Top 10 Best DCIM Software Solutions for 2024
Thales: Understanding the Data Process with a Security Platform
![](/sites/default/files/styles/cropper_main_image/public/2021-08/Thales.jpg.webp?itok=zmpuc0P3)
Mapping data flow is a fundamental part of the enterprise data process. There's no way an organisation can understand their data cycle without knowing where their data is located. Despite this, findings from a 2021 Data Threat Report by Thales reveals that only 24% of companies have complete knowledge of where their data is stored. With such strong ties between the two data operations, the numbers just aren't adding up - why?
How to Approach the Enterprise Data Process
In this podcast, Dr Eric Cole, Founder and CEO of Secure Anchor Consulting, and Todd Moore, Global Head of Encryption Solutions at Thales, look at the relationship between data flows, data discovery, automation, and understanding the data process. In his exploration, Todd draws on Thales's report on data security in the era of accelerated cloud transformation and remote work, alongside the company's stance on 'discover, protect and control' based on their CipherTrust Data Security Platform. The question of how organisations should approach the data process and bridge gaps in their knowledge remains the overarching focal point of the conversation.
Join 34,209 IT professionals who already have a head start
Meet the panel
![](/sites/default/files/styles/user_profile_picture/public/2021-08/Dr.%20Eric%20Cole%20B%26W_0_0_0.png.webp?itok=pqoTSZ_L)
Dr Eric Cole
![](/sites/default/files/styles/user_profile_picture/public/2021-08/Todd%20Moore.png.webp?itok=rLfdYZbi)
Todd Moore
Recommended Content
Trending Content
What is Engagement Farming and is it Worth the Risk?
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Will TikTok Actually Be Banned? Exploring the US Congress Bill
![](https://em360tech.com/sites/default/files/styles/author_image/public/2023-12/profile-picture_0.jpeg.webp?itok=rtZQ0QtV)
Hackers Are Exploiting the UEFA Euros for Phishing Attacks
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
What is Roko's Basilisk? The Terrifying AI Thought Experiment Explained
![](https://em360tech.com/sites/default/files/styles/author_image/public/linkedinImages/user-picture-4489-1706648130914.jpeg.webp?itok=NigAG2DT)
Opentelemetry: The Key to Unified Telemetry Data
![](https://em360tech.com/sites/default/files/styles/default_logo/public/2023-10/Untitled%20design%20-%202023-10-19T093648.767.png.webp?itok=bwfm_sHX)