Call an advisor: 03330 00 00 39
Call an advisor: 03330 00 00 39
Loading Events
Tuesday 1st December

Reconcile Security Across Traditional, Distributed and Transformed IT

Event Venue and Description – Webinar

Traditional IT, including desktops, laptops, and servers still represent the core of the infrastructure, while it is rapidly evolving in terms of compliance and risk management. The number and level of existing threats require boosting security solutions, covering at the same time inbound protection, continuous posture assessment (VM, PC) and compromise tracking (EDR).

Distributed IT, for example, tablets, mobiles, IoTs, were the first ones to kill the borders, creating a new dimension of company data flow and increasing the level of risk at the same time. While today no one could give up using these devices without cutting down efficiency, the separation between the company and personal data has gone undetermined and piles up to the native risks these devices bring along.

Transformed security, the likes of service solutions and cloud, is creating completely different roles, and require strong security both at the low and high end. On one side, it follows development strategies (DevOps), on the other, it requires higher architecture skills to understand and adapt the numerous services proposed. Protection of personal data, choice of embedded vs third-party security solutions, localisation, compliance with service standards (PaaS, SaaS) are all challenges that tend to create a separate, disconnected niche in IT security.

For further information and details of how to register, please follow the link provided.