Resources

Datasheet

Seamless transition to CUI markings

Meeting controlled unclassified information (CUI) requirements The Controlled Unclassified Information (CUI) program, originally implemented in 2018, standardizes the way all government agencies and military entities handle unclassified information that requires safeguarding. It clarifies and limits what kinds of information to protect, defines what is meant by “safeguard,”...
Datasheet

Protection of Personal Information Act, South Africa (POPIA)

Meet Compliance Requirements to Protect Personal Information in South Africa The mandate of South Africa’s Protection of Personal Information Act (POPIA) is to regulate the processing of personal information. With this Act, data breaches need to be reported by law. Organizations need to develop a clear data protection plan to build trust with customers, drive business growth,...
Datasheet

Fortra’s Data Classification Suite for NATO security compliance

Challenge: STANAGs 4774, 4778 And NATO today Intelligence and military communities have historically worked in isolated silos. In recent years, these organizations have begun to embrace the need for sharing critical information with allies in an effort to receive similar critical information and intel in return. Because the North Atlantic Treaty Organisation (NATO) includes...
Datasheet

Fortra’s Mail for iOS

Fortra’s Mail for iOS is an intuitive email and mobile data protection solution that guides users as they create, forward, or reply to messages. Mail for iOS lets users identify and classify email sensitivity using visual markings and metadata, which helps raise security awareness and supports best practices around information handling and security regulation compliance. The...
Datasheet

Lookout and Fortra’s Data Protection

Lookout Security Service Edge (SSE) As organizations seek to utilize the broadest range of cloud capabilities to increase business agility — from email and collaboration applications to cloud infrastructure and beyond — the necessity for data loss prevention has intensified. With the need to enforce stringent data protection without preventing important business operations,...
Datasheet

ITAR Compliance with Fortra

The aerospace and defense organizations operate on a global scale and handle data that needs to be protected from competitors as well as foreign military and government organizations. Competitive secrets, disparate customer requirements, and government regulations surrounding the sharing of sensitive information are critical considerations in the aerospace and defense...
Datasheet

Fortra’s Data Classification Suite (DCS) for Data at Rest

The speed of data creation continues to increase, and that means the volume of data at rest is growing exponentially. With more people accessing and storing files in a multitude of network and cloud repositories, your sensitive data could be just about anywhere. Fortra’s Data Classification Suite (DCS) for Data at Rest helps you discover and identify your data at rest so you...
Datasheet

Fortra’s Data Detection Engine for Privacy Solution

The Problem In today’s interconnected and cloud-centric world, the need to protect consumer and employee personal data is becoming more and more evident. A growing number of organizations understand that ineffective or nonexistent privacy protection programs expose their business to significant risks, both from a financial and legal perspective; from costly regulatory fines...
Datasheet

NIST SP 800-171 and CUI

Meet Compliance Requirements To Protect Controlled Unclassified Information Originally imposed in 2017, NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be be compliant with DFARS Part 252.204-7012. Other executive branch...
On-Demand Webinar

Why Pair Data Classification with Secure Collaboration for End-to-End Data Security

The need to be able to share files and collaborate on data as a part of everyday working is crucial for businesses and their users. This internal and external collaboration, while necessary, presents several security challenges to IT. How much of what users are sharing is sensitive information? Where is it being stored and how is it being shared? Once you have the answers to...
On-Demand Webinar

Why Data Classification is the Cornerstone of Regulatory Compliance

Achieving compliance across a wealth of new international data compliance regulations is a growing challenge, with many organizations struggling to keep pace. In addition, the rise of globally dispersed workforces and hybrid working environments are placing extraordinary pressure on every organization’s security. Today, data classification offers an increasingly persuasive...
On-Demand Webinar

Go Beyond "One-Size-Fits-All" Data Classification: Protect What Your Business Cares About

This webinar highlights how data protection regulations are requiring more granular labelling and why you need to be sub-categorizing your data to have an effective and meaningful data classification policy. The following subjects will be covered: How data protection regulations are requiring more granular labeling Why you need to be sub-categorizing your data to have an...
On-Demand Webinar

Extending Microsoft Purview Information Protection Through Data Loss Prevention (DLP)

Microsoft Information Protection (MIP) delivers a set of data protection solutions integrated into and focused upon the Microsoft environment, while Digital Guardian Data Loss Prevention (DLP) extends that protection to the rest of the OSs, browsers, and applications you rely upon. When integrated, MIP and Digital Guardian work together to provide you with the best and most...
On-Demand Webinar

Data Classification Take 30: The 5 Steps to Effective Data Protection

Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your files servers and document stores, not protected and unrecoverable because no-one knows it exists let alone where to find it. Using data classification helps you regain control over your unstructured data. By involving your...
Datasheet

Fortra Data Classification Reporting Server

  Image Data classification delivers many benefits, but it’s important that you can measure that success and demonstrate the value to the executives and compliance and governance teams within your organization. Utilizing reporting capabilities enables you to keep track of what users are doing with data and where data is stored, as...
Datasheet

Fortra's Data Classification Suite Corporate Overview

The Foundation of Data Security Fortra’s Data Classification solutions enable organizations to classify, protect, analyze, and confidently share regulatory compliance requirements by identifying and securing unstructured data. “Forrester believes classification is the foundation for all of data security, and it’s critical for the success of other data security solutions, such...
Datasheet

GDPR compliance support that works for your business

Since the launch of GDPR in 2018, organizations have been forced to change their business practices in order to remain compliant. GDPR compliance requires organizations to have visibility into what data they possess, and where it is located. This remains a challenge for many organizations who don’t yet have solutions in place to understand where their data lives and what it...
Datasheet

Fortra’s Data Classification Suite for Military

Swift action to commands based on operational understanding are hallmarks of a high-performing and responsive military. And the exchange of classified and even unclassified data – often in electronic form – are the lifeblood for any military organization to thrive and achieve mission success. The key is keeping sensitive data out of the hands of the wrong people. “With the...
Datasheet

Extending Microsoft RMS to Mobile

Mobile Users Can Now Access And Share RMS Protected Information On Mobile Devices With the growth of mobile and cloud technologies it is more important than ever to apply protection that travels with the data. If your information is encrypted it is always protected, even if lost or stolen. Microsoft® Rights Management Services (RMS) provides protection for sensitive documents...