Mobile and cloud: The Big Data security conundrum

Share this article:
Harnessing Big Data for protection
Harnessing Big Data for protection

Click here to view

On demand now!

Back when mainframes ruled the corporate computing environment it was far easier to manage critical data. After all, most folks used “dumb” terminals. However, distributed computing quickly made its way into the enterprise, so now, computers with more storage power than ever have become commonplace. Data, as a result, has become widely distributed. And, with the rapid adoption of cloud computing, that data is even more widely distributed – and a challenge to control. The explosion in mobile device use, too, has introduced more stored data. Given the swiftness of these changes and the seeming ubiquitous reliance on cloud storage and myriad mobile devices, just how can all this data be controlled and secured? We learn more.


Featured Speakers:
Paul Hill
, senior consultant, SystemsExperts

Jason Corbin
, Director of Security Intelligence Product Management,
IBM
Ilena Armstrong,
VP, editorial, SC Magazine

Sponsored by:

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Editorial Webcasts

Sign up to our newsletters

More in Editorial Webcasts

Mobile madness

More and more corporate activities are being undertaken by employees depending on iPhones, iPads, laptops and other mobile devices.

Preparing for the inevitable

With zero-day attacks still reaping rewards for cyber criminals, they show few signs of waning. And, preparation for them is all but impossible.

Leveraging big data governance

Managing the vast volumes of data -- both customer and corporate -- on which most organizations depend for their day-to-day operations and long-term growth of their businesses always has been challenging.