article thumbnail

RSAC 2020: Trust in the Cloud. What Should You Do with Your Encryption Keys?

Thales Cloud Protection & Licensing

In the process, however, they embraced a large number of connected devices and IoT platforms, which means that additional data and processes are now moving outside of the firewall and into the cloud. This presents a security risk to businesses.

article thumbnail

Cybersecurity Trailblazer Keyavi Data Unveils Major Product Enhancements That Empower Global Enterprises to Share and Manage Their Data With Employees and Third Parties Seamlessly and Securely on Any Device, Anywhere, at Any Time

CyberSecurity Insiders

Tanner Johnson , principal analyst of data security and IoT cybersecurity at leading industry analyst firm Omdia, underscored the market significance of Keyavi’s technology. No longer do files have to exist behind a firewall to be protected from cybercriminals or accidental loss. Streamlined Product Names.