The State of Cloud Standards in 2014: Interoperability, Portability and Security

"Interoperability, portability and security are some of the biggest roadblocks slowing down the advancement of the cloud. The ability to port data, applications and share cloud services across multiple environments, while ensuring data protection and transparency is on top of every organization’s wish list today. A standardized set of principles can assist these organizations in utilizing the offerings of the cloud to the fullest.

In this roundtable discussion, hear about the current state of cloud standards, the latest developments and how these changes affect your organization and the industry as a whole"
Watch Now

Spotlight

Companies are increasingly reliant on storing sensitive data in cloud storage, which could be vulnerable to security threats and violate compliance requirements. At the same time, data breaches continue to grow more prevalent and costly. The Vormetric Cloud Encryption Gateway is a scalable solution that provides the security to use the cloud fully without sacrificing performance. This paper offers an in-depth description of the challenges confronting IT teams as they look to keep sensitive data secure in corporate cloud deployments. In addition, the paper offers an introduction to the Vormetric Cloud Encryption Gateway. The paper reveals how Vormetric delivers a single platform that enables security teams to safeguard sensitive data across their cloud and on-premises environments, while centrally managing policies and keys.


OTHER ON-DEMAND WEBINARS

Forrester-Led Webinar: Connecting the Relationship Between Threat Intelligence and Adversary

ThreatConnect

Join Forrester Analyst Rick Holland and ThreatConnect Chief Intelligence Officer Rich Barger for a webinar on understanding your adversary and the importance of proper threat intelligence analysis to proactively defend your organization

Limiting Access Rights On AWS

"AWS Identity and Access Management is an great feature for providing access to AWS resources - but how do you manage those rights well? In this video you will learn - AWS IAM strategies for limiting your security exposure - a path to apply security to new or existing AWS infrastructure - how Evident.io can help "

"Thwarting Advanced Threats with Trusted Crypto"

sans

"The dangers posed by advanced targeted attacks are real. Enterprises have come up against the limitations of approaches such as intrusion detection and signature-based malware detection. One promising avenue to explore is trusted crypto, which can help ensure that an application, for example, is doing just what its developers intended and has not been tampered with. Things can be taken a step further with trusted execution environments. In this webcast, John Grimm of Thales e-Security and John Pescatore of the SANS Institute will discuss the gaps in current best-practice defenses and the ways that trusted crypto and trusted execution environments can help fill those gaps."

Key Trends in Payments Intelligence - Machine Learning for Fraud Prevention

Bank information security

Banks can drive real value to their fraud prevention strategies with machine learning and analytics if they cut through the hype. Machine learning can be made intuitive and available directly to fraud experts. A multi-faceted strategy can turn fraud prevention expertise into a revenue generator for the business. Register for this webinar and join Marc Trepanier, Principal Fraud Consultant at ACI Worldwide, and leading industry analyst Julie Conroy of Aite Group as they discuss real-life use cases that demonstrate how banks can: Improve data management control costs while reducing the compliance and regulatory risks.

Spotlight

Companies are increasingly reliant on storing sensitive data in cloud storage, which could be vulnerable to security threats and violate compliance requirements. At the same time, data breaches continue to grow more prevalent and costly. The Vormetric Cloud Encryption Gateway is a scalable solution that provides the security to use the cloud fully without sacrificing performance. This paper offers an in-depth description of the challenges confronting IT teams as they look to keep sensitive data secure in corporate cloud deployments. In addition, the paper offers an introduction to the Vormetric Cloud Encryption Gateway. The paper reveals how Vormetric delivers a single platform that enables security teams to safeguard sensitive data across their cloud and on-premises environments, while centrally managing policies and keys.

resources