WEBCASTS

Vormetric Resource Center

On Demand Webcasts
  • On Demand Webcasts
  • Upcoming Webcasts
Webinar: How Should I Secure My Data-At-Rest? 3 Approaches for Effective Data Security

Date: October 26, 2016

A Joint Nutanix – Vormetric Webcast

Data security is not a one-size-fits-all solution. Data-at-rest should be secured in a variety of ways, depending on the use case, security policy, and regulation surrounding it. Modern enterprises need flexibility in how they apply data security, yet also need ease of management. Vormetric is a leader in data security, with a large global footprint of securing data in cloud and on-prem environments.

In this webinar, you will learn critical aspects to securing data in a variety of ways:

  1. Three approaches to securing data-at-rest
  2. How software-defined policies can ease security management
  3. The role that key management plays in securing data-at-rest
  4. How real-time alerting can take your security posture to the next level

Speakers:

Chris Olive

Michael Rothschild,
Sr. Manager Product Alliances and Marketing, Vormetric

Watch Now

Achieving Compliance in the Cloud

Date/Time: August 17, 2016 11:00 PT

There’s an internal tug-of-war playing out across organizations like yours: While the cost-savings and accelerated efficiencies of cloud are undeniable, data protection is a must. Any move towards dynamic IT environments like private, public, and hybrid cloud must be accompanied by comprehensive data-centric security and compliance strategies. Watch this webinar recording to learn to formulate IT security and compliance solutions that best match unique business requirements.

Speakers:

Liam Eagle

Liam Eagle
Senior Analyst,
Service Providers,
451 Research

Mike Ferrell

Mike Ferrell
East Region, Principal Security
Solutions Architect,
Century Link

Eric Wolff

Eric Wolff
Senior Product Marketing Manager,
Vormetric

Watch Now

Webinar: Protecting Your Data at Rest in Apache Kafka

Date: Thursday, September 8, 2016

Time: 10am PT | 1pm ET | 7pm CET

This webinar will cover the basics of Apache Kafka and the broader Confluent Platform ACL authentication and policy-driven encryption practices for data-at-rest and secure platform streaming.

Speakers:
David Tucker, Director of Partner Engineering, Confluent
Andrew Lance, Sr. Manager, Business Development, Vormetric

Watch Now

Webinar: Protecting Data in line with the Australian Data Breach Notification – A Best Practice Guide.

Date: Thursday 15th September, 2016

Time: 4.00pm Sydney Time

Organisations in Australia now have a renewed focus and urgency on the protection of personal information assets with the proposed mandatory data breach notification laws back in the forefront of Australia Parliament priorities.

With cybercrime and cyber threats exponentially increasing, organisations need to ensure their data security strategy is both comprehensive and stringent enough to deal with internal, external threats, audits and legislation.

This webcast will explain and guide organisations in order to effectively prepare for the forthcoming legislation but to also better prepare your business to thwart the on-going cyber risks it faces daily.

During the session, you will:

  1. Understand how the complexity and sophistication of cyber threat can damage your business
  2. Outline the proposed data breach notification and what it means for your business
  3. Highlight a best practice approach to safe-guarding your data

Speakers:
Brian Grant, Regional Sales Manager and Country Manager, Vormetric ANZ
Marta Ganko, Client Manager, Privacy and Data Protection Lead, Cyber Risk Services, Deloitte Touche Tohmatsu

Watch Now

Virtualization Unwrapped – How to Scale while Remaining Secure

Date/Time: July 27, 2016, 1PM EST, 10AM PST

There is no doubt that virtualization can reduce complexity and cost…So are all organizations not fully adopting it? Studies show that the two major reasons that organizations have delayed virtualization initiatives is due to scaling and security/compliance issues. Join us for the insightful webcast where we will show how many organizations are tackling these concerns faster and easier than they thought possible. Come away from the webcast with your action plan on how you can start or continue your journey to the cloud without the challenges that may have been holding you back.

Speakers:

Chris Olive

Chris Olive
Senior Sales Engineer at Vormetric

Adam Sekora

Adam Sekora
Director – Office of the CTO at SimpliVity

Watch now

Big Data Security Unwrapped

Date/Time: June 20, 2016 at 11AM PST, 2PM EST

Hadoop Environments are holding and analyzing an incredible and growing amount of data for most organizations. This data represents intellectual property, monetized product, and is increasingly holding regulated data. These facts are making big data environments prime cyber threat targets and a challenge for both security compliance offices. Join this webcast for live and interactive access to an esteemed panel of security thought leaders who will answer your questions and discuss live polling results on current best practices and the direction of Hadoop data protection.

Speakers:

Adrian Lane

Adrian Lane
CTO,
Security Analyst,
Securosis

Balaji Ganesan

Balaji Ganesan
Senior Director,
Enterprise Security Strategy,
Hortonworks

Ashvin Kamaraju

Ashvin Kamaraju
VP, Product Development,
Partner Management,
Vormetric

Watch Now

Webcast: Scalability & Security – Will we always be playing catch-up?

Date/Time: June 9, 2016, 9AM PST, 12PM, EST

(A Joint Nutanix – Vormetric Webcast)

With more organizations operating anywhere and everywhere, the question plaguing both business and IT titles alike is, how do I scale my infrastructure AND my security to keep up with the demands of my business. A more heterogeneous user base in more locations using more cloud based applications – both public and private - and transferring huge amounts of data. Is it even possible to ensure always-on capabilities while also being secure?

