sponsored by Websense, Inc.
Posted:  23 Mar 2010
Published:  22 Mar 2010
Format:  PDF
Length:  22  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

While data breaches run rampant and every vendor under the sun claims to offer a data protection solution, there is very little information available to build a practical, effective, data security program. This presentation transcript will bust through hype, hyperbole, and complexity and detail a pragmatic approach to information-centric security you can implement in nearly any organization. From tools like encryption, to techniques, to process, and even to satisfying those pesky auditors we'll present a straightforward, step-by-step process to reduce risks, stay out of the headlines and keep your organization's most valuable information assets safe.  Read on to learn more about:

  • Why traditional data classification doesn't work, and how to fix it
  • A step by step process to building a data security program
  • All the major data security tools and which ones really work
  • Where encryption works, where it doesn't, and how to properly implement it
  • The top 5 actions you can take today for data protection





BROWSE RELATED RESOURCES
Audit Trails | Data Loss Prevention (DLP) | Data Security | Encryption Standards | Information Security | Security Best Practices

View All Resources sponsored by Websense, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement