Category Archives: Data Discovery

Discover, Identify, Classify, Inventory, Remediate, Control & Protect your sensitive, mission-critical data including: PII, IP, PCI, PHI, Unstructured Data, Structured Data

The Public Cloud  Is it Secure?

The Public Cloud.  Is it Secure?   In today’s business environment, data is everything. With data volumes increasing exponentially, the cloud has become the go-to for many companies to store their vital information. Offloading data storage and management has worked wonders. Firms no longer have to rely on in-house storage components. Furthermore, the organizational and…
Read more

False Promise of Blanket Encryption

The false promise of blanket encryption Why data needs to be inspected before its put under lock and key With cyber-attacks on the rise and compliance with regulatory regimes like HIPAA and GDPR becoming more urgent, businesses have been turning to encryption as a catch-all tactic to ensure IP and personal data are protected. Make…
Read more

Discover Dark Data

Information overload.   One of the key phenomena that has come to define the digital age.   The consequences of this information glut cover a wide spectrum.  From the analytical perspective, finding answers to important questions and identifying what constitutes relevant information, has become increasingly difficult for businesses seeking to navigate the sea of available…
Read more

Insider & Outsider Threats in Today’s Digital Age

Insider & Outsider Threats in Today's Digital Age     What is the value of trust? How much do you trust the security of your business in today's’ digital age?   Would you know if an attacker breached your infrastructure and sent out sensitive data? Would you know if a trusted insider sent out sensitive…
Read more

Applying Smart Algorithms for Intelligent DLP

Applying Smart Algorithms for Intelligent DLP & Data Protection Data loss prevention (DLP) and Data Protection programs play a vital role in an organization's information security strategy. DLP is essential for tracking a company’s volume of data and organizing it within security protocols. This includes classifying files / data streams to determine levels of secrecy…
Read more