Productivity or Security: Do you have a Choice?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Effective collaboration is essential to every business. But collaboration between employees, contractors, and suppliers can produce a range of information security risks, such as privacy breaches, data loss, and the loss of intellectual property.

The growth of consumer-focused collaboration and information-sharing tools has brought productivity benefits to organisations. Their ease of use makes them popular with staff, but they are not built for the enterprise. Businesses need to make collaboration tools available that are not only easy to use, but also secure.

In this webinar we will explore:

  • The growth of the remote and mobile workforce and how it affects collaboration and communication.
  • The business value of secure information sharing.
  • Now businesses need control and visibility of their data to remain secure and compliant.


Photo of Melinde Henderson

Melinde Henderson

International Enterprise Sales Manager, Globalscap

Photo of Stephen Pritchard

Stephen Pritchard

Freelance Writer, Infosecurity Magazine

Vijay Rathour

Vice President, Stroz Friedberg, London

Photo of Bob Tarzey

Bob Tarzey

Analyst and Director, Quocirca

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.