Taking a Data-Centric Approach to Security in the Cloud

As organizations move business-critical applications from legacy on-premises systems to the Cloud, they need to fully evaluate their approach to security. Traditionally, IT security has focused on strong perimeter security – “keeping the good stuff in and the bad guys out.”  But moving to the cloud – where business-critical data may be stored by cloud service providers in distributed locations – necessitates companies to rethink how to provide security, compliance, and peace-of-mind.

This on-demand webinar covers:

  • Principles and advantages of a data-centric approach to cloud security

  • Considerations when assessing and deploying security for varying types of cloud data and applications

  • Encryption and tokenization – what, when and how, including requirements such as access controls, key management and searchability
Willy Leichter

William Leichter has over 20 years of experience helping Global 1000 companies meet security and compliance challenges within their networks and in the cloud. Mr. Leichter leads CipherCloud’s efforts to evangelize new models for cloud security, and translate that into product requirements, and market positioning.

CipherCloud Logo