Implementing effective end-point security and data encryption in the modern IT environment

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The IT security world has changed. Web 2.0, hybrid malware and advanced hacking techniques are now part of the threat landscape. Add in the fact that organised criminal gangs are now operating relatively freely on the Internet and in the real world, and it's no small wonder that the average IT manager has a major task on his hands to protect his organisation's assets. In the current climate, businesses and their advisors need to ensure a solid understanding of the pitfalls and control measures that are required. There are clear lessons to be learnt from recent breaches and regulatory actions by the Information Commissioner and the FSA. This event will help attendees get to grip with these issues. This Webinar will: * Explain how data encryption and end-point security can protect your assets without breaking your IT budget. * Educate attendees on the importance of application and device control. * Detail how these technologies can be integrated with your existing IT security safeguards and policies, so enhancing your overall security. * Help you in your quest to develop total security safeguards and a complete solution for your IT assets. * Look at ways of future-proofing your IT security.


Alan Bentley

President of Global Strategy, Blancco

    Jamie Cowper

    Spokesperson EMEA, Resilient an IBM Company

      Steve Gold

      Steve Gold, Infosecurity Magazine

        Cliff May

        Cliff May Consulting Manager, Integralis