07.05.2015 12:00-13:00

European Identity & Cloud Conference 2015
Combined Session


Protecting and Tracking Sensitive Data

Modern organizations routinely share sensitive data both internally and externally. This session will present a solution capable of letting data owners protect, control, and track their sensitive data regardless of where it is used (or abused). We’ll specifically present solutions for both front office and industrial use cases.

Information Centric Security; the Way to Go?

In the current world of fast-moving organizations with high demands of new services and supporting IT-systems we can no longer deal with the “old” perimeterized way of protecting the organizations assets. We are in need of a much more focussed and efficient approach that will allow us to protect our assets on their needs. Classification of information and protecting at it it’s source is the way forward. Solutions have evolved that can make this happen without the major downsides of previous technologies that had business users adjust their behaviour and think about the needed protection at the end-user level. Nowadays technologies can be implemented that are transparent and easy-to-use while protecting the organizations assets against abuse and misplacement. The presentation will describe the changing landscape, the methodology to such an approach and a description of technologies that can assist in moving forward protecting your information.

Key Takeaways:

  • Alternative view on protecting your organizations assets
  • Methodological approach to such a process
  • Key technologies that can assist
Seraphinite AcceleratorBannerText_Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.