By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More
Available On-Demand - This webinar has been recorded and is now available for download.
Webinar Abstract
As organizations incorporate newer data strategies, they also need to consider data-centric security. Data-centric security focuses security controls on the data, rather than perimeter servers or other infrastructure or the network. The goal is to protect sensitive data where it is stored and where it moves. This is becoming increasingly important as organizations start to deal with big data and newer data management platforms and hybrid architectures that include Hadoop and the cloud. Yet, TDWI research suggests that organizations still seem to focus on perimeter security and on application centric security for sensitive data. They think they are focused on protecting their data, but the reality is that many organizations don’t classify their data or know where their sensitive data lives, much less how to protect it.
Join Fern Halper and experts from Cloudera, Liaison, and Striim, in an educational discussion about best practices for protecting sensitive data. This discussion is based on a checklist with the same name.
Sponsored by Cloudera, Liaison Technologies, Striim
Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.
Individual, Student, and Team memberships available.
Join Today