Data Loss Prevention is what we do

Law Firms Breached!

In one of the more sensational data breaches in recent times, media and entertainment law firm Grubman Shire Meiselas & Sacks was hit with a cyberattack that affected some of its most high profile clients.   According to a Variety … Read More

Symantec the Black Hole of DLP & Data Protection

  Symantec the Black Hole of DLP & Data Protection The demise of mega security vendor Symantec has been known in the IT industry for years now.   Once one of the biggest names in a slew of platforms, from … Read More

Gain Control of Your Unstructured Data On-Premises and in the Cloud

Gain Control of Your Unstructured Data On-Premises and in the Cloud   When it comes to data security, enterprises face a major challenge when it comes to preventing data loss.  The nature of administering a large firm today means sharing … Read More

What is Software defined perimeter and Zero Trust

What is Software-defined perimeter and Zero Trust?   In the digital age, experts are constantly on the search for the best model of information security.   While most improvements constitute tweaks or upgrades to existing paradigms, some designs have required … Read More

Badmouthing Data Loss Prevention (DLP) is Fashionable

Badmouthing Data Loss Prevention (DLP) is Fashionable   Is DLP Really Dead?   I recently came across several digital security vendor sites who describe themselves as a “DLP alternative.” Perusing through their pages, I came across comments such as “DLP … Read More

What is TISAX (Trusted Information Security Assessment Exchange) Compliance?

What is TISAX (Trusted Information Security Assessment Exchange) Compliance? TISAX has become one of the big buzz words in info-sec today.   The challenge of DLP and its importance for data security has triggered the creation of new methods and … Read More

Want to see something cool in less than 30 seconds?

Want Easy Access to
Data Security that Works?

Secure your Sensitive Data, including from  Remote Users



Try it for Free

Take the Next Step to Stop Data Breaches