Access "Ping: Heidi Kujawa"
This article is part of the August 2006 issue of Special manager's guide: Monitoring identities
Piracy costs the makers of "the Da Vinci Code," "Spider-Man" and other movie franchises $1.25 million a day. Combating digital pirates, for Sony's director of enterprise architecture services Heidi Kujawa, means more than keeping bootleggers out of the theaters: It's about safely managing Sony's intellectual property, and how it's exchanged inside and outside Sony. How does your group help Sony combat piracy? We try to stay in lockstep with piracy trends, and understand how people are getting to our assets--for example, sneaking into theaters with cameras. There are also forensic initiatives we're looking at, such as digitally watermarking assets so things cannot be copied, and, if they are, figuring out how they're doing it. We've also built audit tools within our content management system to see who is distributing what to whom and when. For Sony, is piracy best combated with policy or technology? With piracy, the speculation is always that company information is more likely to be leaked from an internal source than from an external one. That problem is ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
- What's a Hot Pick?
-
Single Sign-On Explained
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
1 is the loveliest number -
It's a Dirty Job...
SERVICES But someone has to handle vulnerability management. Giving it to an outsourcer seems like an easy solution, but enterprises need to first understand the gritty details.
-
Security Event Management
Check Point Software Technologies' Eventia Analyzer 2.0 and Eventia Reporter
-
Web Application Break-In
THREATS It's time to protect online assets from increasing attacks.
-
Buyers look for demonstrable success in innovative companies
Cool Tech Ain't Enough.
-
Akonix Systems' Akonix A-Series Product Review
In this product review, get information on instant messaging (IM) Akonix Systems' Akonix A-Series appliance. Get tips on configuration, installation, reporting and policy control.
-
Vendor Security Product News and Updates
Learn about the latest products and security updates from vendors like Crossbeam, Airmagent and Marshal. Get pricing information as well as setup and installation tips.
-
- At Your Service: August 2006 managed services security news
- Events: Information security conferences for August 2006
-
User authentication options: Using two factor authentication for security
Discover how using two-factor authentication can improve organizational security. Weigh your authentication options and choose the right product for your enterprise.
-
Three Pitfalls to Avoid
SPECIAL Managing identity and access can be as easy as 1, 2, 3.
3 strikes, you're out -
IDP/Network Access Control
ForeScout Technologies' CounterACT
-
Secure Reads: Steganography and the art of covert communication
Read a quick review of the book, Hiding in Plain Sight: Steganography and the Art of Covert Communication.
-
Instant Messaging: Symantec IM Manager 8.0
Symantec's IM Manager 8.0
-
Columns
-
Editor's Desk: Consolidation is in
Synergistic Solutions
-
Layer 8: Personal devices put enterprise data at risk
Creeping Consumerization
-
Perspectives: Frame security as a business concept
Security efforts are considered operational, even when CISOs manage to interact with executives.
-
Ping: Heidi Kujawa
Heidi Kujawa
-
Editor's Desk: Consolidation is in
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO