On-Demand Webinar
How a $0 DFIR Kit Can Take On Big Dollar Enterprise Tools
Wed, 09/18/2024
Security leaders don’t always have the budget for the enterprise-grade forensic tools needed for incident response and threat hunting, especially if putting resources towards building out the team. You need to arm them somehow. Many security professionals look to open-source or free utilities, but with so many options out there it can become overwhelming. Join our VP of Cybersecurity to learn his...
On-Demand Webinar
Combine Data Loss Prevention and DRM to Enhance Data Security
By Bill Bradley
The amount of data that companies are generating and its value to day-to-day business is growing exponentially. All that data is then stored and shared, both internally and externally, through all type of means. How can you ensure that sensitive data remains secure without burdening your end users?Organizations need to consider how to implement simple and scalable security solutions for end-to-end...
Blog
What is POPIA, and How Do You Achieve Compliance?
By Chris Brook on Tue, 09/17/2024
POPIA, South Africa's Protection of Personal Information Act, establishes rules for the lawful processing of personal information in South Africa. This blog looks at the purpose of the law, POPIA compliance best practices, and more.As data privacy takes center stage around the world, governing bodies have begun devoting ever more time and attention to defining legal frameworks for working with...
Case Study
Digital Guardian Secure Collaboration Protects Sensitive Personnel Files for Fast-Growth Tech Manufacturer
Remaining at the forefront of innovation in competitive high tech markets is reliant on recruiting the best and the brightest from around the globe to drive ongoing product excellence. Fast business growth requires seamless sharing of personnel files to support recruitment, while protecting the personal data of recruits and employees located across the world, in a wide range of data protection...
Digital Guardian Supports macOS 15 Sequoia with Version 8.8!
By John Meehan on Mon, 09/16/2024
Fortra's Digital Guardian is proud to offer day one support for macOS 15.0 Sequoia!We are happy to announce that with the release of the Digital Guardian Mac Agent v8.8, our product now supports macOS 15.0 Sequoia.This update has been certified against the latest macOS release build, ensuring a seamless upgrade experience for our users.Day One Support for macOSThis release marks a significant...
Case Study
St. Charles Healthcare System - Enabling Care Providers While Protecting Patient Data
About The CustomerSt. Charles Health System (SCHS), a healthcare delivery system comprised of three hospitals and some twenty clinics in Central Oregon, provides a full range of medical specialties and services. Wanting to ensure HIPAA/EDI compliance, SCHS undertook a Baseline Security Risk Assessment with a healthcare information-security management consulting service to better understand their...
Case Study
Securing New England Federal Credit Union’s members PII
About The CustomerNew England Federal Credit Union (NEFCU) is a member-owned financial institution serving communities in the six counties of northwestern Vermont since 1961. With more than 88,000 members and $1 billion in assets, it is the largest credit union in the state and needed to ensure their members they could trust them with their personal information....
Case Study
Protecting Call Center Data from the Endpoint to the AWS Cloud
About The CustomerThis global leader in workforce management engagement relies on customer interactions and the billions upon billions of data points they generate. Collecting the data points is one thing, but to deliver meaningful, predictive, and personalized results requires a platform that can analyze these and spot the trends among the broad data pool. ...
Case Study
Identifying and Blocking a Rogue Employee on Day One
About The CustomerThe company helps organizations worldwide accelerate time to market and lower production costs through design and manufacturing services. The company operates from over 100 facilities around the world, employing over 190,000 dedicated individuals. ...
Case Study
Pokémon Leverages Digital Guardian's Secure Collaboration to Protect Intellectual Property and Personal Information
Media and entertainment rely on high levels of collaboration with third parties to bring new con-tent to market and evolve existing products. By working behind the scenes to encrypt and track files containing sensitive intellectual property, Digital Guardian Secure Collaboration (formerly Vera) secures the exchange of information across supply chains without slowing down workflows.
...
Case Study
Data Visibility, IP Protection and Secure Partner Collaboration
About The CustomerA global 100 engineering and electronics conglomerate had recently suffered loss of proprietary IP. With IP valued over $30 billion USD, and a workforce of thousands of scientists, engineers, and technicians on five continents, they understood they were an attractive target. Their current systems were unable to stop the breach or identify the perpetrator. ...
Case Study
Data Visibility, IP Protection, and Reduced IT Complexity
About The CustomerThe process of bringing new drugs to market is a complex, costly, and regulated process, billions of dollars and years are tied up until an organization can realize any revenue. This company is understandably protective of its intellectual property; losing it could erode their competitive advantage, or allow others to file for patents preemptively. The company needed visibility...
Case Study
Contextual Classification, Data Protection, and PCI-DSS Compliance
About The CustomerA multinational banking and financial services company, with over 50,000 employees worldwide, was subject to a wide range of regulatory requirements, in addition to Sarbanes-Oxley (SOX), Gramm-Leach-Bliley Act (GLBA), Payment Card Industry Data Security Standard (PCI DSS) standards, and other international regulations.While the requirements for each vary, all focus on protecting...
Case Study
Open Access, Business Enablement, and Data Protection
About The CustomerA multi-billion dollar, international financial services organization had failed an SEC audit. With more than 200,000 employees in over 100 countries, and divisions in commercial banking, wealth management, and corporate investment banking, the firm was subject to a wide variety of regulatory standards, including GLBA, SOX, and PCI. While it prides itself on its open culture and...
Case Study
Defending Against a $400MM Breach
About The CustomerA $30 billion manufacturing and consumer goods company with over 60,000 employees relied on intellectual property to maintain its advantage in a competitive market. When a senior research scientist left, he downloaded over 20,000 sensitive documents and took at least 150 of those to his new employer. The organization estimated the cost of the data breach at $400 million....
Case Study
Export Control Compliance, Improved Productivity and $4 Million Annual Cost Savings
About The CustomerA global semiconductor design and manufacturing leader faced the challenge of adhering to export control policies. With facilities worldwide, it relied on the expertise and collaboration of a global employee base. However, individual components within their products fell under the requirements of the International Traffic of Arms Regulations (ITAR) where penalties for non...
Case Study
Manufacturing Company Gains 24x7 Data Security Expertise While Reducing Overhead
About The CustomerThe Customer is a global leader in turnkey equipment across a broad cross section of industrial businesses including hydropower, paper, steel, and biofuel. With more than 25,000 employees spread across 40 countries, understanding where the company’s intellectual property resides and protecting it from misuse without business impact is critical. ...
Case Study
Leveraging Data Discovery to Drive Data Security
About The CustomerOne of the largest U.S. non-profit corporations provides insurance, discounts, advocacy, and financial services to over 9 million members. The company understood the need to protect all of their members’ personal information from theft or misuse, but became concerned with the effectiveness of their current solution for identifying where personal data was located and how it flowed...