Resources

Blog

Data Classification: Enabling Compliance with GDPR, HIPAA, PCI DSS, SOX, & More

Learn how Fortra's Data Classification Suite can facilitate compliance with GDPR, HIPAA, PCI DSS, SOX, and other prominent data privacy regulations.
Datasheet

How Fortra Detects Data

Overview While there are several methods of classifying and identifying data within the data protection industry, DDE provides the most robust and flexible data detection tools available to the market today. Many of the Fortra tools incorporate advanced Machine Learning (ML) capabilities and enable customers to quickly and accurately detect and protect their sensitive data. Fortra calls the...
Datasheet

ITAR Compliance with Fortra

The aerospace and defense organizations operate on a global scale and handle data that needs to be protected from competitors as well as foreign military and government organizations. Competitive secrets, disparate customer requirements, and government regulations surrounding the sharing of sensitive information are critical considerations in the aerospace and defense marketplace. The U.S...
On-Demand Webinar

Why Data Classification is the Cornerstone of Regulatory Compliance

Achieving compliance across a wealth of new international data compliance regulations is a growing challenge, with many organizations struggling to keep pace. In addition, the rise of globally dispersed workforces and hybrid working environments are placing extraordinary pressure on every organization’s security. Today, data classification offers an increasingly persuasive answer to help prevent...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized persons prohibited or...
Datasheet

Fortra’s Data Classification Suite for Military

Swift action to commands based on operational understanding are hallmarks of a high-performing and responsive military. And the exchange of classified and even unclassified data – often in electronic form – are the lifeblood for any military organization to thrive and achieve mission success. The key is keeping sensitive data out of the hands of the wrong people. “With the military, there is a...
Datasheet

Fortra Data Identification

The Problem Compliance regulations related to data are growing in number and complexity while IT and security solutions struggle to address these challenges, thus leaving major gaps. Due to these data regulations, organizations are required not only to understand the context and the value of the vast amounts of data that flow through email, but also protect and report on that data. Accidental...
Blog

Complying With the Export Administration Regulations (EAR): Everything You Need To Know

The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for reasons of national security and foreign policy. Here is a breakdown of the essentials your organization should know for proper compliance. The Export Administration Regulations (EAR) Explained In...
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data Classification First?

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say when it comes to implementing DLP and data classification, and if one should come before the other. Q: Is there an order in which we...
Blog

Orchestrating data security through effective data identification

As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “ Age of Data ”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater than ever before. Organizations must also handle more and more novel data types, including IoT, clickstream and streaming data...
Blog

What do companies really do with your data?

Serious question: Has anyone, ever, consciously decided not to use a website they require (or even just want to use) because they don’t agree with a cookie consent warning? Cookie consent warnings are those little strips that appear along the bottom of virtually every website you visit nowadays (including ours), notifying users that the website uses cookies to collect user data. Some are more...
Blog

Data at rest versus data at creation: It’s not a choice you should make – secure them both

As part of your defense against an external cyberattack, you’re ready to tackle the enormous task of securing all the data sitting on your servers, desktops and external drives. If you’re like most organizations, you’ve got tons of it because no one throws anything away these days. And if you’re working at an enterprise, it’s an exponentially larger job. Protecting the data at rest within your...
Blog

How do you handle the ticking time bomb of dark data?

Organizations of all sizes face a similar challenge: the ticking time bomb of old data. 2020 is expected to be a period of exceptionally rapid data growth, with the growth in demand outstripping growth in storage supply solutions, according to Harvard Business Analytics. Adding to the complexity: 80% of all data organizations generate daily is unstructured, that is, stored but not easily found...