Resources

Video

Fortra’s Data Classification Suite On-Demand Demo

Watch a short demo to see Fortra’s Data Classification Suite (DCS) in action. How users can easily classify the content they create Using classification to quickly identify sensitive data and PII within documents and emails Leveraging Machine Learning to make classification simple and accurate How to classify data which hasn’t originated within the organization Ensuring...
Video

CUI Compliance with Fortra's Data Classification Suite (DCS) On-Demand Demo

Watch a short demo to see the Fortra CUI configuration in action Navigate CUI complexities with confidence Automatically apply CUI markings Apply the full list of CUI categories and subcategories Manually tailor Banner and Portion markings Endpoint configuration for CUI safeguarding and dissemination controls Template packs to get your organization up and running with CUI...
On-Demand Webinar

Data Classification – Great product; Awful name

Our mission is to do data classification products justice and ensure organizations are getting data protection level they signed up for. We’ll dive into that and as well as share Fortra’s Data Classification approach. In this 30-minute webcast our experts will deep-dive into: What your organisation should be looking for data classification provider Which capabilities shall...
Blog

Data Categorization or Data Classification?

Image In the last few years, there has been a dramatic shift from data classification being a “nice to have” tool, to becoming a necessity. Behind this momentum, private companies and organizations are implementing data classification using “traditional” taxonomies and schemas that work for governments and militaries but don’t...
On-Demand Webinar

Cybersecurity Threats In Europe: What You Need to Know and What to Do About Them

In this webinar, Fortra experts Paolo Cappello, Managing Director International, and Steve Jeffery, Lead Solutions Engineer, are joined by guest speaker Tope Olufon, Senior Analyst at Forrester, to review the findings of Forrester’s recent European Cybersecurity Threats Report. European cyber security professionals struggle with similar attack techniques as their global...
On-Demand Webinar

Data Classification Take 30: Why You Need A Specialist Provider

In today’s cybersecurity market, we are seeing more vendors than before offering solutions which claim to cover all your security needs under one roof. Sure, from a business efficiency point of view this may seem like a very tempting offer – but in reality is it all too good to be true? We already know that data classification is the crucial foundation to a solid data security...
Blog

What Is Data Classification?

What Is Data Classification And What Can It Do For My Business? Data classification is an approach to identifying, protecting and managing information which has rapidly become best practice. Implemented as part of a layered security strategy, it enables an enterprise to defend itself against a variety of threats - from aggressive outsiders to untrained or well-meaning insiders...
Blog

The 5 Steps to Effective Data Classification: Identify Your Crown Jewels

Image   The 5 Steps to Effective Data Classification: Identify your sensitive and high value data Discover the location and accessibility of your sensitive data Classify data according to its value to the organization Secure: employee security control and protection measures Monitor: measure and evolve security practices Using...
Blog

Data Classification in Finance

Why should the financial services sector adopt a data classification strategy?   Because more than nine out of ten (95%) of data breaches are financially motivated, according to this year’s Verizon Data Breach Investigations Report. Within the finance and insurance sector specifically, the rates were as high as 97% — no surprise there.   However, what may be surprising is...
Blog

Data Classification in the Finance World

Image When it comes to data privacy, financial services is one of the most highly regulated industries, and as a result, finance organizations face immense pressure to protect the data they are creating, collecting, and storing. Let’s take a deeper dive into what pressures are put on financial organizations to protect their data, and...
Blog

Complying With the Export Administration Regulations (EAR): Everything You Need To Know

Image The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for reasons of national security and foreign policy. Here is a breakdown of the essentials your organization should know for proper...
Blog

What Is the Federal Risk and Authorization Management Program (FedRAMP)?

Image An Introduction to FedRAMP In late 2011, the Office of Management and Budget under the Obama Administration released a memorandum that introduced the Federal Risk and Authorization Management Program (FedRAMP), noting that “[in the two years prior], the Administration worked in close collaboration with the National Institute of...
Blog

What Is ISO 27001 and How Can It Help Your Organization?

Image What Is ISO 27001? Everything You Need To Know About ISO 27001:2022 ISO 27001, also known as ISO/IEC 27001, is a widely recognized international standard that defines best practices for implementing and managing information security for an Information Security Management System, or ISMS. The risk-based standard was published...
Blog

Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise

Image Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Alliances at Lookout, and Corey Markell, Associate Director, Strategic Resource Group at Fortra. The first steps for any organization in creating a data security strategy are accurately identifying all of their sensitive information and...
Blog

Data Protection Myths and the Truths Behind Them

Image To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at various organizational levels as to whether the solution is necessary, or more trouble than it’s worth. This can become especially...
Blog

Embracing Data Privacy Regulations to Earn Consumer Trust

Image Trust is one of the most important aspects of business, especially when it comes to the collection and use of people’s personal data. As consumers advocate for organizations to take more precautions in handling their personal data, legislative bodies are listening, and more data privacy regulations are being passed globally each...
Blog

Guarding Against Insider Threats

Image When you see or hear the term “data breach” in the media, is the first thought that there must have been a hacker involved? It may surprise you to know that hackers aren’t the main cause of data loss and data breaches within organizations. Most can be attributed to insider threats, mainly by employees just trying to do their job...
Blog

Comparing GDPR and CCPA

Image The GDPR in Europe was one of the first major data privacy regulations to be implemented in recent times, followed closely by the CCPA in the United States. And since its enforcement, GDPR has been seen as the “gold standard” when it comes to data protection regulations. However, it is important to remember that each data...
Blog

The Cost and Consequences of Exposed PII

Image Hardly a day goes by without a media report about a data breach that involves exposed personally identifiable information (PII). In the same way an organization takes care of its employees, customers, and finances, it also needs to ensure its sensitive data, such as PII, is well protected. Let’s explore what constitutes as PII,...