Blogs


blog post
How to identify types of sensitive data

Sensitive data is private information that must be protected from unauthorized access. This type of data can come in various…

Sensitive Data Engine sensitive data management Sensitive Data Manager

blog post
Endpoint Security Software Shopping Guide

As businesses of all sizes enact digital transformation strategies and permanent remote work policies, the need to protect the endpoint…

Data Protection Data Security Sensitive Data sensitive data management Sensitive Data Manager

blog post
What to know about automated compliance tools

Strict data privacy laws and ever-increasing amounts of enterprise data make maintaining compliance difficult for organizations. Because noncompliance can result…

sensitive data management

blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Breaches Classification data breach Data Security DLP PCI-DSS Regulation risk management sensitive data management

blog post
How to determine the sensitivity of information

Not all data is created equally — which is why it’s integral for organizations’ security teams to proactively identify, assess…

Classification sensitive data management

blog post
Find Data and Gain Visibility as the First Step in Data Security

The biggest challenge security architects are faced with is the lack of visibility and where data is hidden in the enterprise.

Classification Data Security Regulation risk management Sensitive Data sensitive data management

blog post
8 Steps Security Leaders Follow to Classify Sensitive Data

Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.

Classification Data privacy Data Protection Data Security risk management Sensitive Data sensitive data management

blog post
Surprised by a Compliance Deadline? How to Use the 80/20 Rule for Success

How to boil compliance mandates down to three key areas, using the “80/20 Rule.”

CCPA Classification Data privacy Data Protection Data Security GDPR Regulation risk management Sensitive Data sensitive data management