Video

Why We Need Data-Centric Security

Matt Pauker, Co-founder, Voltage Security
Why We Need Data-Centric Security

Data-centric security: It's a shift from securing where data resides to securing the data itself. Matt Pauker of Voltage Security tells how this approach helps organizations improve their security posture.

See Also: Live Webinar | Embracing Digital Risk Protection: Take Your Threat Intelligence to the Next Level

In a video interview about the need for a data-centric security approach, Pauker discusses:

  • Why traditional data security approaches no longer suffice;
  • How a data-centric approach improves the abilities to leverage big data and ensure privacy;
  • How to employ a data-centric security strategy.

Pauker co-founded Voltage Security in 2002 out of a Stanford University dorm room. Winner of both the Stanford BASES Entrepreneur's Challenge and the Stanford Global Entrepreneur's Challenge, Pauker received his B.S. in Computer Science from Stanford that same year.

Since Voltage's inception, Pauker has been responsible for driving its technical vision and architecture. He is the author of more than two dozen patents and has contributed to a number of technical security standards.

He has been named by BusinessWeek as one of the its top 25 young entrepreneurs and has been featured in Time Magazine, Forbes and InformationWeek.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.