Join us for this exciting webcast where we will talk about the security and scalability challenges that organizations face as well as the enterprise cloud concept – the new approach many organizations are turning to in order to ensure secure “any-to-any service”. Any app, anywhere, anytime, always secured.

Speakers:
Michael Rothschild, Vormetric
Rohit Goyal, Nutanix

Watch now

Webcast: Will Encryption Save Europe’s Privacy Plans?

Date March 17, 2016

The proposed general data protection regulation follows a similar theme of being technology agnostic, apart from one particular part of privacy and security. There is nothing new about encryption: it’s been the basis of secure communication for decades, but in the future of European data protection, this was only method of technology mentioned.

Yet it continues to be a problem for businesses and is all too often missed out and this has resulted in breaches – see the TalkTalk breach as an example. Also in the IoT there seems to be a crucial missing part that is encrypted communications – is your fitness accessory, child’s toy or ISP deploying encryption?

In this webinar we will look at encryption deployment problems, what the EU is proposing and will ultimately demand in terms of security and privacy, and offer best practice recommendations for a decent experience for all.

Sol Cates, Vormetric’s CISO is joined by Fran Howarth of Bloor Research and host Dan Raywood, Editor of Infosecurity Magazine for this informative and thought provoking session.

Watch Now

Webcast : The Eye of The Security Cyberstorm

Date/Time: Wed, May 11, 2016 10AM PST, 1PM EST

(A Joint Vormetric – FireEye Webcast)

It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust most, namely people that have access to your privileged information and data. This insider threat can be your customers, partners and even your employees that accidentally or purposefully release or acquire sensitive data and use it for something other than what it was meant for.

Just imagine if you had a complete and panoramic scene size up along with the ability to proactively address potential threats of both the traditional threat vector of outsiders gaining information as well as the increasingly common and dangerous internal threat. Join us as we discuss this important topic as well as how you can ensure that your organization does not find itself in the eye of the security cyberstorm.

Speakers:
Chris Olive, Vormetric
Kevin Jackson, FireEye

Watch Now

Webcast: Easy Migration from End-of-Life RSA Data Protection Manager (DPM) to Vormetric Data Security

Date/Time: 11th April 2016, 2PM EST, 11AM PST

RSA has notified current users of End Of Product Support (EOPS) for their Data Protection Manager (DPM). Join us to hear about Vormetric's accelerated and proven migration for current RSA DPM customers to the Vormetric Platform.

Presented by
Brent Hansen & Michael Rothschild, Vormetric, a Thales Company

Watch Now

Webcast: No SQL – No (Security) Problem

Date: Tues, April 5, 2016 9AM PST, 12PM EST, 5PM GMT

A Vormetric – Couchbase Joint Webinar

It’s unmistakable. Organizations both big and small are moving to Big Data because of the information they can gather and leverage. This data is so valuable because of the insights it provides and its ability to better position the company with the customer as well as the board. But these are not the only groups that are interested in Big Data. Criminals, miscreants and evildoers are also interested in getting their hands on this information to exploit credentials and other secret information for their own gain.

In this session, we will discuss the common security issues that companies must deal with when moving to Big Data, as well as key steps you can take when deploying NoSQL to ensure that Big Data works for you rather than opening additional vulnerabilities in places you may have never considered.

Speakers:
Brent Hansen, Vormetric
Don Pinto, Couchbase

Watch Now

Webinar: Best Practices for Protecting Your Data in a Hybrid Cloud Environment

Date/Time: April 11, 2016 11 am PT / 2 pm ET

Your business has capitalized on managed cloud services to host many of your IT workloads. Now, you need to expand your cloud IT deployments further to scale cloud computing and storage resources to meet growing IT business demands. Suddenly, you have data center and cloud environments to manage to ensure your sensitive data remains protected and secure across your cloud providers. How do you get the most out of each of your cloud environments while maintaining control and protection of your sensitive data?

Learn how a comprehensive cloud data protection solution will allow you to meet your data protection and compliance requirements across your private, public and hybrid cloud environments. You’ll find ways to centralize your security controls to efficiently and effectively implement the data security solution to fit your business operational needs consistently in a hybrid cloud environment.

Join this informative CSA CloudBytes webinar as Jason Wolford, Product Manager for Rackspace Managed Security, discusses:

  • Data-centric security architectures for the cloud
  • Data-at-rest encryption to protect all copies of your data wherever they reside
  • Key management and access control administration in hybrid cloud environments
  • Security intelligence to monitor and detect advanced security threats and attacks

CSA and Rackspace

Register and listen to the recording.

Webcast: Not your father’s tokenization solution: Recent Innovations are driving use cases beyond PCI

Date/Time: April 5, 2 – 3pm ET

Tokenization is changing how we solve security problems. Long considered a stop-gap security measure for PCI compliance, recent innovations of vaultless tokenization help solve emerging use cases for desensitizing sensitive data at scale.

In this webinar we will discuss with Adrian Lane, CTO, Securosis and Imam Sheikh, Director, Product Management, Vormetric, how format preserving encryption is the engine behind seismic shifts in performance and scale required when moving and processing large amounts of data in complex IT environments. Join us to learn how these new algorithms are driving a new era in vaultless tokenization, and the new data protection use cases for cloud and big data environments—including supporting PCI DSS, ePHI and GDPR compliance.

