Monthly Archives: February 2020

What is Software defined perimeter and Zero Trust

What is Software-defined perimeter and Zero Trust?   In the digital age, experts are constantly on the search for the best model of information security.   While most improvements constitute tweaks or upgrades to existing paradigms, some designs have required … Read More

Badmouthing Data Loss Prevention (DLP) is Fashionable

Badmouthing Data Loss Prevention (DLP) is Fashionable   Is DLP Really Dead?   I recently came across several digital security vendor sites who describe themselves as a “DLP alternative.” Perusing through their pages, I came across comments such as “DLP … Read More

What is TISAX (Trusted Information Security Assessment Exchange) Compliance?

What is TISAX (Trusted Information Security Assessment Exchange) Compliance? TISAX has become one of the big buzz words in info-sec today.   The challenge of DLP and its importance for data security has triggered the creation of new methods and … Read More

Want to see something cool?

Want Easy Access to
Data Security that Works?

Secure your Sensitive Data, including from  Remote Users



Try it for Free