Empower enterprise stakeholders to use data assets strategically for data operations, data protection and data governance.
Redefine your security posture, tightly securing your internal environment.
Move faster, improve security and stay in control for everything Microsoft.
Manage, secure & patch all endpoints. Take control of network-connected devices.
The Data Protection track of the Quest Data Empowerment Summit focused on how you can mitigate risk and optimize the value of your enterprise data assets. All the track’s session recordings are available below.
Data security is multi-faceted and begins with a strong foundation of IT security practices for a sound defense. But data resiliency requires an offensive strategy which allows you to stay one step ahead of the variables and adversaries that can damage your business. These sessions presented a complete look at data protection challenges and the solutions that address them.
Mitigate risk and optimize the value of your data enterprise assets .
Are there gaps in your business’s IT foundation? When it comes to securing your data, a faulty foundation will cause major damage to everything you’ve built on it – maybe not today - but soon. Because every device hitting your network is an attack vector. The bad guys are taking advantage of the current lack of control caused by a sudden flood of remote devices accessing your critical business data. But if you are practicing good IT security practices, you are dramatically less exposed. A lot is preventable by just practicing basic IT hygiene. Find out how to secure your foundation to prevent future damage to your business’s reputation and bottom line.
Data is king and, therefore, should be treated as such. Gone are the days where companies can look at their technology landscape one-dimensionally. With security being at the forefront of IT's mind, you must have a data resiliency strategy and go on the data protection offensive. Gaining visibility into company assets, proactively hardening your environment, and addressing your company's largest attack vector (social engineering) are imperative. In this session, we will introduce a different way of thinking about data protection which, if implemented, will allow you to stay one step ahead of the variables that negatively impact your business.
This presentation, by industry historian and analyst, Richard Stiennon, delves into the history of one of the five primary pillars of information security: data protection. There are 339 vendors of products for data protection, more than any other category. Why is this case? Stiennon brings 25 years of experience to bear to answer this question. All security is built around protecting the crown jewels — the data and information that is at the core of any modern enterprise. Like every aspect of security, technology exists at each layer to ensure that data is protected, yet breaches and data theft are in the news every day. Massive changes to infrastructure like cloud transformation and work-from-home introduce new layers and new steps in the data lifecycle that require new controls and even new approaches. This informative presentation is derived from the research Stiennon does every year to produce accurate data on all the technology players in cybersecurity.
Using words like WannaCry and Petya around anyone in the technology industry is like saying the word “bomb” in front of the TSA. Why? Because of the impact cyberattacks have on businesses on a global level. The "business" of ransomware was estimated to be $20 billion globally in 2020. This represents roughly a 100% increase over 2019, proving that even though security is at the forefront of everyone's mind – and it is critical - we must remain diligent in ensuring we have a sound data protection strategy. In this session, we will discuss the current data landscape, ongoing industry improvements and trends that are affecting all businesses, whether they realize it or not. We’ll also look at solutions and techniques that will assist with your data empowerment data protection strategy.
Today’s IT professionals are challenged in many ways when it comes to ensuring that data is kept available to the business. While there are various elements to any infrastructure that serves data to its users, without the data itself the business is likely to stop.
The cost of downtime further compounds data loss. When contending with anything from ransomware attacks to natural disasters, it is imperative that IT professionals need not just technology, but also a tested plan to execute. Join this session where we explore some of the ideas and technologies you can deploy to ensure that your data is available to your business.