Key Learning Points:
- How the MS cloud works
- How customers can keep their own keys but store encrypted data in the cloud
- What is a HSM?
- What is BYOK?
The session will describe how a SaaS (MS Azure RMS) can be utilized in a secure environment.
The way resources and applications are accessed and consumed is changing. With the shift to personal devices and mobility, there is a need to adapt how applications work.
The best organizational response is IT policies that match business realities and priorities, moving toward a people-centric model that replaces the older paradigm of device-centric policies and management. This shift in focus requires policies, processes, and technologies that give people the freedom to select the devices they want to use, along with device-agnostic access to applications and data.
Meeting your compliance goals around key management is easy. You are in charge of key lifecycle. You can account for all the places your key can be used in, and who is using it when.
About Alok Sharma
Mr. Sharma is currently responsible for sales in North and South America for Thales e-Security. He has previously held positions at startups and large companies leading marketing and sales teams. He has BS in Computer Science and developed his own goal setting technique.