The Security Transformation – fire-proofing, not fire-fighting

In an increasingly mobile world, new approaches – supported by new technologies – are needed to protect corporate assets. This security transformation is happening right now, and no one can afford to ignore it. In this recording of a webinar, learn how to turn this challenge into an opportunity. Read more…

Are You Ready For The Security Transformation?

In today’s mobile world, keeping corporate assets safe in the face of the rapidly evolving threat environment, while making them readily available to legitimate users, is a very significant challenge. Recent surveys and reports have confirmed what we already know all too well – that serious cyber attacks are on the rise, and that organizations… Read more…

The Traditional Perimeter is Dead, Now What?

Traditional security is based around the idea that there is an “inside” and an “outside,” and that you can secure the inside with a secure perimeter. But the cloud doesn’t have an inside and an outside, and we need to start thinking in terms of identity security and governance, information protection, and access management. Read more…

Conditional Access for Rich Clients

OCG Principal Architect Mark Riley provides a look at Conditional Access on Windows PCs. How can you allow your users to access their email and other corporate data on home PCs while ensuring corporate data is secure? Read more…