<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; DataCentric</title> <atom:link href="https://www.iphere.com/tag/datacentric/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Encryption, Data-Centric Approach Needed To Secure Cloud, Mobile Users</title><link>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</link> <comments>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users#comments</comments> <pubDate>Wed, 08 Feb 2012 20:13:59 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[DataCentric]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Needed]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</guid> <description><![CDATA[The ever-growing mobile workforce with its head in the cloud has created what seems like an endless list of IT challenges to overcome, and with anywhere, anytime access to information a necessity for many enterprises, the new IT world is having an impact on the kind of encryption enterprises need to protect their sensitive and [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Encryption Key To Evolving Data-Centric Security Model</title><link>https://www.iphere.com/encryption-key-to-evolving-data-centric-security-model</link> <comments>https://www.iphere.com/encryption-key-to-evolving-data-centric-security-model#comments</comments> <pubDate>Tue, 07 Feb 2012 20:12:43 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[DataCentric]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Evolving]]></category> <category><![CDATA[Model]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/encryption-key-to-evolving-data-centric-security-model</guid> <description><![CDATA[With data access no longer restricted to the four walls of the enterprise (or branch) and 9-to-5 business hours, enterprises that have traditionally relied on a perimeter-based approach to security are now seeing the benefits of a data-centric approach. Data encryption is paving the way for the transition to data-centric security methods, according to a [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/encryption-key-to-evolving-data-centric-security-model/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>