Category Archives: Data Discovery

Discover, Identify, Classify, Inventory, Remediate, Control & Protect your sensitive, mission-critical data including: PII, IP, PCI, PHI, Unstructured Data, Structured Data

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to ensure IP and personal data are protected. Make…
Read more

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to navigate the sea of available…
Read more

Insider & Outsider Threats in Today’s Digital Age

Insider & Outsider Threats in Today's Digital Age What is the value of trust? How much do you trust the security of your business in today's’ digital age? Would you know if an attacker breached your infrastructure and sent out sensitive data? Would you know if a trusted insider sent out sensitive data against policy?…
Read more

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital role in an organization's information security strategy. DLP is essential for tracking a company’s volume of data and organizing it within security protocols. This includes classifying files / data streams to determine levels of secrecy…
Read more

Importance of the Technology Behind E-Discovery

The Importance of the Technology Behind e-Discovery Solutions   The sheer quantity and quality of data at the core of major investigations have reached new levels. It is no longer uncommon to have complex cases with tens and even hundreds of millions of disparate evidentiary files, including e-mail correspondence, significant financial and accounting records and…
Read more