Resources

On-Demand Webinar

Using SOAR Tools to Accelerate and Automate Data Security

One of the biggest challenges for infosec analysts and leaders is being able to respond to the most serious threats before data loss or theft. Security orchestration, automation, and response (SOAR) solutions lets infosec teams integrate and automate responses.Join Chris Saucier, DG SE, for a demonstration of how SOAR tools can retrieve incidents and automate response actions. With reaction faster...
On-Demand Webinar

Solving Mid-Market Data Protection Challenges With Managed DLP

Digital data is expanding in all organizations, in mid-size organizations the struggle to protect that data is more impactful. Finding and retaining top cybersecurity talent is harder and the consequences of a breach can be more penalizing.Digital Guardian launched a managed service targeted at this need – delivering the data protection midmarket organizations need. We provide enterprise class...
Blog

What is HIPAA Compliance?

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.
On-Demand Webinar

How Classification Defines Your Data Security Strategy

Digital transformation is driving a change in business processes from end to end and transforming volumes of data into sensitive data. Information security professionals are tasked with protecting this data, but they must first locate and understand it before they are able to prioritize data security programs. Data classification provides order to what can be chaos.Join Garrett Bekker, Senior...
On-Demand Webinar

Data Classification to Get Ahead of Compliance

Information security leaders struggle with allocating scarce resources. Without accurate guidance on what data is sensitive (confidential intellectual property or regulated data), or public, (product data sheets) this can be a guessing game. Data classification serves as the strategic road map to define and implement your compliance, security, and business strategy.Join Digital Guardian to learn...
On-Demand Webinar

Webinar Acronym Jungle: CASB vs. DLP vs. IRM

There’s so much confusion in the market. How is a CASB different than DLP? Should I first invest in DLP or secure my confidential data with information rights management (IRM)? What should my team prioritize this year?We’re here to help you navigate those challenges. Watch this on-demand webinar, the “Acronym Jungle: CASB v. DLP v. IRM” to learn:The differences between CASB, DLP and IRM data...
Video

GDPR Webinar: 5 Questions About Managing Security Risk Under The GDPR

It’s GDPR’s next big challenge: aligning the priorities of data management with the specific data protection and privacy regulations imposed on your organization. Watch this on-demand webcast where Grant Shirk, VP of Marketing, and the security team discuss how to comply with GDPR clauses covering anonymization, encryption, and system design...
Blog

How to Mitigate a DDoS Attack

Following a rash of targeted denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks worldwide, countries are offering guidance.