Webcast: The Data Security Offense Playbook

Date/Time: Tuesday, March 24, 2016, 10:00 am Pacific Time

A joint webcast featuring EMA, Vormetric and Intel Security

By now, we all recognize the need of securing our data against the inevitable breach – but in doing so, is the business being put at risk in other ways? Often times putting security in place means the IT and security departments having to take a lot of time to learn, deploy, fine-tune and monitor the solution, effectively ‘back-burnering” initiatives that can drive the business forward. This can ultimately costs the business money. What security makes sense and it there a way to make it transparent to the IT and security manager? With more data in more places being more critical than ever, is it possible to deploy effective security that leverages and works in conjunction with your existing environment AND provides a great user experience for IT and the business?

Join us for this webcast where we will frame this increasing problem that often pits the business & IT folks against each other. Gain real knowledge into the issues confronting bot, as well as real ways to solve some of the most daunting security issues without hitting the speed bumps to the business.

Speakers:
David Monahan, EMA
Michael Rothschild, Vormetric
Nina Khachatourian, Intel Security

Watch Now

Webinar: The Latest Data Threats in the Cloud…and What They Mean to You

Date/Time: March 24, 2016, 12 noon PT / 3 pm ET

Businesses are moving more IT operations into the cloud, and storing more types of data in more cloud environments. To secure your private, public and hybrid cloud deployments, you need to be aware of the constantly changing data threat landscape to ensure you have the right cloud data security services and cloud provider to protect your sensitive assets. Do you have the data security services you need?

Join Andy Kicklighter, Director of Marketing from Vormetric, and Larry Collins, Product Manager from HOSTING, as they share the latest trends in the data threat landscape for cloud, big data and Internet of Things (IoT). They will review the most recent data security insights collected from 1000+ IT professionals like you and provide recommendations to protect your business data in your cloud environment.

What You’ll Learn:

  • Latest encryption and data security trends in cloud, big data and IoT
  • Best practices for data security solutions for any cloud environment
  • Cloud solutions to protect your business while meeting compliance requirements
Webinar: 2016 Trends in Encryption and Data Security in the Cloud

Date/Time: March 8, 2016, 11 am PT / 2 pm ET

An Inside Look: 2016 Trends in Encryption and Data Security in the Cloud

Today’s threat landscape is evolving. Sophisticated hackers, abuse by insiders and advanced persistent threats continue to make headlines – putting businesses at increased risk for attacks and vulnerable to significant reputational damage and financial losses. Is your company’s data properly protected?

Join Andy Kicklighter, Director of Marketing from Vormetric and Todd Hayes, Director of Learning and Development from QTS for a live webinar as they give you an inside look at how the data threat landscape has evolved in the past 12 months, as well as the key data security considerations for protecting your most precious assets in private, public and hybrid cloud environments. Our experts will also explore the direct impact of today’s data threats on cloud and big data, and offer tips on how to better protect critical IT infrastructure.

Highlights include:

  • Latest trends in encryption and data security in the enterprise and cloud.
  • Today’s sophisticated data threat landscape and the impact on cloud, big data and the Internet of Things.
  • Next generation data security technologies that streamline access controls and centralizing key management administration.
  • Operational efficiency, robust policy management and increased compliance trends.
  • Tips to keep protected, compliant and in control wherever your data resides.

Register and listen to the recording.

Webcast: Don’t Let Docker Containers Set Sail Unprotected

Date/Time: January 19th, 2016 2:00-3:00p.m. EST

The world of containers and micro services is very exciting as it is disrupting the way we all develop and deploy software at an amazing pace. However, many like you are trying to get to the bottom of what security in Docker means, and how you will operationalize security with containers. Security professionals must be ready to protect their companies that are rushing to optimize their development and resource utilization with containers. Join Vormetric’s Chief Security Officer, Sol Cates, to explore Docker’s architecture, and how organizations are shoring up the gaps that this amazing new model is presenting.

Speakers:

Sol Cates – CSO, Vormetric
Jay Lyman – Research Manager, Cloud Management and Containers

Watch Now

Webcast: How Hyperconverged, Hypersecure Is Your Organization?

Date: 3rd December 2015, 10AM PST, 1PM EST

With today’s speed of business and competitive marketplace, spending too much time having to test, deploy and fine tune your infrastructure needlessly consumes resources and puts you at a disadvantage. Just imagine an infrastructure that was flexible and simple and transparent security that while invisible, was highly secure.

Join us for the Nutanix – Vormetric webcast which will discuss the most common infrastructure and security concerns that are draining valuable resources in organizations like yours and how you can stop the bleeding. Join us to learn about the Nutanix Hyperconverged Infrastructure & Vormetric Transparent Encryption.

Nutanix logo

Watch Now

Webcast: Taking a Structured Security Approach to your Structured & Unstructured Data

Date: 10th November 2015, 10AM PST, 1PM EST

With all of the high profile and often successful hacks, we know what cyber criminals are after, IT’S THE DATA

With the significant security risks posed by both unstructured and structured data on physical, hybrid and virtual environments

THERE IS NO SILVER BULLET TO PROTECT IT ALL

There however is a structured and methodical way to approach these threats by coordinating comprehensive database and file security with proactive threat analytics and complete end-to-end forensics which can significantly mitigate data breach risks without breaking the bank.

