Compliance Tag

Edge computing is vital not just to the burgeoning world of real-time responsive IoT, but to enterprise network security, as these IoT systems multiply and spread. Edge computing creates a distributed infrastructure with centralized management and lights-out -- or remote -- operations built on private cloud infrastructure. Edge...

In my previous blog I discussed the five components of a successful video governance strategy: Assessment, Access, Encryption, Approval, and Retention.  I discussed best practices for addressing each of these areas, but didn’t address the “how.” How you enforce security, governance, and retention policies requires a critical...

Thanks to cloud computing, the proliferation of endpoints, the emergence of new technologies and paradigms like IoT and Blockchain, enterprise data protection has undergone a paradigm shift. The challenge is no longer simply to classify and lock down structured data in protected on-premise environments. Today...

GDPR requires organizations to identify, classify, and protect personal information, but how do you prepare and protect against a possible breach if you don't know what data you have, where it lives, or how it's classified? In this informative webinar we discuss:  GDPR data classification...