55 Almaden Blvd, San Jose, California, United States
The pandemic drove new hybrid working environments, increased the number of employees working remotely and expanded the need for modern collaboration tools from the likes of Zoom communications. Customers are using Zoom not just for virtual meetings, but also for daily interactions (voice, chat, online whiteboards, webinars, meeting transcripts, etc.). This has led to an increasing amount of new sensitive data generated daily, much of which is stored in the cloud. This is particularly a challenge for enterprises working in highly regulated industry verticals. Especially after the ruling of the SCHREMS II judgement, companies are looking for a more comprehensive solution to address data sovereignty.
CipherTrust Cloud Key Management for Zoom - Solution Brief |
Organizations rely on Unified Communications-as-a-Service (UCaaS) platforms for their communications needs to scale business and streamline operations. UCaaS security needs are complex, and data sovereignty regulations and customer needs are leading to a rise in Sovereign Cloud Initiatives. Thales, Zoom, and AWS discuss how to protect data on UCaaS platforms while adhering to regulations and complying with Data Sovereignty requirements.
Best Practices on Protecting Data on UCaaS Platforms - Webinar |
The pandemic drove new hybrid working environments, increased the number of employees working remotely and expanded the need for modern collaboration tools. This has led to petabytes of new sensitive data generated daily, much of which is stored in a multi cloud environment. This is particularly a challenge for enterprises working in highly regulated industries. Especially after the ruling of the SCHREMS II judgement, companies are looking for a better solution to address data sovereignty and at the same time leverage the power of the cloud.
Data Protection for a World of Growing SaaS Applications - Webinar |