Vormetric Logo

Intel Security Logo

451 Research Logo

Join 451 Research, Intel Security, & Vormetric for an enlightening webinar where you will be briefed on the current state of the data threat and the right methodology to secure your data and your organization.

Webcast: Creating an encryption strategy for modern risks mitigation

Date: Friday, September 25, 2015

Every company has a data security risk mitigation strategy. However, the continuous news cycle on data breaches is proof that it is time to augment that strategy. David Shackleford, IANS faculty member, will share his research results, recommendations and answer questions on the insight he gained in writing his recent report, “Encryption as an Enterprise Strategy.” You'll leave this webinar understanding how an encrypt everything security architecture could significantly reduce risk of sensitive data theft and exposure of your company's data.

Speakers:

Charles Goldberg, Senior Director, Product Marketing, Vormetric

Dave Shackleford, founder, Voodoo Security and former CSO, Configuresoft

Watch Now

Webcast: The Right Tools for the Job: Encryption for Data-at-Rest in Back-End Systems

Date: Thursday August 27 2015, 1PM EST, 10AM PST

Are You Deploying The Best Tool To Solve Your Security Challenges?

Warning: Latest Research Shows Full Disk Encryption is being misapplied in too many cases leaving companies with a false sense of security.

And you may only make this discovery when it is too late

According to a recent Aberdeen analyst report, FDE solutions are not addressing the most common threats found in back-end systems. In fact FDE secures less than 20% of threats in back-end systems, like your data center.

Join us to learn about the analytic approach, results, and recommendations on how to address the most common risks faced by both end-points and back-end systems.

Speakers:

John Howie, Chief Operating Officer, Cloud Security Alliance

Charles Goldberg,
Sr. Dir. of Product Marketing, Vormetric,

Drew Amorosi, Deputy Editor, Infosecurity Magazine

Derek Brink,
CISSP, VP & Research Fellow, Aberdeen Group

Watch Now

Webcast: Securing Your Couchbase Server Deployment Using Vormetric

Date: June 9th 2015

With increased adoption of the NoSQL, companies are also increasingly populating Couchbase Server with sensitive information. This information can take the form of such things as personally identifiable information (PII), personal health information (PHI), or sensitive customer/internal information. This information must adhere to regulatory requirements – such as PCI and HIPPA, adhere to state and local privacy laws, adhere to customer and partner service level agreements, and have controls in place to prevent insider abuse of the sensitive information. In this session, learn how Vormetric and Couchbase have partnered together to address the data security needs for protecting sensitive information being stored in Couchbase Server.

Speakers:

Arun Gowda, VP of Business Development, Vormetric

Don Pinto, Senior PM

Watch Now

Webcast: Crunch Time for Securing Big Data – with DataStax & Vormetric

Date: 9th April 2015

The evolution of big data is in high gear. It is an exciting time but organizations are only just embracing the advantages that big data can bring to their business. With few native security controls built into big data platforms, maintaining the confidentiality of an enterprise’s data becomes a significant challenge. Unfortunately, for big data environments the traditional ‘bolt-on’ security measures are not able to properly protect these architecturally different deployment models.

Speakers:

Sol Cates, CSO Vormetric

Alea Fairchild VP and Principal Analyst, Constantia Institute

Johnny Miller Solutions Architect, DataStax

Stephen Pritchard Moderator, Infosecurity Magazine

Watch Now

Webcast: Comprehensively Secure your Big Data Environment - with Hortonworks & Vormetric

Date: July 16th 2015

By leveraging Big Data, you already know your data now comes from a variety of sources, including CRM systems, files, spreadsheets, video, social media, payment data, and more. As data is being collected from these diverse sources, sensitive information must be protected. The question is - how do you comprehensively secure your Big Data environment amid the almost daily reports of yet another colossal breach affecting another organization?

Join this webinar and gain practical information on how to best leverage Hortonworks and Vormetric to comprehensively secure your Big Data environment, address compliance issues, and minimize the impact on your systems.

Speakers:

Charles Goldberg, Sr. Director of Product, Vormetric

Balaji Ganesan, Sr. Director, Enterprise Security Strategy, Hortonworks

Watch Now

Webcast: The European Insider Threat Report - Areas of Concern for 2015 and Beyond

Date: June 18th 2015, 02:00 PM (BST)

Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for criminal purposes and nation state goals.

With insider threats spanning both these areas, the 2015 Vormetric Insider Threat Report – European Edition, which will be released on 17th June 2015, outlines the findings the security concerns of European organisations and the implications of these threats to business.

Speakers:

Join Sol Cates, Chief Security Officer of Vormetric, on this exclusive webinar to learn about:

  • Rates at which enterprises are encountering data breaches and failing security audits.
  • Industry and analyst views on where data most needs protecting, and what defences are most effective.
  • The security controls most used to protect from privileged user abuse.
  • The most dangerous employees – which insiders pose the greatest risks.

Watch Now

Webcast: Cloud Encryption—One Shoe Won’t Fit All

Date: Friday 17th April 2015, 2pm-3pm ET

There is no question about the acceleration of data migrating to the cloud. But which cloud? All clouds: a mix of Infrastructure-, Platform- and Software-as-a-Service cloud models are being deployed by almost every organization. When sensitive and regulated data move into these environments different data encryption methods need to be considered.

