Resources

Datasheet

Protection of Personal Information Act, South Africa (POPIA)

Meet Compliance Requirements to Protect Personal Information in South Africa The mandate of South Africa’s Protection of Personal Information Act (POPIA) is to regulate the processing of personal information. With this Act, data breaches need to be reported by law. Organizations need to develop a clear data protection plan to build trust with customers, drive business growth,...
Datasheet

NIST SP 800-171 and CUI

Meet Compliance Requirements To Protect Controlled Unclassified Information Originally imposed in 2017, NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be be compliant with DFARS Part 252.204-7012. Other executive branch...
On-Demand Webinar

Why Data Classification is the Cornerstone of Regulatory Compliance

Achieving compliance across a wealth of new international data compliance regulations is a growing challenge, with many organizations struggling to keep pace. In addition, the rise of globally dispersed workforces and hybrid working environments are placing extraordinary pressure on every organization’s security. Today, data classification offers an increasingly persuasive...
Guide

Meeting CUI Requirements with Fortra’s Data Classification Suite Solutions

Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program defines a uniform policy  for the treatment of unclassified information that requires safeguarding or dissemination controls. The CUI Executive Order specifically adopts, defines, and institutes CUI as the single designation for all information formerly designated by Sensitive but...
Datasheet

Fortra’s Data Classification Suite Deployment Options

On-premises deployment While many industries are turning to the cloud for digital transformation, some organizations are not yet ready to deploy their highly sensitive data to the cloud and continue to choose on-premises. There are several reasons why an organization might choose on-premises deployment, including: Organizational/regional requirements: Depending on industry...
Datasheet

Managing Controlled Unclassified Information: The Role Of Data Classification In Meeting U.S. Government Requirements

Image Introduction After years of deliberation, the U.S. government’s National Archives and Records Administration (NARA) has released more details of its regulation for the protection framework of Controlled Unclassified Information (CUI). The rule is designed to safeguard government data that has not been assigned as confidential...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective...
Guide

Data Protection Technical Overview

Image What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what...
Guide

The 5 Steps To Effective Data Protection

Image Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your file servers and document stores, not protected and unrecoverable because no one knows where to find it. Using data classification helps you regain control over your...
Datasheet

Fortra Data Classification Solutions Overview

Secure Your Information, So People Can Work with Confidence Data is everywhere and protecting it is becoming more difficult than ever. Fortra Data Classification enables you to establish a policy driven foundation that helps you identify and classify sensitive data at creation, in motion, or at rest and apply the right security policy to protect it. Data Protection That Works...
Blog

Complying With the Export Administration Regulations (EAR): Everything You Need To Know

Image The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for reasons of national security and foreign policy. Here is a breakdown of the essentials your organization should know for proper...
Blog

Data Protection Myths and the Truths Behind Them

Image To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at various organizational levels as to whether the solution is necessary, or more trouble than it’s worth. This can become especially...
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data Classification First?

Image Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say when it comes to implementing DLP and data classification, and...
Blog

Enterprise Data Classification: Why you need best-of-breed data classification

Image The data protection landscape and its associated compliance environment changed fundamentally with the implementation of the European-wide GDPR in May 2018, with many other privacy regulations following suit around the globe. It is no longer about what organizations think they need to be doing in order to control their data, but...
Blog

Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity

Image On Wednesday May 12, the Biden administration took a critical step towards addressing security issues that have come to light after several recent, high profile cyberattacks. The extensive Executive Order (EO) described the government's plan to increase cybersecurity protection across the public and private sectors as well as...
Blog

All about POPIA compliance: South Africa’s new data privacy law – and what it means for you

South Africa’s Protection of Personal Information Act (POPIA) has finally come into force. That’s good news for South African citizens and residents, since the legislation’s aim is to protect their personally identifiable information (PII) after it’s collected by public and private entities in the country. But what does the new law mean for South African organizations who...
Blog

Orchestrating data security through effective data identification

Image As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “Age of Data”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater than ever before. Organizations must also handle more and...
Blog

Data at rest versus data at creation: It’s not a choice you should make – secure them both

Image As part of your defense against an external cyberattack, you’re ready to tackle the enormous task of securing all the data sitting on your servers, desktops and external drives. If you’re like most organizations, you’ve got tons of it because no one throws anything away these days. And if you’re working at an enterprise, it’s...