Newsroom

Case Study

Manufacturing Company Gains 24x7 Data Security Expertise While Reducing Overhead

About The CustomerThe Customer is a global leader in turnkey equipment across a broad cross section of industrial businesses including hydropower, paper, steel, and biofuel. With more than 25,000 employees spread across 40 countries, understanding where the company’s intellectual property resides and protecting it from misuse without business impact is critical. ...
Case Study

Leveraging Data Discovery to Drive Data Security

About The CustomerOne of the largest U.S. non-profit corporations provides insurance, discounts, advocacy, and financial services to over 9 million members. The company understood the need to protect all of their members’ personal information from theft or misuse, but became concerned with the effectiveness of their current solution for identifying where personal data was located and how it flowed...
Case Study

Digital Guardian Secures Design Files of Large Footwear and Apparel Manufacturer

IntroductionA large footwear and apparel manufacturer (“the Company”), headquartered in the United States, was challenged with protecting highly sensitive design files and intellectual property as those files moved internally within the organization, as well as when they were sent to partners and third-parties in different countries. The Company is global, with over 50,000 employees worldwide....
Case Study

Large Financial Services Company Secures Data Across Remote Workforces with Digital Guardian's Secure Collaboration

IntroductionEmployees increasingly need the flexibility to work remotely and use personal devices to access corporate data. In the highly regulated industry of financial services, banks require powerful data security that supports remote and mobile workforces while protecting sensitive business data.A global financial services institution with nearly 50,000 employees, “the Company”, faced the...
Case Study

Jabil Gains Business Wide Data Visibility and IP Protection in less than 120 Days

About The CustomerJabil, a Fortune 200 company, helps bring electronics products to market faster and more cost-effectively by providing complete product supply-chain management, creating competitive advantage for their customers at every step in the value chain. Jabil is built on a foundation of 180,000 employees across 90 manufacturing plants in 23 countries. ...
Case Study

Compliant with Client Data Protection Requirements in 90 Days

About The CustomerA multinational company providing engineering, IT and staffing services to clients in a range of industries faced a demanding challenge; with a small security staff, they had to quickly develop, adopt, and rollout a new approach to data protection for an aerospace client – in less than six months....
Case Study

Gaining IP Visibility and Control Without Impacting Endpoint Performance

About The CustomerThis customer is one of the world’s largest companies dedicated to industrial automation, producing hardware and software that helps their customers be more productive and efficient. The company spends more than $300 million on R&D each year that results in high-value IP that is their competitive differentiator....
Blog

Friday Five: Data-Stealing Malware, Ransomware Groups Casting a Wide Net, & More

Ransomware groups continue to target organizations across multiple industries. Meanwhile, government entities are urged to be vigilant of data-stealing malware, law enforcement continues to punch back against cybercrime groups, and more. Get up to speed in this week's Friday Five.SOCIALLY SAVVY SCATTERED SPIDER TRAPS CLOUD ADMINS IN WEB BY ELIZABETH MONTALBANOThe ransomware group Scattered Spider...
Case Study

Lean Business Performance, Data Transparency and Security with DLP as a Managed Service

About The CustomerFounded in January 2015, io oil & gas consulting is a joint venture between GE Oil & Gas and McDermott that was created to help oil and gas projects move forward efficiently and profitably by combining upstream consultancy with engineering expertise. To achieve this goal, io requires sensitive financial, engineering, and operational data, all of which would be valuable in the...
Case Study

Enabling Employees to Protect Sensitive Client Information

About The CustomerThe company is a multinational human resources consulting firm with about 29,000 employees worldwide. The firm specializes in human resource services for temporary and permanent jobs, including contract staffing of professionals and senior managers....
Case Study

How A Renowned Healthcare Institution Protects Patient Data In The Cloud

Executive SummaryA world renowned healthcare institution wanted to use the cloud to dramatically improve the ease and speed of sharing information — across their multiple campuses and with their associates around the world — to deliver better patient care. This could not be done without also ensuring the protection of Protected Health Information (PHI).Fortra™’s Digital Guardian® for Cloud Data...
Case Study

Simplify Sensitive Data Protection With Fully Managed DLP and EDR

About The CustomerA leader in the healthcare analytics market handled sensitive data on patients and employees, as well as critical intellectual property of its own. When several key partners – including a major insurer – saw a rise in cyberattacks seeking protected health information (PHI) they recommended that the company implement Data Loss Prevention (DLP) and Endpoint Detection & Response ...
Case Study

Global Insurance Company Uses Digital Guardian Secure Collaboration to Secure Data in Cloud Collaboration Tools

Insurance providers handle a wealth of highly sensitive customer information to manage accounts and process claims. A data-centric security strategy improves their ability to share information in cloud collaboration platforms, while protecting against data breaches and adhering to regulatory compliance. Introduction One of the world’s largest insurance, annuities and employee benefits providers...
Case Study

Keeping Customer Financial Data Safe

About The CustomerA top 20 global financial institution that provides banking, investments, life insurance services and retirement services to consumers. The institution’s wholesale banking division provides international banking with local presence in more than 15 countries. Their global franchises serve a wide range of organizations, including corporates, multinational corporations, financial...
Datasheet

IP Protection, Secure Collaboration, and Massive Scalability

About The CustomerA Fortune 50 company invested heavily into intellectual property to design and manufacture energy generation machinery. Employees used this to build the company’s competitive advantage. The company relied on “trust-based” access under the assumption that all employees were trustworthy. When a privileged user was caught attempting to steal proprietary data, it became obvious a ...
Case Study

IP Protection, Secure Partner Collaboration and $4 Million in Cost Savings

About The CustomerOne of the largest natural gas producers in North America needed to share critical information with business partners, but was concerned about losing data. The company is constantly bidding for drilling rights and developing new technology to maximize its output. This information is valuable to the company and its competitors. Data needs are massive in this industry. Seismic...
Case Study

Documented Protection for 2 Petabytes of Client Data

About The CustomerCombining creativity and data, this agency that has offices in 60 countries is a global leader in knowledge-based marketing solutions. The agency enables businesses worldwide to derive data-driven insights in order to create highly relevant and productive consumer experiences. Their clients provide them with the sensitive data that drives their business, and demand it is kept...
Datasheet

Desktop and Application Virtualization

PROTECTING DATA IN VIRTUAL ENVIRONMENTSTHE CHALLENGEWhile virtual environments can control network access for mobile users and third-party partners, data risks remain. Many traditional security technologies cannot effectively operate in virtual environments and are therefore blind to user activities and data misuse, including attempts to access other sensitive systems. This limitations increases...