In this presentation you will learn:

  • How to evaluate if you need to encrypt your cloud-bound data
  • Available methods and techniques enterprises are deploying today
  • Considerations in selecting the right key management strategy

This presentation should be attended by anyone directly responsible for assuring security and compliance of corporate data, as well as those architecting or planning a cloud migration or the implementation of a new cloud service.

Watch Now

InfoSecurity Magazine Webinar: Crunch time for securing big data, hosted by Vormetric and DataStax

Date: Thursday 9th April 2015, 15.00hrs GMT

The evolution of big data is in high gear. It is an exciting time but organisations are only just embracing the advantages that big data can bring to their business.

With few native security controls built into big data platforms, maintaining the confidentiality of an enterprise’s data becomes a significant challenge. Join Sol Cates, CISO of Vormetric and Johnny Miller, Solutions Architect of DataStax for an engaging discussion on how organisations can secure their big data environments. During this engaging interactive session, delegates will

  1. Understand how global organisations are using NoSQL technologies like Apache Cassandra™ to increase competitive advantage
  2. Have learned why traditional security solutions are unable to protect these environments
  3. Discover how to mitigate risks of storing large volumes of intellectual property in a centralised NoSQL repository while adhering to compliance mandates
  4. Understand how encryption in a NoSQL environment ingesting extremely large datasets in real-time can be transparently deployed without having to modify applications or re-architect the storage infrastructure

Watch Now

Webcast: Database Security: Don’t Forget to Lock the Back Door

Date: 2nd April 2015, 10:00AM Pacific

Would you ever consider leaving your house for the day without locking your door? Of course not!! It is as important to protect and control front-door access of your databases as it is to lock the front door of your house. That is why we use a suite of database discovery and activity monitoring tools to control the front door access of our databases. Yet hackers and miscreant insiders know that the back door of databases are all too often left wide open—and it is the path of least resistance to steal valuable data.

Vormetric has partnered with Intel Security to integrate with McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM) to extend data-security coverage. Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption.

In this presentation, Vormetric will demonstrate:

  • How to complete database security, to assure that back door entry is as locked down as the front door
  • How to protect the database, and its associated files such as configuration, logs and reports, from not only physical theft, but also from insider threats and hackers

Watch Now

Webcast: Cracking the Confusion between Encryption and Tokenization

Date: 5th March 2015, 2:00 PM - 3:00 PM (EST)

Today there are more options for securing enterprise data than ever before. Yet with so many approaches, choosing the best fit isn’t always an easy decision. This webcast will cover the difference between encryption and tokenization, guide you towards selecting the best approach for your business and compliance needs, and accelerate your encryption and tokenization projects. In addition, you will:

  • Understand the different encryption layers and options to cover your entire data center
  • Explore the power of tokenization
  • Know how cloud, applications and new architectures affect your key management
  • Choose the best data security option for your needs
  • Learn how a platform approach adds flexibility and savings to data security architectures

Once you understand the basic foundations of data security systems and your needs, the choice between Encryption and Tokenization is usually clear.

Speakers:

Rich Mogull, Analyst & CEO, Securosis, Charles Goldberg, Senior Director of Product Marketing, Vormetric

Watch Now

Webinar: Understanding Database Encryption with Couchbase and Vormetric

Date: 24th February 2015, 10:00AM (PST)

Data security is no longer a checkbox in the IT or operations departments. Instead, it's a top business priority for most enterprises. If you’re worried about protecting your sensitive data at rest, you need a transparent data encryption solution.

Now, there is a solution with Vormetric, which provides transparent encryption, key management, privileged user access control, and security intelligence.

Join security experts Arun Gowda, VP Product Development at Vormetric and Don Pinto, Product Manager at Couchbase as they describe how Couchbase and Vormetric can be combined to address your encryption requirements.

This webinar will cover:

  • How Vormetric can be used to encrypt sensitive data on disk
  • What transparent data encryption is and how it protects against security threats
  • How to monitor/block non-database users or processes from accessing or viewing sensitive data

Speakers:

Don Pinto, Product Manager, Couchbase

Watch Now

Webcast: SC Magazine 2015 The Year of Securing Big Data and Cloud Environments

Date: 12th February 2015, 9:30AM EST

2015: The Year of Securing Big Data and Cloud Environments.

2015 will mark a pivotal year in the adoption of Big Data and Cloud within the enterprise.

Critical to embracing this approach will be securing data in these environments. Questions such as access by 3rd party cloud providers to your data and the sharing of sensitive information within Big Data environments, need to be effectively addressed.

Join Vormetric for an educational session that will present an effective approach to securely embracing these technologies. During a 45 minutes session, Sol Cates, CSO of Vormetric discusses the changes happening to data as part of this exponential growth. Using real life illustrations, Sol will investigate:

  • The shift taking place within the traditional enterprise environments driving the adoption of Big Data and Cloud
  • The drivers to securing sensitive enterprise data as a result of this exponential adoption and growth including: Compliance, Current threat landscape, New areas of vulnerability
  • The unique data security risks to organisations when utilising Cloud and Big Data solutions
  • Why protecting the data is critical to the success or failure of enterprise engagements
  • Ultimately, why securing the data within these environments is now mission critical to the security of your business

Featured Speaker:

Sol Cates, CSO, Vormetric

Watch Now

Webinar: Results and Perspectives from the 2015 Vormetric Insider Threat Report

Date: 29th January 2015, 1:30 PM (EST)

Information is the life blood of modern business - and increasingly under attack from both traditional insiders motivated by financial gain, and external hackers that compromise insider accounts for criminal purposes and nation state goals.

