EC-Conference2024: Thinking Differently About How and Where to Protect Sensitive Data

Logo
Presented by

Jose Diaz, VP of Products and Services at Prime Factors

About this talk

Protecting data in applications instead of in storage can reduce attack vectors and improve overall data security, but it can be messy and impractical for most enterprises. What if it wasn’t? Learn about specific architectures that abstract how data is protected, centralize data protection policy controls, and deliver the crypto-agility needed to adapt data protection over time without expensive rework. AUDIENCE TAKEAWAYS 1. Understand the data security gaps that traditional storage security does not address and benefits of protecting data in applications. 2. Understand the challenges of trying to interweave data security into applications that can drive complexity and implementation cost and lead to higher total cost of ownership. 3. Conduct ways to deliver robust data protection and privacy using a variety of techniques in conjunction with architectures that reduce complexities, implementation times, and overall costs.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (46)
Subscribers (1198)
We are the world's leading provider of applied cryptography. Over 100 Fortune 500 corporations have sought our help in protecting their most sensitive data
and solving the most complex problems. Through our products and professional services, you can strengthen your ability to protect cryptographic keys,
digital certificates, software code signing, Certificate Lifecycle management, and more. We are committed to staying up-to-date with the latest technology
trends, compliances, and best practices in data security, and we leverage this expertise to help our clients achieve their security goals.