Mobile and cloud: The Big Data security conundrum

Share this article:
Harnessing Big Data for protection
Harnessing Big Data for protection

Click here to view

On demand now!

Back when mainframes ruled the corporate computing environment it was far easier to manage critical data. After all, most folks used “dumb” terminals. However, distributed computing quickly made its way into the enterprise, so now, computers with more storage power than ever have become commonplace. Data, as a result, has become widely distributed. And, with the rapid adoption of cloud computing, that data is even more widely distributed – and a challenge to control. The explosion in mobile device use, too, has introduced more stored data. Given the swiftness of these changes and the seeming ubiquitous reliance on cloud storage and myriad mobile devices, just how can all this data be controlled and secured? We learn more.

Featured Speakers:
Paul Hill
, senior consultant, SystemsExperts

Jason Corbin
, Director of Security Intelligence Product Management,
Ilena Armstrong,
VP, editorial, SC Magazine

Sponsored by:

Share this article:

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Compliance gets you on the road to security

Today there is a veritable alphabet soup of data security standards and laws governing how companies must operate. But, most agree, compliance is more of a first step to security rather than an assurance of security itself.

Battling savvy cyber thieves

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends.

Fighting APTs

Fighting APTs

With simple viruses and Trojans were all the rage, life was simpler for the average CSO. Now, threats of all types abound and the methods cyber attackers enlist to infiltrate ...