Resources

On-Demand Webinar

Don't Classify Your Data. Press Send, Watch Your Heart Sink

The speed at which businesses operate today obliges workers to increase efficiency. With the ease at which large amounts of data can be shared via email, digital media, and cloud apps, it is easy for confidential information to be mistakenly over-shared and exposed. 88% of data breaches are caused by employee mistakes—human error according to a joint study between Stanford researchers and security...
Datasheet

How Fortra Detects Data

Overview While there are several methods of classifying and identifying data within the data protection industry, DDE provides the most robust and flexible data detection tools available to the market today. Many of the Fortra tools incorporate advanced Machine Learning (ML) capabilities and enable customers to quickly and accurately detect and protect their sensitive data. Fortra calls the...
Datasheet

Fortra Data Identification

The Problem Compliance regulations related to data are growing in number and complexity while IT and security solutions struggle to address these challenges, thus leaving major gaps. Due to these data regulations, organizations are required not only to understand the context and the value of the vast amounts of data that flow through email, but also protect and report on that data. Accidental...
Datasheet

Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234

Fortra’s Data Classification Suite (DCS) helps organizations across the finance and insurance sectors meet the information security regulations mandated by the Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234. Noncompliance with APRA can result in substantial fines as well as legal risks and damage to your organization’s reputation. A data breach resulting from...
Datasheet

Digital Guardian and Fortra's Classifier Suite for Data Classification

Digital Guardian integrates the Fortra's Classifier Suite Foundation Suite to incorporate the end users intimate data knowledge and drive more accurate data protection. End users self-classify data at the time of creation or interaction - this classification feeds data protection policy decision. User Classification augments the automated content and context classification with manual, user based...
Blog

Data Protection Myths and the Truths Behind Them

To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at various organizational levels as to whether the solution is necessary, or more trouble than it’s worth. This can become especially problematic when misinformed thinking is the reason an organization...
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data Classification First?

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say when it comes to implementing DLP and data classification, and if one should come before the other. Q: Is there an order in which we...
Blog

Orchestrating data security through effective data identification

As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “ Age of Data ”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater than ever before. Organizations must also handle more and more novel data types, including IoT, clickstream and streaming data...
Blog

What do companies really do with your data?

Serious question: Has anyone, ever, consciously decided not to use a website they require (or even just want to use) because they don’t agree with a cookie consent warning? Cookie consent warnings are those little strips that appear along the bottom of virtually every website you visit nowadays (including ours), notifying users that the website uses cookies to collect user data. Some are more...
Blog

Data at rest versus data at creation: It’s not a choice you should make – secure them both

As part of your defense against an external cyberattack, you’re ready to tackle the enormous task of securing all the data sitting on your servers, desktops and external drives. If you’re like most organizations, you’ve got tons of it because no one throws anything away these days. And if you’re working at an enterprise, it’s an exponentially larger job. Protecting the data at rest within your...
Blog

How do you handle the ticking time bomb of dark data?

Organizations of all sizes face a similar challenge: the ticking time bomb of old data. 2020 is expected to be a period of exceptionally rapid data growth, with the growth in demand outstripping growth in storage supply solutions, according to Harvard Business Analytics. Adding to the complexity: 80% of all data organizations generate daily is unstructured, that is, stored but not easily found...
Blog

Data Classification Tools

Data Classification Tools: Why Are They Needed? Data classification tools are becoming more and more of a necessity for businesses and organizations – especially those with increasingly decentralized staff and contractors. The amount of data being sent to and received from different departments and units within your organization – as well as exchanged with external partners – is at an all-time...