How to protect your IT assets and stay ahead of the curve

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Data theft and loss reports can do serious damage to an organisation's reputation and share price, but firms continue to hit the headlines with lurid reports of lost laptops, hacker incursions and all manner of embarrassing IT problems. Staying out of the headlines is therefore a must-do for any IT manager. But how can this be achieved? Data protection and secure asset tracking are proven solutions to this growing problem facing many firms. And it's not just about laptops. Most modern smartphones and PDAs also contain confidential data. This event will explain how you can protect your IT and data assets more effectively, and also how assets can be retrieved or data remotely deleted in the event of a loss or theft. This Webinar will: * Demonstrate how a layered approach to IT security is essential to managing and protecting your data * Explain how to stay compliant with regulatory requirements when it comes to IT security protection * Detail how asset tracking can help mitigate the impact of data theft or loss * Provide advice on how to cost-effectively protect your organisation against information theft and loss


Richard Dawson

Richard Dawson IT Services Manager, Bracknell Forest Council

    Geoff Glave

    Geoff Glave Product Manager, Absolute Software

      Steve Gold

      Steve Gold, Infosecurity Magazine

        Simon Perry

        Simon Perry Principal Associate Analyst, Quocirca