Voltage Security

Displaying 1-7 of 7 results

  • Webcasts // Jan 2009

    Ensuring Your Next Board Meeting Is Not About Data Breaches

    Voltage Security is replacing the outdated encryption approaches, thereby enabling one - the global enterprise - to protect information end-to-end across any legacy or contemporary IT system, at any scale, and with short implementation at 1/5th of the time of alternative solutions while also providing high value business ROI of...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Transparently Encrypting Data in Mainframe z/OS and Open Systems to Achieve End-to-End Data Protection

    In a world of ever increasing large scale data breaches the mainframe z/OS environment is not immune. But securing credit card, social security and other types of sensitive numbers or data has been huge challenge, especially in large mixed environments that include both mainframe z/OS and open systems. It can...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Understanding Tokenization and End-to-End Encryption

    One may have heard about the rising number of data breaches occurring in the industry. The disturbing fact is that 99% of current security solutions would not have prevented breaches at leading brand name companies. Why? Because current approaches to protecting sensitive data within the organization are difficult and expensive...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Data Protection Risks and How to Avoid Them

    The presenters of this webcast talk about the top five risks of protecting customer data and what to do about them. Concerned by recent high profile data breaches? The attendee of this webcast will learn about the challenges organizations are facing today in protecting data and how they are attempting...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Integrating Encryption With Archiving and eDiscovery

    Archiving, eDiscovery and Encryption all create competing requirements on organizations. Many companies must encrypt sensitive email information, yet at the same time archive those emails and be ready for eDiscovery processes in the future. Traditional encryption approaches make it very difficult to accomplish all three goals. New approaches from Symantec...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Thwarting Insider Threat, Strengthening Communications, and Meeting Policy With Secure Internal Communications

    Internal email, if unprotected, contains the same security level as a postcard. Without email encryption, malicious, as well as curious, insiders have complete access to sensitive company information, including financial data, trade secrets, and customer data. This webcast covers the benefits of email encryption for strengthening communications while protecting against...

    Provided By Voltage Security

  • White Papers // Oct 2008

    Guide to PCI DSS 1.2 Compliance With Voltage SecureData

    With the introduction of PCI DSS 1.2, organizations processing and storing credit card data must define a program for strict compliance to a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with the regulation can be painful and disruptive, even without careful planning...

    Provided By Voltage Security

  • White Papers // Oct 2008

    Guide to PCI DSS 1.2 Compliance With Voltage SecureData

    With the introduction of PCI DSS 1.2, organizations processing and storing credit card data must define a program for strict compliance to a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with the regulation can be painful and disruptive, even without careful planning...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Ensuring Your Next Board Meeting Is Not About Data Breaches

    Voltage Security is replacing the outdated encryption approaches, thereby enabling one - the global enterprise - to protect information end-to-end across any legacy or contemporary IT system, at any scale, and with short implementation at 1/5th of the time of alternative solutions while also providing high value business ROI of...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Transparently Encrypting Data in Mainframe z/OS and Open Systems to Achieve End-to-End Data Protection

    In a world of ever increasing large scale data breaches the mainframe z/OS environment is not immune. But securing credit card, social security and other types of sensitive numbers or data has been huge challenge, especially in large mixed environments that include both mainframe z/OS and open systems. It can...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Understanding Tokenization and End-to-End Encryption

    One may have heard about the rising number of data breaches occurring in the industry. The disturbing fact is that 99% of current security solutions would not have prevented breaches at leading brand name companies. Why? Because current approaches to protecting sensitive data within the organization are difficult and expensive...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Data Protection Risks and How to Avoid Them

    The presenters of this webcast talk about the top five risks of protecting customer data and what to do about them. Concerned by recent high profile data breaches? The attendee of this webcast will learn about the challenges organizations are facing today in protecting data and how they are attempting...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Integrating Encryption With Archiving and eDiscovery

    Archiving, eDiscovery and Encryption all create competing requirements on organizations. Many companies must encrypt sensitive email information, yet at the same time archive those emails and be ready for eDiscovery processes in the future. Traditional encryption approaches make it very difficult to accomplish all three goals. New approaches from Symantec...

    Provided By Voltage Security

  • Webcasts // Jan 2009

    Thwarting Insider Threat, Strengthening Communications, and Meeting Policy With Secure Internal Communications

    Internal email, if unprotected, contains the same security level as a postcard. Without email encryption, malicious, as well as curious, insiders have complete access to sensitive company information, including financial data, trade secrets, and customer data. This webcast covers the benefits of email encryption for strengthening communications while protecting against...

    Provided By Voltage Security