With insider threats spanning both these areas, this webinar features Ovum Principal Analyst Andrew Kellett, author of the 2015 Vormetric Insider Threat Report and Tina Stewart Vice President of Marketing with Vormetric detailing the findings of the report and their implications for business.

Register for this webinar to learn:

  • Rates at which enterprises are encountering data breaches and failing security audits.
  • Industry and analyst views on where data most needs protecting, and what defenses are most effective.
  • The security controls most used to protect from privileged user abuse.
  • The most dangerous employee-which insiders pose the greatest risks.

Featured Speaker:

Tina Stewart, Head of Marketing, Vormetric, Andrew Kellett, Principal IT Security Analyst, Ovum

Watch Now

Webcast: How to Secure Data and Achieve PCI DSS 3.0 Compliance

2015 is fast approaching and the deadline for PCI DSS 3.0 compliance is just around the corner. Retailers, payment processors and financial institutions are now feeling the strain on what are the best steps to take.

Irrespective of the timescale, the cold fact is that in 2015 organisations need to have strategies and procedures in place to protect their customers’ data against security breaches and data loss.

Join Brian Pennington, Regional Sales Director of Coalfire and Darren Harmer, Senior Systems Engineer, Vormetric as they outline a best practice approach to protecting your data and adhering to PCI DSS 3.0.

During this 45minute session Brian and Darren will discuss

  • The significant differences between PCI DSS v2.0 and v3.0
  • What you can do to mitigate the impact of the changes
  • Why encrypting data at rest and data in motion adheres to the compliance mandate
  • The Vormetric approach to securing data in motion and at rest

Featured Speaker:

Brian Pennington, Regional Sales Director, Coalfire and Darren Harmer, Snr Systems Engineer, Vormetric

Watch Now

Webcast: Protect What Matters - The Data

With data breaches now a statistical certainty and traditional perimeter security failing to prevent the breach, data has become a very real currency. Almost every organisation has sensitive information where employees with boundless privilege to access sensitive data present the greatest risk. As a result, organisations are now turning to protect what matters – the data.

  • The reality of the threat to your organisation in 2014 and how these threats are growing ever more sophisticated and harder to detect
  • How to protect what matters internally and externally with advanced encryption and fine-grained access control
  • Current regulatory compliance rules that focus on the protection of critical sensitive personal data or intellectual property
  • How Vormetric Data Security reduces the impact of a data breach by helping enterprises achieve application and transparent encryption and key management compliance by protecting both structured and unstructured data in a heterogeneous environment.

Featured Speaker:

Liam Ryan,
Channel Manager, EMEA, Vormetric

Watch Now

Webcast: Defending Data in a Perimeter-less Environment

Cyber threats continue to flood the headlines across government and commercial sectors. Today’s attackers are skilled professionals conducting progressive targeted attacks. As network perimeters dissolve it is easier for adversaries to locate holes in your network to infiltrate.The result is that advanced security technologies and paradigms need to shift to stay ahead of the threat. Prevention alone can’t protect most organizations. You need to secure what they are after--the data.

Join this webinar to hear from Brad Pray, Brig. Gen., USAF (Ret.), AxiosTec and Vormetric to how secure your data.

Featured Speaker:

Bradley R Pray
COO Axios LLC, Retired Brig Gen, USAF, former Deputy Director Plans and Policy US Cyber Command

Watch Now

Demo: Cloud Data Encryption Myths Debunked

Controlling data encryption and key management is a MUST in the cloud. The Internet of Things. Mobility. The app explosion. Big data. As the Internet continues its dynamic evolution in the cloud, the security threat landscape expands alongside it. And in the middle of it all, data is being delivered, accessed, and stored in more places with more devices. Protecting it is paramount.

Join Vormetric’s VP of Cloud, C.J. Radford, and FireHost’s CISO, Kurt Hagerman as they discuss a better, smarter approach to data security.

  • Dispel common myths of data encryption (the realities may surprise you)
  • Learn the vital role data encryption and key management play in the cloud
  • See how data encryption and key management fit into a broader security framework

Speakers:

C.J. Radford, Vice President of Cloud, Vormetric

C.J. Radford,Vice President of Cloud leads the company’s cloud strategy and growth initiatives with Software as a Services (SaaS) and cloud service providers (CSPs). Prior to Vormetric, he spent more than five years at Symantec driving business development and strategic growth initiatives within the rapidly evolving CSP market as well as acting as head of the cloud and IT services team for global business development and alliances.

Kurt Hagerman, Chief Information Security Officer, FireHost

As chief information security officer (CISO) for FireHost, Kurt Hagerman oversees all compliance related and security initiatives. He is responsible for leading FireHost in attaining ISO, PCI, HIPAA and other certifications, which allows FireHost customers to more easily achieve their own compliance requirements. He regularly speaks and writes on information security topics in the payment sand healthcare space as well as on cloud security.

Watch Now

Webcast: Intelligent Encryption: Keys to Better Data Security

Date: August 21, 2014 | Time: 8:00 AM PDT

Controlling data encryption and key management is a MUST in the cloud. The Internet of Things. Mobility. The app explosion. Big data. As the Internet continues its dynamic evolution in the cloud, the security threat landscape expands alongside it. And in the middle of it all, data is being delivered, accessed, and stored in more places with more devices. Protecting it is paramount.

