Encryption and key management polices enforced on heterogeneous systems throughout the enterprise
- Tiered administration – Enforcement of both enterprise and departmental policies with separation of duties, where security administrators, not IT staff, control encryption management domains
- Enterprise-class key management services – Integrated into the encryption architecture, allowing key creation, storage, rotation and revocation
Featured Speakers:
Jon Oltsik, principal analyst, Enterprise Strategy Group
Tina Stewart, Tina Stewart VP, marketing, Vormetric
Sponsored by:
