Resources

On-Demand Webinar

Combine Data Loss Prevention and DRM to Enhance Data Security

The amount of data that companies are generating and its value to day-to-day business is growing exponentially. All that data is then stored and shared, both internally and externally, through all type of means. How can you ensure that sensitive data remains secure without burdening your end users?Organizations need to consider how to implement simple and scalable security solutions for end-to-end...
On-Demand Webinar

The Value of Digital Rights Management

The Value of Digital Rights ManagementIn our highly connected, collaborative economy, you can no longer depend on perimeter-based technologies alone to ensure data confidentiality. Business users need to be able to share files and collaborate on data as a part of everyday business, and risks increase when that data goes beyond your organization’s perimeter.Organizations can depend on a digital...
On-Demand Webinar

Why Pair Data Classification with DRM for End-to-End Data Security

The need to be able to share files and collaborate on data as a part of everyday working is crucial for businesses and their users. This internal and external collaboration, while necessary, presents several security challenges to IT. How much of what users are sharing is sensitive information? Where is it being stored and how is it being shared? Once you have the answers to these questions, how...
Blog

IP Theft: Definition and Examples

IP theft can have long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.
On-Demand Webinar

Using SOAR Tools to Accelerate and Automate Data Security

One of the biggest challenges for infosec analysts and leaders is being able to respond to the most serious threats before data loss or theft. Security orchestration, automation, and response (SOAR) solutions lets infosec teams integrate and automate responses.Join Chris Saucier, DG SE, for a demonstration of how SOAR tools can retrieve incidents and automate response actions. With reaction faster...
On-Demand Webinar

Webinar Acronym Jungle: CASB vs. DLP vs. IRM

There’s so much confusion in the market. How is a CASB different than DLP? Should I first invest in DLP or secure my confidential data with information rights management (IRM)? What should my team prioritize this year?We’re here to help you navigate those challenges. Watch this on-demand webinar, the “Acronym Jungle: CASB v. DLP v. IRM” to learn:The differences between CASB, DLP and IRM data...
Video

GDPR Webinar: 5 Questions About Managing Security Risk Under The GDPR

It’s GDPR’s next big challenge: aligning the priorities of data management with the specific data protection and privacy regulations imposed on your organization. Watch this on-demand webcast where Grant Shirk, VP of Marketing, and the security team discuss how to comply with GDPR clauses covering anonymization, encryption, and system design...
Video

Closing the Content Security Gap

Do you hate the feeling that confidential data is constantly slipping through the cracks in your security? What’s worse is knowing you have no visibility into where PII has traveled, or how your IP is used by partners.Hear four ways enterprises are closing these cracks:4 ways you’re losing confidential dataWhy a data-centric strategy is key to closing the gapWhy CASBs, DLP, and encryption aren’t...
Product Video

Top Trends in Advanced Threats to Sensitive Data in 2019

Your organization regularly faces threats to sensitive data from both inside and outside the organization. The team charged with delivering your information security can tell stories about what they learn from the solutions in place. Digital Guardian manages security programs for hundreds of customers, globally, we see hundreds of stories every day. We see the novel threats that can turn into...
Video

Secure Content Beyond Box

With Digital Guardian Secure Collaboration for Box, we’re enabling organizations to protect enterprise content instantly as it moves around the world. When using Digital Guardian Secure Collaboration for Box, a “Digital Guardian Secure Collaboration Secure Space” is created for users to start securing files simply by saving to Box. Watch this 3-minute video to see the integration in action.
Blog

What is SCADA Security?

Learn about what SCADA security is, examples of threats and vulnerabilities, and more in Data Protection 101, our series on the fundamentals of information security.
Video

The Real World of Cyber Threat Hunting

Watch our webinar with Senior Director of Cyber Security Tim Bandos to learn about common threat hunting use cases so you can better protect your organization.