With the continuing upward trend for data access anytime and anywhere, protecting sensitive information has grown increasingly demanding and complex. Cloud security—in particular, cloud key management—has become a common challenge among organizations. Join us for an in–depth look at the pros and cons of different cloud key management approaches including: Self–provisioning and management of keys Cloud storage provider–initiated security Cloud–based security by a third–party specialist Webcast: 3 Approaches for Successful Cloud Key Management Thursday, March 15th, 1:00 pm Central Daylight Time (Dallas) http://www.credant.com/resources/webcasts.html