Information Governance and Data Security - Further Information
This page shows up to 100 pieces of content (newest at the top):
Discovering Sensitive Data (2020)
This Market Update discusses, reviews and compares products specialising in the discovery of sensitive data.
Ab Initio Semantic Discovery
Ab Initio Semantic Discovery is a data discovery solution offered as part of Ab Initio’s broader data management platform.
Lumada Data Catalog
The Lumada Data Catalog from Hitachi Vantara is a data catalogue targeted at both the enterprise data lake and traditional data environments.
Seeker DLP finds sensitive data within files on Windows and Macs, across SMB-based file servers and web servers.
STEALTHbits Sensitive Data Discovery
STEALTHbits supports discovery against a comprehensive list of file systems, SharePoint and OneDrive, Exchange, Dropbox, Oracle and Microsoft SQL Server.
DataSunrise Sensitive Data Discovery
DataSunrise supports the discovery of sensitive data across a wide range of both relational and NoSQL data sources.
Solix Technologies Sensitive Data Discovery
Solix Common Data Platform acts as a one stop shop for the management and governance of all enterprise data.
Dataguise started by offering sensitive data discovery and masking but now includes, additionally, encryption/decryption and extensive reporting.
MENTIS iDiscover offers a range of modules that cover all necessary functions for discovering, protecting and monitoring sensitive data.
BigID specialises in (sensitive) data discovery and classification and unlike other vendors has been built from the ground up to concentrate in this area.
Ground Labs Enterprise Recon (2020)
Enterprise Recon offers enterprise-wide discovery of personal, PII and PCI data in accordance with a wide range of compliance regulations.
Informatica Data Privacy Management (2020)
Informatica Data Privacy Management is a datacentric privacy, governance and security solution that is focused on discovering and classifying sensitive data.
Global IDs Sensitive Data Discovery (2020)
Global IDs offers data discovery and classification as part of its EDA platform, thereby providing sensitive data discovery and compliance with regulations.
This report is about assuring the quality and provenance of your data from both internal and external perspectives.
GDPR is now a reality and sanctions are starting to bite. What should organisations be doing?
GRC realities - what are organisations really doing?
Every organisation faces risk, uncertainty and security threats, yet must comply with a host of regulations. GRC helps to manage those issues to keep an organisation on track.
Driving into the future with connected cars - PKI technology helps assuage the security concerns of increased connectivity
PKI technology provides a viable alternative for vastly improving security within today’s increasingly connected cars and the ecosystem in which they operate.
The Chief Data Officer: getting the basics right
Before a CDO can think sensibly about what data the business might want to leverage they must get a handle on the data assets that the company already possesses.
The importance of a data protection platform for GDPR compliance - unified data protection controls will smooth the path to compliance
This document outlines how an integrated data protection platform can take the pain out of compliance, helping them to avoid data breaches.
How to raise your organisation’s security maturity level - the need for Security Intelligence and why it should be a board-level concern
This paper takes a look at the stages involved in the security maturity journey and defines five stages along that journey.
Practices for Enhancing Data Security - a survey of organisations in the UK and the US
This report is based on a survey of 200 organisations in the UK and the US, all of which have more than 1,000 employees.
Financial Services Directives - Requirements for Data Technologies
The focus in this paper is on EU directives for the financial sector and what their requirements are in terms of information management capabilities.
Document Content Security V2
Preventing malicious documents from traversing networks will help considerably in preventing security breaches.
Good information governance is good business practice - reduce risks, improve performance, collaborate securely and achieve compliance
This document discusses how technology enables more effective business collaboration and communications...
Managing Cyber Business Risk - with Content Assurance and Cyber Insurance
Over the past few years risks associated with technology and the internet have created a whole new sub-genre called cyber business risk. Whilst there are...
Taking control of file sharing services - best practices for the safe and secure use of file sharing services for organisations
Careful planning is required when selecting any cloud service, especially file sharing which could leave sensitive and confidential data at risk.
Document Content Security
Documents are key weapons used in advanced targeted attacks, which are fast growing in popularity among criminals.
The need to protect against file-based attacks - statistical evidence for the need for greater assurance
The underlying structure of many document types makes it a relatively easy task to embed malicious code, downloading malware onto the devices of those users.
Content assurance and advanced threat protection for valuable business documents - assuring the safety and integrity of files and documents
This document aims to highlight the security risks associated with documents and to show why taking such threats seriously is vital for the success of any organisation.
Blended security threats require a unified response
The new mantra today is that it is not if your organisation will suffer a security breach, but when. In a recent survey released during Infosec...
Harnessing big data for security - what are the key considerations and capabilities?
This report discusses some of the challenges of harnessing big data security and outlines some of the key considerations and capabilities that organisations should consider.
Key considerations for security intelligence in big data - what a CISO needs to know
This document discusses the need for an intelligence-driven security approach and aims to provide pointers for security executives.
Big Data bias - An analysis of recent research from Varonis
Varonis has published some research into big data - but just looking at the press release is misleading
Voice Data Security
Anyone that conducts sensitive business using a cell phone should seriously consider implementing the preventative measures discussed in this paper.
Voice Data Security - An overview of cellular (mobile) phone interception
Anyone conducting sensitive business using a cell phone should seriously consider implementing the preventative measures in this paper.
Efforts to improve data security in the local government sector - ... expanded use of strong authentication and cloud offerings
Local authorities handle a substantial amount of sensitive information related to individuals. Holding this information poses a wide range of risks.
Real Evidential Weight
This white paper discusses data storage in the organisation and it's effective management to meet legislation and compliance.
Managing the Storage Explosion - through new technological approaches
A series of recently developed technologies will, to a greater or lesser degree, help in combating the effects of the storage explosion.
This paper describes a few situations organisations are encountering - or will encounter - to clarify some of the basic compliance data storage needs.
Open-Tec CStore Content Archive
There are as yet no direct competitors in this niche, yet it addresses a growing requirement. CStore has major disruptive market potential.
The strategic importance of email encryption - Securing business data and email traffic throughout its journey
As email is now fully embedded as a business tool and is being used to transfer critical, sensitive data, it is becoming increasingly important to provide a secure, robust and manageable encryption service for email users. Email encryption cannot be…