Featured Articles
Sponsored By: Voltage Security
WEBINAR: Rethinking Email Security:
Best Practices to Protect and Maintain Private Communications
Tuesday October 28, 2014
Time: 1:00pm ET/ 10:00am PT
2014 has been called “The Year of Encryption.” Recent data breaches, personal identity theft cases, and email snooping concerns have put a spotlight on the importance of protecting sensitive data, both inside and outside the enterprise.
Email is invaluable to enterprises and it’s critical to end users who employ it more than the telephone, instant messaging and social media combined. Email is the easiest mode of communication and file transfer, which also makes it an easy target for data theft.
As email users communicate sensitive data, often in the form of credit card numbers, social security numbers, phone numbers, personal financial data, and personal health information, it is sent and resent to multiple users and locations. Sometimes this data is secure, but all too often, it is not. This impacts companies of all sizes where email security vulnerabilities are both internal and external to the enterprise.
The need to protect private information being communicated by email between colleagues, customers, prospects, patients, loan applicants, and clients — and while at rest inside mailboxes — is now the norm. Unfortunately, many enterprise email solutions are several years old and use outdated and ineffective security technology.
Join us for this session in which we will explore the key concepts and best practices to protect and maintain private email communications and why you need to rethink your email security – before your company is the next victim to suffer from a data breach. Hear from two email security experts -- Michael Osterman of Osterman Research, and Stacia Topping of Voltage Security -- and learn:
- Best practices for securing sensitive email communications.
- When it’s the right time to replace your legacy email security.
- How to protect sensitive email information as it flows to and from the enterprise.
- Latest insights on Identity-Based Encryption and Stateless Key Management.
- How other enterprises deploy the world’s most popular email security solution.
How end-to-end Identity-Based Encryption (IBE) helps protect email in the event of a vulnerability being exploited.
Top Stories
From The Expert Corner
October 24, 2014
Microsoft Articulates How it Wants to be Cloud Provider of Choice
The race to be your all inclusive cloud provider intensified this week as Microsoft Corp. CEO Satya Nadella revealed how the Redmond, WA-based giant intends to exert itself as the preferred vendor for “E”verything cloud. This comes on the heels of major “Cloud First” initiatives the past few weeks from Oracle, SAP and IBM just to name a few.
What CEO Nadella outlined in a speech in San Francisco, Microsoft is using Microsoft Azure, Office 365 and Microsoft Dynamics to deliver what the company is touting as “the industry’s most complete cloud.” Part of this completeness were enhancements to its hyper-scale, enterprise-grade, hybrid cloud platform.
These include:
- The new Azure G-series of virtual machines and Premium Storage
- General availability of the Microsoft Cloud Platform System, powered by Dell
- Partnerships with Cloudera Inc. and CoreOS
- A new Azure Marketplace.
“The enterprises of today and tomorrow demand a cloud platform that is reliable, scalable and flexible,” Nadella said. “With more than 80 percent of the Fortune 500 on the Microsoft cloud, we are delivering the industry’s most complete cloud — for every business, every industry and every geography.”...Read More
|