Resources

Blog

Data Classification: Enabling Compliance with GDPR, HIPAA, PCI DSS, SOX, & More

Learn how Fortra's Data Classification Suite can facilitate compliance with GDPR, HIPAA, PCI DSS, SOX, and other prominent data privacy regulations.
Datasheet

Lookout and Fortra’s Data Protection

Lookout Security Service Edge (SSE) As organizations seek to utilize the broadest range of cloud capabilities to increase business agility — from email and collaboration applications to cloud infrastructure and beyond — the necessity for data loss prevention has intensified. With the need to enforce stringent data protection without preventing important business operations,...
Datasheet

ITAR Compliance with Fortra

The aerospace and defense organizations operate on a global scale and handle data that needs to be protected from competitors as well as foreign military and government organizations. Competitive secrets, disparate customer requirements, and government regulations surrounding the sharing of sensitive information are critical considerations in the aerospace and defense...
On-Demand Webinar

Why Data Classification is the Cornerstone of Regulatory Compliance

Achieving compliance across a wealth of new international data compliance regulations is a growing challenge, with many organizations struggling to keep pace. In addition, the rise of globally dispersed workforces and hybrid working environments are placing extraordinary pressure on every organization’s security. Today, data classification offers an increasingly persuasive...
Case Study

Morpho Classifies and Protects Sensitive Information and Meets Export Control Requirements with Fortra

Morpho, Safran’s security business, addresses emerging security requirements for individuals, businesses and countries. Its expertise spans three core markets: identification of persons and goods, production and personalization of e-documents, detection of threats and substances. Morpho has over 7,700 employees in more than 40 countries. With integrated systems operating in...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized...
Datasheet

Fortra’s Data Classification Suite for Military

Swift action to commands based on operational understanding are hallmarks of a high-performing and responsive military. And the exchange of classified and even unclassified data – often in electronic form – are the lifeblood for any military organization to thrive and achieve mission success. The key is keeping sensitive data out of the hands of the wrong people. “With the...
Datasheet

Fortra’s Data Classification Suite Deployment Options

On-premises deployment While many industries are turning to the cloud for digital transformation, some organizations are not yet ready to deploy their highly sensitive data to the cloud and continue to choose on-premises. There are several reasons why an organization might choose on-premises deployment, including: Organizational/regional requirements: Depending on industry...
Datasheet

Collaborate Securely in the Cloud

1. Identify the Business Value of Data Empower your organization to make intelligent, deliberate decisions on how sensitive information is treated in the cloud. With support for automated, suggested, or user-driven classication, Fortra’s Data Classification Suite (DCS) will identify, classify and protect the sensitivity and value of unstructured data. 2. Use Metadata as the...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective...
Guide

Data Protection Technical Overview

Image What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what...
Datasheet

Fortra and Lookout’s Data Protection

Fortra's data classification products integrate with Lookout Cloud Security Lookout Security Service Edge (SSE) As organizations seek to utilize the broadest range of cloud capabilities to increase business agility — from email and collaboration applications to cloud infrastructure and beyond — the necessity for data loss prevention has intensified. With the need to enforce...
Guide

The 5 Steps To Effective Data Protection

Image Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your file servers and document stores, not protected and unrecoverable because no one knows where to find it. Using data classification helps you regain control over your...
Datasheet

Fortra Data Classification Solutions Overview

Secure Your Information, So People Can Work with Confidence Data is everywhere and protecting it is becoming more difficult than ever. Fortra Data Classification enables you to establish a policy driven foundation that helps you identify and classify sensitive data at creation, in motion, or at rest and apply the right security policy to protect it. Data Protection That Works...
Blog

Complying With the Export Administration Regulations (EAR): Everything You Need To Know

Image The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for reasons of national security and foreign policy. Here is a breakdown of the essentials your organization should know for proper...
Blog

Data Protection Myths and the Truths Behind Them

Image To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at various organizational levels as to whether the solution is necessary, or more trouble than it’s worth. This can become especially...