Back to Results
First PageMeta Content
Computing / Consumerization / Cloud computing / Data security / Information technology management / Data governance / Identity management / Information / Computer network security / Data management / Computer security / Data loss prevention software


Data Protection - Building a Comprehensive Strategy
Add to Reading List

Document Date: 2013-02-25 21:51:55


Open Document

File Size: 116,59 KB

Share Result on Facebook

Company

LinkedIn / Trend Micro / IDC Go-to-Market Services / Google / IDC / Microsoft / Facebook / O U T T H I S A / /

/

Facility

Global Headquarters / /

IndustryTerm

nontraditional business tools / online storage / social media / Web gateways / mobile device management / perimeter tools / corporate devices / data protection technologies / Web security / computing / cloud applications / collaboration tools / access management / a lot of other technologies / disk encryption technologies / employee-owned and consumer-grade mobile devices / security technologies / trusted and untrusted computing environments / cloud services / Web security gateways / /

Organization

DLP / /

Person

Phil Hochmuth / /

/

Position

Program Manager / forward for many organizations / Manager / Security Products Data Protection / program manager of Security Products service / program manager for Security Products research / /

Product

iPhone / Security Products / /

Technology

encryption / disk encryption technologies / security technologies / DLP security technologies / LAN / IPC technology / smartphone / data protection technologies / DLP / mobile device / mobile devices / /

URL

www.idc.com/gms / www.idc.com / /

SocialTag