In our previous blog, The states of data, Part 2: Why visibility is key for protecting data at rest, we discussed the importance of discovering...
The states of data, Part 1: Why you should protect data at rest, in use, and in motion
What do Morgan Stanley, Samsung, and a New York credit union all have in common? They aren’t of the same scale, do not cater to...
Data classification: The fundamental requirement of successful DLP programs
The way we store data has undergone a dramatic shift. From good ol’ floppy disks to today’s cloud storage solutions, advancements in storage have slashed costs...
Data security threats: How to safeguard your data from modern pirates [Free e-book]
To stay safe from modern-day pirates, you need elaborate, multi-layered security measures. With the recent exponential increase in data generation and storage requirements, threats to...
USB review, Part 2: How to manage USB devices
In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this...
USB review, Part 1: How are USB flash drives a security risk?
We’ve all used pocket-sized USB drives to store and transfer data. We’ve also lost them countless times. USB sticks are a necessary convenience accompanied by complex and varied...
Is your sensitive data overexposed?
76% of IT security leaders experienced data breaches involving the loss or theft of sensitive information contained in documents or files. – Code42 2021 Data Exposure...
Bring down data storage costs by getting rid of obsolete data [Savings estimator]
Redundant, obsolete, and trivial (ROT) data refers to information housed in data repositories that is either not in use or not needed in current business operations. These are...