Mimecast Announces New Threat Intel Feed for Your Security Devices at Blackhat 2019

Mimecast announces a new threat intelligence platform at Blackhat 2019, offering customers a new means to feed threat intelligence into security devices such as SIEM,...

McAfee Ramps Its CASB FedRAMP Authorization Level Up to High

In the thrilling world of FedRAMP, achieving a High impact level authorization is as exhilarating as it gets. McAfee has achieved this exciting apex for its MVISION Cloud...

Datex’s DataStealth Reduces Data Loss by Limiting Sensitive Data Acquisition

DataStealth is a difficult product to classify. It resembles DLP and privacy software but doesn’t fit neatly in either category. DataStealth focuses on data obfuscation,...

Cisco Suffers Security Flaw With Zoom Interoperability

Cisco is beginning to lose patience with its Zoom interoperability after another Zoom security risk: access for the Zoom Connector for Cisco hosted on zoom.us did not...

TrustArc Acquires Nymity, Seeks to Bolster Feature Set

TrustArc has announced the acquisition of Canadian counterpart, Nymity – a more boutique-style vendor known for its very high standard of privacy research, expertise...

Zecurion Offers Flexible Rules and Data Discovery Tool to Boost DLP Outcomes

Zecurion DLP offers a robust set of features, including optical-character and voice analysis (for images and recordings, respectively), but equally attention-grabbing is...

Demonstrate Data Protection by Design for IT Systems

Privacy is now considered an integral part of information security. In fact, consumers often want more than a company’s word that their data is secure; they want to see...
  • guided implementation icon

Demonstrate Data Protection by Design for IT Systems – Executive Brief

Read this Executive Brief to understand why data protection by design will help you demonstrate your commitment to privacy.

Demonstrate Data Protection by Design for IT Systems – Phases 1-2

Privacy is fast becoming a non-negotiable part of information security. Being able to demonstrate how your organization designs its systems for privacy will give you an...

Demonstrate Data Protection by Design for IT Systems – Phase 1: Determine What Data Protection by Design Means for You

This phase of the blueprint, Demonstrate Data Protection by Design for IT Systems, will help you use the PbD and DPbD frameworks and help you understand how they apply to...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us