• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:DataSecurity Plus

Top tips: 5 potential use cases of 6G networks

DataSecurity Plus | March 6, 2025

Top tips: 5 potential use cases of 6G networks

Top tips is a weekly column where we highlight what’s trending in the tech world and list...

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

DataSecurity Plus | October 8, 2024

The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting...

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

DataSecurity Plus | September 17, 2024

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...

Data classification: The fundamental requirement of successful DLP programs

DataSecurity Plus | September 3, 2024

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol' floppy disks   to...

Data security threats: How to safeguard your data from modern pirates [Free e-book]

DataSecurity Plus | July 26, 2024

Data security threats: How to safeguard your data from modern pirates [Free e-book]

To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...

USB review, Part 2: How to manage USB devices

DataSecurity Plus | March 20, 2024

USB review, Part 2: How to manage USB devices

In this two-part series, the first blog demonstrates how USB devices can be conduits of...

USB review, Part 1: How are USB flash drives a security risk?

DataSecurity Plus | January 17, 2024

USB review, Part 1: How are USB flash drives a security risk?

We've all used pocket-sized USB drives to store and transfer data. We've also lost them...

Access granted: Mastering the art of permissions

DataSecurity Plus | October 11, 2023

Access granted: Mastering the art of permissions

Back in the 20th century, cyberattacks were harder to execute because most computers were...

Is your sensitive data overexposed?

DataSecurity Plus | February 24, 2022

Is your sensitive data overexposed?

76% of IT security leaders experienced data breaches involving the loss or theft of...

Bring down data storage costs by getting rid of obsolete data [Savings estimator]

DataSecurity Plus | November 11, 2021

Bring down data storage costs by getting rid of obsolete data [Savings estimator]

Redundant, obsolete, and trivial (ROT) data refers to information housed in data...

Why companies need URL filtering for enhanced cloud protection

DataSecurity Plus | June 28, 2021

Why companies need URL filtering for enhanced cloud protection

The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with...

Healthcare cybersecurity: Our 6-step plan to secure healthcare data

DataSecurity Plus | May 19, 2021

Healthcare cybersecurity: Our 6-step plan to secure healthcare data

The HIPAA Journal reported that "2020 was the worst ever year for healthcare industry data...

Page 1 of 34712»Last »