Join FireHost’s CISO, Kurt Hagerman, and Vormetric’s VP of Cloud, C.J. Radford, as they discuss a better, smarter approach to data security.

  • Dispel common myths of data encryption (the realities may surprise you)
  • Learn the vital role data encryption and key management play in the cloud
  • See how data encryption and key management fit into a broader security framework

Watch Now

Webcast: Best Practices for Protecting Sensitive Data from Insider Threats

Date: 22nd July, 2014 at 11am PT / 2pm ET

Insider threats have shifted to include both traditional insiders – individuals with access to critical data as part of their work, and privileged users -- and the compromise of legitimate users' credentials by sophisticated malware and advanced persistent threats (APTs).

According to the latest Insider Threat Report from Vormetric, organizations are still wrestling with this growing problem, and struggling to find an appropriate security response.

For example only nine percent of European enterprises feel protected against insider threats, and 39 percent are worried about the abuse of "access rights" to their data.

In this webinar, we will drill down into the nature and extent of insider threats today and look at how to combat them, including:

  • What are the various risk mitigation strategies available to businesses of different sizes
  • Compare the efficacy of some of the best protection measures to block insiders from compromising enterprise networks and extracting data
  • What are some of the best practices for protecting sensitive data from insider threats

Speakers:

  • David Strom, Network and Internet Technologies Expert
  • Tina Stewart, Vice President of Marketing, Vormetric

Watch Now

Webcast: Safeguarding data in the cloud

Date: 07 May 2014

More and more organisations have enlisted cloud services to save time, money and to introduce more efficiencies into their organisations. End-users have come to love how easily they can access and share information with co-workers – both within the office and remotely. Yet, security professionals must protect the assets traversing these services, and the management must not be overlooked by the executives opting for their use. Access controls, encryption and more all must be considered, along with just who and how corporate data is exposed. We explore some of the more critical security issues executives must consider when relying on the cloud.

Speaker: Jim Reavis, CEO, Cloud Security Alliance

Watch Now

Webcast: Risk based Enterprise Defense

Date: 07 May 2014

SCMagazine’s 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough? This webinar will explore the reasons for the disconnect between what readers say is an increased focus and spend on data security practices and the too-frequent cyber security crimes that are occurring these days. In addition, we’ll review the biggest threats uncovered by the survey, explore the potential consequences of data thefts and exposures that might drive adoption of tighter security measures and reveal insights into protecting corporate data and mitigating the damage if a breach does occur.

Speaker: Rick Doten, CISO, DMI

Watch now

Webcast: Perception vs. Reality: What You Should Know About Database Encryption

Date: 09 May 2014

Devastating—that's the best way to describe the impact of not having a strong database security initiative. Did you know that 35% of all cyber attacks today occur without enterprises ever knowing that such an attack took place? It only takes 30 seconds to steal your data – making it humanely next to impossible to stop these sophisticated attacks. Your company's most sensitive financial and customer information is stored in databases, Hadoop and NoSQL platforms that are vulnerable. It's time to increase protection and defend your sensitive data.

Speaker: Noel Yuhanna, Principle Analyst, Forrester Research

Watch now

Webcast: The Threat from Within: What Can We Learn from the Edward Snowden Affair?

Date: 26 June 2014, 15.00 BST

Edward Snowden was a ‘privileged user’, and these users exist within all organizations. Root users, domain administrators, system administrators or other high-level IT personnel often have powerful and privileged access rights.

Although they require a high level of access to perform their job functions, there are significant security issues that arise when these users also have access to data stored within computer systems, and the ability to read, copy, or alter documents and other files. This webinar will delve into the details of insider threats, exploring the risks posed by privileged users and incorporating newly released research that will show the impact this threat is having on enterprises, while discussing methods to overcome it.

During this webinar you will:

  • Examine the latest research findings into insider threats
  • Understand what a privileged user is and why they present a risk to enterprises
  • See what can be learned from the Edward Snowden affair – the privileges he had and how they were abused
  • Find out how privileged users can be exploited by outside attackers
  • Discover the best methods to overcome insider threats and prevent privileged users from unauthorized access

Speakers:

  • Drew Amorosi, Moderator, Infosecurity Magazine
  • Sol Cates, Chief Security Officer, Vormetric

Watch Now

Webcast: 2014 Insider Threat Report / New Data Protection Regulations

Date: 08 May 2014, 3PM

Insider threats have shifted to include both traditional insiders – individuals with access to critical data as part of their work, and privileged users  -- and the compromise of legitimate users' credentials by sophisticated malware and advanced persistent threats (APTs).

According to the latest Insider Threat Report from Vormetric, organisations are still wrestling with this growing problem, and struggling to find an appropriate security response.

For example only nine per cent of European enterprises feel protected against insider threats, and 39 per cent are worried about the abuse of "access rights" to their data.

Speaker:

  • Andrew Kellett
    Principal Analyst, Security
    Ovum;
    m: +44 (0)7715 748 938 | e: andrew.kellett@ovum.com
  • Sol Cates, CSO , Vormetric

Watch now

Webcast: Make It Stop! Protecting Corporate Data Assets Against Breach

Date:29 April 2014, 11:00 - 12:00PM PDT

SCMagazine’s 2014 Data Breach Survey shows companies are taking steps to raise security awareness and investing in IT security and risk management practices but given the number of breaches and other high profile cyber crimes that have occurred more recently, are they doing enough? This webinar will explore the reasons for the disconnect between what readers say is an increased focus and spend on data security practices and the too-frequent cyber security crimes that are occurring these days. In addition, we’ll review the biggest threats uncovered by the survey, explore the potential consequences of data thefts and exposures that might drive adoption of tighter security  measures and reveal insights into protecting corporate data and mitigating the damage if a breach does occur.

