What is COBIT?

Learn about Control Objectives for Information and Related Technologies, or COBIT, the goals of the framework, the benefits, how it can help companies meet compliance, and more in Data Protection 101, our series on the fundamentals of information security.


How Does UEBA Protect Against Insider Threats?

Learn about how User and Entity Behavior Analysis, or UEBA, works and how it leverages machine learning to help mitigate insider threats, password attacks, and more in Data Protection 101, our series on the fundamentals of information security.


What Does an Insider Threat Analyst Do?

Learn about what an insider threat analyst does, along with how they affect existing procedures, policies, and protection layers in organizations in Data Protection 101, our series on the fundamentals of information security.


What is ICS Security?

Learn about what ICS security is, challenges, best practices, and more in Data Protection 101, our series on the fundamentals of information security.


What is SCADA Security?

Learn about what SCADA security is, examples of threats and vulnerabilities, and more in Data Protection 101, our series on the fundamentals of information security.


What is a Data Repository?

Learn about what a data repository is, the best practices for working with them, and more in Data Protection 101, our series on the fundamentals of information security.





Pages

ANALYST REPORTS

Gartner 2017 Magic Quadrant for Enterprise Data Loss Prevention (DLP)