
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Tomorrow's Webinar: Encryption at the Hardware and Storage Level","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"hBU7SdnPzJ\"><a href=\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/\">Tomorrow&#8217;s Webinar: Encryption at the Hardware and Storage Level<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/tomorrows-webinar-encryption-at-the-hardware-and-storage-level\/embed\/#?secret=hBU7SdnPzJ\" width=\"600\" height=\"338\" title=\"&#8220;Tomorrow&#8217;s Webinar: Encryption at the Hardware and Storage Level&#8221; &#8212; OTAVA\" data-secret=\"hBU7SdnPzJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Closing out the June encryption webinar series, our last webinar is tomorrow &#8211; don&#8217;t miss it! Join Steve Aiello, Systems Support Manager at Online Tech and Mark Stanislav, Security Evangelist at Duo Security, for an informative webinar on encryption at the hardware and storage level. Title:\u00a0Encryption at the Hardware and Storage Level When: Tuesday, June 25, 2013 @2PM ET Register:\u00a0Visit our website Description: Join Steve Aiello, Systems Support Manager at Online Tech and\u00a0Mark Stanislav, Security Evangelist at Duo Security\u00a0for an informative webinar on encryption at the hardware and storage level. They will discuss how encryption can be applied at various levels from the hardware and storage perspective. Impacts on performance, backup, security, and available resources may suggest very different encryption implementations. This webinar explores the variety of places where encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. Steve Aiello, Systems Support Manager, Online Tech Steven Aiello is a Systems Support Manager with Online Tech, the Midwest\u2019s premier managed data center operator. His certifications include CISSP (Certified Information System Security Professional), ISACA CISA, VMware VCP ( VMware Certified Professional), Cisco CCNA ( Cisco Certified...","thumbnail_url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Mark-Stanislav.jpeg"}