Productivity or Security: Do you have a Choice?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Effective collaboration is essential to every business. But collaboration between employees, contractors, and suppliers can produce a range of information security risks, such as privacy breaches, data loss, and the loss of intellectual property.

The growth of consumer-focused collaboration and information-sharing tools has brought productivity benefits to organisations. Their ease of use makes them popular with staff, but they are not built for the enterprise. Businesses need to make collaboration tools available that are not only easy to use, but also secure.

In this webinar we will explore:

  • The growth of the remote and mobile workforce and how it affects collaboration and communication.
  • The business value of secure information sharing.
  • Now businesses need control and visibility of their data to remain secure and compliant.


Melinde Henderson

International Enterprise Sales Manager, Globalscap

    Stephen Pritchard

    Moderator, Infosecurity Magazine

      Vijay Rathour

      Vijay Rathour Vice President, Stroz Friedberg, London

        Bob Tarzey

        Analyst and Director, Quocirca

        Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.