München, 11.03.2020 (PresseBox) - The challenge of complying with legal regulations and mitigating business risks when using cloud computing strategies is causing headaches for many companies. Best practice security solutions such as data encryption, access management and log monitoring further increase complexity and are often not integrated.
In his presentation "Beyond data encryption" at Cloud Expo Europe in London, Jörg Horn from TÜV SÜD's subsidiary uniscon will show how uniscon's sealed platform® is changing this paradigm of isolated security technologies. The Munich-based cloud security experts focus on operator security and a set of technical measures that effectively prevent any data access or manipulation.
Title: "Beyond data encryption. How uniscon’s sealed platform® for confidential cloud computing helps organizations ensure regulatory compliance and mitigate cloud computing risks."
When: March 11th, at 12:35 p.m.
Where: Cloud Expo Europe, ExCeL London – Data protection, encryption and privacy stream
Compliance through technology
The sealed platform® is a platform for data and applications with medium or high protection requirements. The underlying sealed cloud technology prevents unauthorized access with purely technical measures and helps companies meet compliance regulations. Any privileged access, for example by system administrators, is technically impossible.
Would you like to know what the sealed platform® can do for your company? Then visit us at ExCel London: We will be there for you on 11 and 12 March and will be happy to answer your questions. You will find us at our stand C1316.
If you have any questions regarding the sealed platform® or would like to arrange an interview, please feel free to contact us. Send us an email or give us a call: presse@uniscon.de or +49 (0)89 / 41 615 988 104
Further information and printable images are available upon request at presse@uniscon.de. Click here to see the presentation slides: https://www.uniscon.com/cee20/
-
IT-Awards
Aktuelle Beiträge aus "IT-Awards"
-
Bedrohungen
Aktuelle Beiträge aus "Bedrohungen"
- Netzwerke
-
Plattformen
- Schwachstellen-Management
- Betriebssystem
- Server
- Endpoint
- Storage
- Physische IT-Sicherheit
- Verschlüsselung
- Allgemein
- Cloud und Virtualisierung
- Mobile Security
Aktuelle Beiträge aus "Plattformen" -
Applikationen
Aktuelle Beiträge aus "Applikationen"
-
Identity- und Access-Management
- Benutzer und Identitäten
- Authentifizierung
- Biometrie
- Smartcard und Token
- Access Control / Zugriffskontrolle
- Blockchain, Schlüssel & Zertifikate
- Zugangs- und Zutrittskontrolle
- Passwort-Management
- Allgemein
Aktuelle Beiträge aus "Identity- und Access-Management" -
Security-Management
- Compliance und Datenschutz
- Standards
- Sicherheits-Policies
- Risk Management / KRITIS
- Notfallmanagement
- Awareness und Mitarbeiter
- Sicherheitsvorfälle
- Allgemein
- Digitale Souveränität
Aktuelle Beiträge aus "Security-Management" -
Specials
Aktuelle Beiträge aus "Specials"
- eBooks
- Security Visionen 2026
- Zukunft der IT-Sicherheit 2024
- Kompendien
- Anbieter
- Cyberrisiken 2025
- Bilder
- CIO Briefing
-
IT Security Best Practices
Aktuelle Beiträge aus "IT Security Best Practices"
- Akademie
-
mehr...