Top Big Data Security Tips and Ultimate Protection for Enterprise Data

Top Big Data Security Tips and Ultimate Protection for Enterprise Data


Available On Demand
Duration 60min
Mark Simmonds
Senior Product Marketing Manager
IBM Software Group Information Management
Mark Simmonds
Mark Simmonds - Senior product marketing manager - works in the IBM Software Group Information Management division focused on Information Governance and Big Data for the System z® portfolio. He has 16 years IBM service in Information Management, WebSphere and spent 3 years as an IBM systems architect responsible for infrastructure design and corporate technical architecture in large financial institutions. Prior to joining IBM he was head of Information and IT for an organization in the National Health Services (Wales, UK). He has a number of author recognition awards, written articles for technical journals and business magazines and is a recognized thought leader on Information Governance and SOA.
Peter Mandel
Product Line Manager
IBM InfoSphere Guardium
Peter Mandel
Peter Mandel is a Product Line Manager for Guardium with a focus on Data Protection and Data Governance. Mr. Mandel joined IBM at the Silicon Valley Laboratory where he held a wide variety of development and technical strategy roles related to IBM's database and data management portfolio of products. He has launched development initiatives across a broad range of data management technologies including content management systems, video servers, spatial database, and media asset management systems. Most recently he led new initiatives in enterprise search and text analytics in the IBM Research Division and IBM Software Group.

Organizations are leveraging increasing varieties and large volumes of information to gain deeper insight into their business. In today’s data intensive environment, data protection is a requirement to reduce business risk particularly as customers undertake big data initiatives. Join us for this webinar so you can discover how you can:

  • Ensure real time monitoring and reporting of security related events
  • Protect a wide range of data sources across many platforms and database vendors
  • Lower the cost of compliance with prebuilt policies, reports and automation
  • Discover sensitive data and categorize vulnerabilities
  • Monitor for suspicious behavior and can block activity

Lower the cost and effort of compliance and take a proactive approach to protecting your many data sources.

BONUS: All attendees will also receive a complimentary copy of the ebook: Top Tips For Securing Big Data Environments.

Please forward this message to your colleagues. Register now!

Already a member? Login