Tagged - Data Security

Acronis: Exploring Core Features, Differentiators, and Security Considerations

Acronis presents a compelling option for organizations seeking a comprehensive platform that merges reliable data protection with proactive cybersecurity measures.

Adopt a Structured Acquisition Process to Ensure Excellence in Gen AI Outcomes

Gen AI brings real risks to the enterprise, and it is critical for organizations to take a structured approach to their plans for the adoption and incorporation of Gen AI...

Acronis Offers a Unique Endpoint Protection and Data Recovery Package Tailored for the Small to Medium-Sized Business

Acronis hopes to overtake many competitors in the data recovery and endpoint protection solution space by forging partnerships with many MSSPs and appealing to the SMB...

Remote Work Landscape Pushes Microsoft to Releases Endpoint DLP and Double Key Encryption Features for Added Data Security

Microsoft recently previewed the specific features to tackle data security and risk management for end users with Microsoft Endpoint Data Loss Prevention (DLP) and Double...

DeviceLock Acquired by Cyberprotection Vendor Acronis

To bolster and broaden its data privacy capabilities for end users, cyber and data protection vendor Acronis has acquired DLP player DeviceLock. The acquisition aligns...

Zecurion DLP 9 Recommended by SC Magazine

Zecurion has one of the most robust DLP products on the market and this fact was recently recognized by SC Magazine, who placed the product in its “pick-of-the-litter"...

Osano Applies for Certified-B Status

Osano recently released its SaaS privacy solution aimed at simplifying compliance and vendor assessments. The product feels familiar, but Osano’s ethical commitment sets...

Quest Software’s Toad for Oracle SDP Addresses Data Privacy Compliance Challenges

Quest Software’s new add-on module, Toad for Oracle Standard Data Protection (SDP), automates the detection and remediation of potential violations of data privacy...

Symantec Helps Defend Against Fake Apps With Real DLP

Fake apps that look real have been on the rise lately as a means of stealing sensitive data. However, Symantec has sought to defend against this technique with its Threat...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us