Enterprise Encryption and Key Management Strategy : The Time is Now

Data Encryption: If they Can't Sell It, They Won't Steal It
Data Encryption: If they Can't Sell It, They Won't Steal It

Click here to register

Enterprise Encryption and Key Management Strategy : The Time is Now

Date: Wednesday, June 20th
Time: 11:00 a.m. PT / 2:00 p.m. ET

CISOs and their peers realize that ad hoc encryption is no longer adequate – leading to higher costs and increased risk.  So, what's needed? An enterprise encryption and key management strategy that can extend across all sensitive data, in all formats, across the entire organization.

Hear a leading industry analyst from Enterprise Strategy Group (ESG) and Vormetric  share their tips and tricks to make an enterprise encryption strategy work:

  • Central command and control – Including policy management, configuration management and reporting/auditing
  • Distributed policy enforcement – Encryption and key management polices enforced on heterogeneous systems throughout the enterprise
  • Tiered administration – Enforcement of both enterprise and departmental policies with separation of duties, where security administrators, not IT staff, control encryption management domains
  • Enterprise-class key management services – Integrated into the encryption architecture, allowing key creation, storage, rotation and revocation

Featured Speakers:
Jon Oltsik, principal analyst, Enterprise Strategy Group
Tina Stewart, Tina Stewart VP, marketing, Vormetric

Sponsored by:

Click here to register

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...