Transparent Encryption From Information...
For three decades, Information Security Corporation (ISC) has been an industry leader in encryption and public key infrastructure (PKI). Now, ISC is introducing their newest add-on to the world class encryption software, SecretAgent. SecretAgent Transparent Encryption (SA/TE), protects sensitive files by transparently using preconfigured rules. With SA/TE, encryption happens without relying on user interaction. Join ISC and Carahsoft for a we...
Securing Virtual Machine-Based Security...
Join us for a complimentary webinar on May 30, 2019 to learn about the strong partnership between Thales eSecurity, the industry leader in access control encryption and key management solutions, and FireEye, the industry leader in external threat intelligent services.The Thales Vormetric Data Security Platform produces detailed security intelligence log information on file level access of sensitive data including server activity, access attemp...
Micro Focus Government Solutions Summit
The Micro Focus Government Solutions Summit is the premier public sector event of 2019. Join us along with over 300 of your peers for an up-close look at the game-changing innovations in software and strategies that will shape your IT environments for the next decade. Why attend: Learn best practices from government leaders and Micro Focus Government Solutions executives on the following innovative technologies: Delve into new solutions for Bi...
Protect and Manage Your Unstructured Da...
A staggering 80% of all data is in an unstructured format and remarkably difficult to protect because it resides outside the organizational perimeter on employee endpoints and public clouds. Government agencies are entrusted to protect sensitive citizen data, but often times are unaware of where a large portion of this data lies. In order to prevent breaches, encryption has become increasingly necessary, however managing and protecting encryp...
Data Security Summit
In modernization efforts across government, agencies are doing more than replacing or updating legacy systems. They are leveraging the cloud and related technologies to make the IT enterprise more efficient, adaptable and scalable. In the process, they are also making the enterprise more diverse and complex, especially as they adopt a multi-cloud approach to delivering access to services and data. Unfortunately, this increased diversity and co...
Cybersecurity Technical Excellence Event
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
Cybersecurity Technical Excellence Event
"How can you equip your staff with the policies and tools to make your business information, computers and devices as secure as possible?"This program focuses on the policies, methodologies, processes and tools needed to prevent, detect and monitor cybersecurity threats and provide for an effective program. As more and more data breaches are disclosed, cybersecurity remains at the front of many business leaders' minds. Data breaches are a con...
Global Encryption, Cloud & Cyber Export...
This program will navigate the ins and outs of complying with U.S. and foreign encryption controls. You will meet and learn from experts in encryption controls across a number of key jurisdictions, including the U.S., China, Hong Kong, Singapore, Malaysia, France and Russia. Note - CompTIA members are entitled to a 10% discount. Contact Ken Montgomery, kmontgomery@comptia.org for details.
March 28-29, 2019
Organizer:
CompTIA Location:
San Francisco, CA
Thales e-Security Webinar
This complimentary on-demand webcast discusses how Thales eSecurity Federal and Dell can help you secure your hyper-converged data. Dell has partnered with Thales, the industry leader in access control encryption and key management solutions, to allow its customers to secure data and centralize keys on a number of Dell solutions. Many government customers have now realized file-level access control, encryption, and key management are substanti...
DIY Encryption Classification 2019 Edit...
All registrants receive an encryption classification questionnaire! Back by popular demand…with a sneak peek at changes that may be coming later in 2019!We are offering a webinar on creating your own encryption questionnaires to use to classify your products, with special guidance from the instructor on the template, as well as how to customize it for companies in different industries. We will work through case studies involving produ...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.