From "Fences" To "Bodyguards"—How Data-Centric Security Works

  • Wednesday, 4 November, 2015 | 15.30 – 16.20 hrs | Level 3 | Room: Auditorium Foyer

View all Sessions

Sensitive information is too often leaked, lost and stolen, resulting from either erroneous or malicious insider actions. Yesterday’s approach of “securing the perimeter” is no longer enough; CIOs must secure information at the source. Security technologies are evolving from “perimeter-centric” to “data-centric,” encrypting data to carry protection regardless of where it is, or who touches it.


This document was retrieved from on Fri, 21 Oct 2016 16:09:58 -0400.
© 2016 EMC Corporation. All rights reserved.