Data Encryption: If they Can't Sell It, They Won't Steal It
Data Encryption: If they Can't Sell It, They Won't Steal It

Click here to register

Enterprise Encryption and Key Management Strategy : The Time is Now

Date: Wednesday, June 20th
Time: 11:00 a.m. PT / 2:00 p.m. ET

CISOs and their peers realize that ad hoc encryption is no longer adequate – leading to higher costs and increased risk.  So, what's needed? An enterprise encryption and key management strategy that can extend across all sensitive data, in all formats, across the entire organization.

Hear a leading industry analyst from Enterprise Strategy Group (ESG) and Vormetric  share their tips and tricks to make an enterprise encryption strategy work:

  • Central command and control – Including policy management, configuration management and reporting/auditing
  • Distributed policy enforcement – Encryption and key management polices enforced on heterogeneous systems throughout the enterprise
  • Tiered administration – Enforcement of both enterprise and departmental policies with separation of duties, where security administrators, not IT staff, control encryption management domains
  • Enterprise-class key management services – Integrated into the encryption architecture, allowing key creation, storage, rotation and revocation

Featured Speakers:
Jon Oltsik, principal analyst, Enterprise Strategy Group
Tina Stewart, Tina Stewart VP, marketing, Vormetric

Sponsored by:

Click here to register