Mobile and cloud: The Big Data security conundrum

Share this article:
Harnessing Big Data for protection
Harnessing Big Data for protection

Click here to view

On demand now!

Back when mainframes ruled the corporate computing environment it was far easier to manage critical data. After all, most folks used “dumb” terminals. However, distributed computing quickly made its way into the enterprise, so now, computers with more storage power than ever have become commonplace. Data, as a result, has become widely distributed. And, with the rapid adoption of cloud computing, that data is even more widely distributed – and a challenge to control. The explosion in mobile device use, too, has introduced more stored data. Given the swiftness of these changes and the seeming ubiquitous reliance on cloud storage and myriad mobile devices, just how can all this data be controlled and secured? We learn more.

Featured Speakers:
Paul Hill
, senior consultant, SystemsExperts

Jason Corbin
, Director of Security Intelligence Product Management,
Ilena Armstrong,
VP, editorial, SC Magazine

Sponsored by:

Share this article:
You must be a registered member of SC Magazine to post a comment.

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Leveraging big data governance

Managing the vast volumes of data -- both customer and corporate -- on which most organizations depend for their day-to-day operations and long-term growth of their businesses always has been challenging.

Protecting your core assets

Maintaining even the most basic IT security controls is becoming more challenging for organizations as cloud computing, mobile and bring-your-own-device (BYOD) reshape the average corporate network and how it is used.

Wanted: Buy-in from the board

As massive breaches occur with more frequency, consumers have become increasingly anxious about just how large retail, financial and other companies with which they're dealing are protecting their personal information.