Register Now

     First Name:
     Last Name:
     Title:
     Company:
     Address:
     Dept/BOX/ MS:
     City:
     State/Prov:
     Zip/Postal Code:
     Country:
     Email:
     Phone: - -
     Fax: - -
     Company URL:

 
How many employees are in your entire organization?
 
Register Now
Featured Speakers:
 
  • Steve Kovsky,  Contributing Editor: InformationWeek/TechWeb
     
  • Phil Owens,  Senior Sales Engineer, GFI
     
  • John P. Pironti, GEIT, CISA, CISM, CISSP,  President, IP Architects, LLC
     
    GFI Privacy Policy

    Bookmark and Share

     
     
    A Dark Reading Webcast:

    Business Beyond the Perimeter: Maintaining Endpoint Security in the Cloud Era

    Duration: 60 minutes

    The traditional approach to maintaining ironclad security in the enterprise has been to shelter sensitive data and resources behind a closed "perimeter wall" designed to keep good data in and the bad guys out. Then came the Cloud.

    Today's globally connected economy, powered by ubiquitous broadband and the ability to leverage offsite Cloud computing environments on-demand, means that more and more of your biggest customers and partners -- even your employees -- will be connecting remotely to your corporate LAN from outside your perimeter wall. This proliferation of remote users and machines connecting across the Cloud presents a major potential security problem: Although they are physically outside of your perimeter, they often require full access and privileges to some of your most sensitive onsite data, making them a huge risk from a security standpoint.

    In this exclusive Webcast, experts will offer detailed insight on how to conduct business beyond a perimeter wall, including how to monitor remote resources with Cloud-based access to your secure IT environment, to make sure they are not only functioning properly, but remain free from malware or vulnerabilities that could invite attack.


     
     

    UBM Tech - 600 Community Drive, Manhasset, New York 11030 - Privacy Statement