False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to ensure IP and personal data are protected. Make…
Read more

Cloud Data Protection

The shift to the cloud.   It’s one of the IT world’s fastest growing trends. Cloud storage has brought about a revolution in data management, allowing enterprises to store and process large quantities of data without dealing with the costs and maintenance of on-site hardware. More importantly, the cloud has given the modern, mobile workforce…
Read more

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital role in an organization's information security strategy. DLP is essential for tracking a company’s volume of data and organizing it within security protocols. This includes classifying files / data streams to determine levels of secrecy…
Read more

The Cloud BYOC Problem for the Enterprise

 The BYOC & BYOD Enterprise Problem Cloud Services are growing at an exponential rate for both business and personal use. Cloud providers today allow private people (maybe your employees) to create powerful computing environments in the cloud by creating their own machines.  The BYOC (bring your own cloud) Users may choose any flavor of Windows, Unix…
Read more