3 steps to effective data security

By James Gooch
09 Mar 2012 View Comments
Data protection artwork

This web seminar is available on-demand - Click here to register and watch

Make no mistake, consumerisation of the workplace is one genie that is not about to go back into the bottle.

The rate of advance of consumer IT and the divergence between personal devices and the sort of beige boxes that are typically used in the workplace are both set to increase. This means that restrict-and-ban approaches to locking down the network are doomed to failure. Worse, they may be counterproductive to the business. Instead, IT teams must look at security in a different way, developing a holistic model that encompasses policy, education, technology and enforcement.

During this web seminar we look at each of these aspects with a view to coming up with a best practice guide. We will also be showing you how you can gauge the maturity of your security systems, enabling you to plug any holes before your precious data starts to leak through them.

Speakers Include:

Jez Clement, Head of IT Security, Towergate Partnership
Alan Bentley, Senior Vice President of International Sales, Lumension
Stuart Sumner, Chief Reporter, Computing
David Mcclelland, Consulting Editor, Computing

Click here to register and watch for free

 

 

 

 

 

Reader comments
blog comments powered by Disqus
Newsletters
Windows 9 - what do you want?

What would your business require from Windows 9 "Threshold" to make it an attractive proposition?

35 %
5 %
10 %
6 %
44 %