Knowledge Base

What is Endpoint Detection and Response?

A Definition of Endpoint Detection and Response Text Gartner’s Anton Chuvakin first coined the term Endpoint Threat Detection and Response (ETDR) in July 2013 to define “the tools primarily focused on detecting and...

What is DLP as a Service?

What is DLP as a Service? Determining when DLP Managed Services Make Sense for You Text Data loss prevention (DLP) is a type of software that protects sensitive data against unauthorized access, use, sharing, or...

What is DCAP (Data-Centric Audit and Protection)?

What is DCAP (Data-Centric Audit and Protection)? A Definition of DCAP, How It Works, Best Practices, and More Text Enterprises are taking advantage of big data analytics to advance their businesses. With big data...

What is the Data Protection Directive?

What is the Data Protection Directive? The Predecessor to the GDPR Text Adopted in 1995 by the European Union, the Data Protection Directive is officially known as Directive 95/46/EC on the protection of individuals...

Data Protection: Data In Transit vs. Data At Rest

Data Protection: Data In Transit vs. Data At Rest Text Data in transit, or data in motion, is data actively moving from one location to another such as across the internet or through a private network. Data...

What is Data Loss Prevention (DLP)?

A Definition of DLP Text Data loss prevention (DLP) is a cybersecurity solution designed to protect sensitive data at rest, in-transit, and on endpoints, reducing the likelihood of data theft or unauthorized exposure...

What is Data Integrity?

What is Data Integrity? Text Data integrity refers to the accuracy and consistency (validity) of data over its lifecycle. Compromised data, after all, is of little use to enterprises, not to mention the dangers...

What is Data Forensics?

What is Data Forensics? Text Data forensics, also know as computer forensics, refers to the study or investigation of digital data and how it is created and used. Data forensics is a broad term, as data forensics...

What is Data Egress?

What is Data Egress? Managing Data Egress to Prevent Sensitive Data Loss Text Data egress refers to data leaving a network in transit to an external location. Outbound email messages, cloud...

What is Data Discovery?

What is Data Discovery? Text Data discovery involves identifying and locating sensitive or regulated data in order to adequately protect it or securely remove it. Data discovery is a priority for many enterprise...

What is Data Classification?

A Data Classification Definition Text Data classification is broadly defined as the process of organizing data by relevant categories so that it may be used and protected more efficiently. On a basic level, the...

What is Continuous Security Monitoring?

What is Continuous Security Monitoring? Text Continuous security monitoring is a type of security solution that automates security monitoring across various sources of security information. Continuous security...

What is Context-Aware Security?

Digital Guardian Offers the Only Comprehensive Context Aware Security with Seamless, Streamlined Data Discovery and Classification Text In 2012, Gartner predicted the rise of context aware security as the emerging...

What Is Content Inspection?

A Definition of Content Inspection Text Content inspection is a technique frequently employed by network-based data loss prevention solutions. Content inspection involves examining data in order to identify regular...

Content Aware Security

Digital Guardian's Content Aware Security Is the Only Solution Offering The Comprehensive Protection Modern Enterprise Demand Text A data leakage protection (DLP) solution is not comprehensive without content aware...

What is Cloud Storage Security?

A Definitive of Cloud Storage Security Text While cloud storage is convenient and gives employees access to their data anywhere, at any time, on nearly any device, cloud storage security is a top concern for...

What Is Cloud Encryption?

A Definition of Cloud Encryption Text Cloud storage providers offer cloud encryption services to encrypt data before it is transferred to the cloud for storage. Typical cloud encryption applications range from...

What is Business E-mail Compromise?

Definition of Business E-Mail Comprmoise Text Business e-mail compromise (BEC) is when an attacker hacks into a corporate e-mail account and impersonates the real owner to defraud the company, its customers,...

What is Big Data Security?

Big Data Has Big Potential, But Also Data Security Concerns Text Enterprises are embracing big data like never before, using powerful analytics to drive decision-making, identify opportunities, and boost performance...