Speaker:

  • Rick Doten: Chief Information Security Officer, DMI
  • Tina Stewart: Vice President of Marketing, Vormetric, Inc.

Watch now

Webcast: Cybersecurity (breaches, risks, threats, and solutions)

Date: 24 April 2014, 11AM CST/ 9AM PDT

With the recent rash of data breaches and incidents impacting retailers (and customers), what are retailers to do? We are all aware that being compliant does not make you secure, but what does make you secure? In today’s threat landscape, can you ever really be secure? In this session we will explore security beyond compliance, reducing risk by removing sensitive data from the environment, being compliant with industry requirements, and developing methods and solutions to reduce the overall risk to the enterprise.

Speakers

  • Tom Borton, CISA, CISM, CISSP, CRISC,
    Director, IT Security and Compliance
    Cost Plus World Market
  • Derek Tumulak

Watch now

Webcast: Global Compliance and Data encryption: obligation, or opportunity?

Date: 6 March 2014, 15:00 GMT
Duration: 1 hour

As recent cases have highlighted, data protection authorities in Europe are taking an increasingly hard line with businesses that lose personal data. And forthcoming EU data protection reforms will make the penalties even more severe.

Businesses can, and should, be taking steps to comply with global data protection laws, and there is a strong business case for doing more than the bare minimum to protect customer or citizen data.

But information security teams need to over-reliance on any one protection measure, even when that measure, such as encryption, is increasingly demanded by law makers.

In this webinar we will cover global compliance and its effects including:

  • the changing regulatory landscape around personal data
  • the role of encryption in protecting data
  • the importance of access controls and data segregation
  • how to create a robust, but practical, policy framework around data protection;
  • the business benefits of good data protection practice.

Watch now

Speakers:

  • Stephen Pritchard: Contributing Editor, Infosecurity Magazine
  • Rik Turner: Senior Analyst, Ovum
  • Stewart Room: Partner, Field Fisher Waterhouse LLP
  • Derek Tumulak: Vormetric Inc
Webcast: Protecting Enterprise Data in the Cloud

Enterprises are increasingly employing cloud services to store and share information. Developing stronger methods of securing sensitive data in the shared infrastructure is that much more critical.

In this special webcast, Dark Reading editor Tim Wilson hosted a lively discussion covering these topics:

  • The potential threats posed to stored data in cloud and shared-tenant IT environments
  • The chief methods used by attackers to penetrate cloud environments
  • Recommendations on securing enterprise data stored in the cloud
  • Key tools and services available for encrypting and securing stored data in cloud environments
  • Recommendations for building out cloud data security/storage strategies

Speakers:

  • Tim Wilson, Editor, Dark Reading
  • John Howie, Chief Operating Officer, Cloud Security Alliance
  • C.J. Radford, Vice President, Cloud, Vormetric

Watch Now

Webcast: Lock Down: How to Keep your Important Data Safe in the Cloud

For security reasons, cloud computing presents a huge dilemma: How do you embrace the benefits of the cloud while maintaining security controls over your organization’s assets? It is difficult to determine whether the increased risks are truly worth the agility and economic benefits.

This shift in control is the #1 reason why new data security approaches and techniques are required. When an outside party owns, controls and manages infrastructure and computational resources, how can you be assured that sensitive data remains private and secure, that your organization is protected from damaging data breaches, and that you can still satisfy the full range of reporting, compliance and regulatory requirements?

In this session you will learn how to proactively address security in the cloud so that your organization isn’t next week’s data breach headline.

Speakers: Drew Amorosi, InfoSecurity Magazine, Deputy Editor

CJ Radford, Vormetric, VP of Cloud

Watch Now

2017 Data Threats – The Big Disconnect

Date/Time: February 8, 2017 8:00 AM PT

Spending on IT security to protect data is up - sharply in some sectors – yet successful data breaches are also up significantly. Clearly, there’s still a big disconnect. In this webinar And Kicklighter with Thales e-Security, and four time prime mover behind the Thales Data Threat Report, reviews the detailed findings of the just released 2017 Data Threat Report – Global Edition with an emphasis about the data threats that enterprises are experiencing, what they are doing to secure their data and actionable recommendations that enterprises can use today to secure their sensitive data from data threats.

  • IT Security spending is increasing at 73% of enterprises driven by compliance and data security concerns
  • Data breaches at enterprises are also up - with 68% of enterprises experiencing a breach, 26% in the last year
  • What’s behind the big disconnect? And what should you be doing?

Register Now

CUSTOMER QUOTE

 We achieved PCI DSS compliance with the help of Vormetric Data Security. 

Rick Olejnik
Chief Information Security
Office, RSIEH

The Vormetric Digital Digest on Data Security

Customer and Partner Success

  • Rackspace Cloud Partners
  • McKesson
  • AWS
  • Google Compute Engine
  • Microsoft
  • IBM
  • CenturyLink
  • QTS
  • Teleperformance Secures
  • Delta Dental