UEBA for Compliance Whitepaper

SUPPORTING COMPLIANCE EFFORTS WITH USER & BEHAVIOR ANALYTICS UEBA (user & entity behavior analytics) has emerged as the most promising solution to rampant cyber threats and fraud because it allows security leaders to finally get ahead of attackers by…

Read More

Linoma Release Webinar

Join us for a FREE webinar to learn more about the major enhancements and how GoAnywhere MFT can be the all-in-one centralised solution for your organisation’s batch and ad hoc file transfers. Date: Thursday 5th May, 2016 Time: 2:00PM…

Read More

Office 365 Single Sign-On Whitepaper

For most organizations, the move to Office 365 is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk increases…

Read More

Linoma GoDrive by GoAnywhere Video

GoDrive is an on-premise solution that provides Enterprise File Sync and Sharing (EFSS) services for your employees and partners. Complete the form on this page to watch this video now.

Read More

Varonis – What We Do Video

Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of…

Read More

SSH HD Video

SSH HD Video. Complete the form on this page to watch this video now.

Read More

Nlyte Defines Data Center Infrastructure Management (DCIM) – Excitement Video

From the world leader in Data Center Infrastructure Management (DCIM) software focused on planning, managing and optimizing data centers. Complete the form on this page to watch this video now.

Read More

Digital Guardian: Security’s Change Agent Video

Digital Guardian: Security’s Change Agent video. Complete the form on this page to watch this video now.

Read More

PKWARE Data Security, Compression and Encryption at a Glance Video

PKWARE screen-saver presentation. PKWARE software enables businesses to reduce, secure and move data across the extended enterprise — from mainframes, servers, desktops, mobile devices and into the cloud. Since creating the ZIP standard, PKWARE continues to innovate with compression,…

Read More

iSheriff advert Video

iSheriff advert video. Complete the form on this page to watch this video now.

Read More

Ipswitch MOVEit DMZ Video

How MOVEit DMZ helps automate, simplify and manage complex file transfer processes and workflows. Complete the form on this page to watch this video now.

Read More

Linoma GoAnywhere MFT Video

Linoma GoAnywhere MFT video. Complete the form on this page to watch this video now.

Read More

Globalscape: Maximize Uptime with EFT™ High Availability

An active-active implementation of Enhance File Transfer™ (EFT™) High Availability (HA) using two or more EFTs and a load balancer, provides for non-stop availability of your network. Save time and money managing your file transfers and eliminate the problems…

Read More

Watchful Software Video

Watchful software video. Complete the form on this page to watch this video now.

Read More

Boldon James Video: Data Classification Overview

Leaders in Data Classification Solutions http://www.boldonjames.com/solutions/… Find out what makes Boldon James the first choice for the secure organisation and how you can identify, understand and protect the value of your information using data classification solutions. Complete the form…

Read More

Centrify Video: Are Corporations More Vulnerable Than They Admit?

In 2015, Centrify corporation surveyed more than 400 IT decision makers (ITDMs) in the US and UK to find out one thing: are corporations as secure as they should be? Major breaches like Sony and the Office of Personnel…

Read More

Insider Threats and Inside Out Security

When it comes to protecting data, the perimeter has become irrelevant. It’s time to protect your data from the inside out: transform your data security with Varonis. Complete the form on this page to watch this on-demand webinar now.

Read More

Chaos to Control Creating a Secure Mature File Transfer Process or System or Solution

Moving Files in to extended enterprise requires not only support for higher scale with fewer resources, but also dealing with the relentless challenges of security; compliance, errors, exceptions and problems; and the time and opportunity cost of problem resolution….

Read More

Secure File Transfer and Today’s Regulatory Compliance

In this Webinar you will learn not only how to easily achieve compliance, but make sure you stay in compliance. See how using Globalscape’s Secure File Transfer solutions provide a piece of mind whether it’s PCI-DSS, DPA, FSA regulations,…

Read More

File Transfer Automation On Demand Webinar

Businesses bring together all kinds of data streams – the bigger the business, the more diverse and disparate the data, but collating these streams means manual scripting and hours of hands-on management. And when information consumers in your organization…

Read More

Do Your Data Transfers, Policies and Practices Meet Your Regulatory Obligations?

It doesn’t matter which industry you are in, or how small your business is – you must comply with regulatory directives concerning data.Various directives are used to keep data about your business, your customers and your partners safe –…

Read More

Business Intelligence Dashboards for File Transfer

When a file moves into, out of, or within your company, you should know about it. And when a file transfer fails, you – not your supplier or your customer – should be the first to know about that,…

Read More

The Secure Dropbox Alternative from Globalscape

In recent years, as more of this data is exchanged, a worrying trend has now become an epidemic. Facing a lack of suitable alternatives offered by their employers, employees have resorted to using personal consumer cloud solutions such as…

Read More

Watchful Software; Data Classification That Works

Watchful Software’s RightsWATCH technology allows any organisation to be in complete control of who can ACCESS, CHANGE & VEIW Corporate information now matter where it travels. Learn the following from our simple demonstration how RightsWATCH is able too… Classify,…

Read More

Planning An Effective DLP (3.0) Strategy: From Immediate Results to Long Term Goals

DLP, and especially in its recent evolution to DLP 3.0, defines data protection in terms of the combined risks and threats that companies must be able to define, measure, and mitigate in order to protect their most critical data….

Read More

The Next Generation in Data Security from Verdasys

In this webinar you will learn how it’s now possible to create an environment that supports both successful and affordable data security while optimizing business enablement and productivity, as well as managing insider threat, compliance and cyber security all…

Read More

Watchful Keeping Unstructured Data Secure Whitepaper

Hardening the network perimeter to keep attackers out does not suffice anymore. One needs to also secure the data itself whenever and wherever. Despite efforts to strengthen defenses, control unsecured devices, restrict the usage of social networks, and otherwise…

Read More

Watchful True Information Security Only a Click Away… For Anyone Webinar

Download the slides from this pre-recorded entitled ‘True Information Security Only a Click Away… For Anyone’ from July 2015. Complete the form to see this resource in full.

Read More

Watchful You Can’t Teach an Old Dog New Tricks Webinar

Download the slides from this pre-recorded entitled ‘You Can’t Teach an Old Dog New Tricks – The fallacy of the ‘Secure Perimeter’ approach’ from June 2015. Complete the form to see this resource in full.

Read More

Watchful The X-Factor in Data-Centric Security Webinar

Download the slides from this pre-recorded entitled ‘The X-Factor in Data -Centric Secuirty’ from July 2015. Complete the form to see this resource in full.

Read More

Watchful RightsWATCH building on RMS for data-centric data security

RightsWATCH complements and extends Microsoft Rights Management Services (RMS) ensuring that sensitive/confidential information is identified, classified, marked/tagged and tracked appropriately. Further, that information can only be used by those who have been granted proper authority by company policy. RightsWATCH…

Read More

Watchful The Five Key Trends for Insider Threats

Download the infographic to learn the five key trends for insider threats. Complete the form to see this resource in full.

Read More

Watchful Extending RightsWATCH to Exchange Online and Office 365

Organizations of all sizes are challenged to protect a growing quantity of valuable information against careless mishandling and malicious use. Businesses today need productivity services that help users get more done from virtually anywhere while maintaining security in the…

Read More

Watchful Dynamic Data Classification with RightsWATCH

Most organizations have spent time, money, and thought putting into place an Information Control Policy (ICP) that outlines what types of information are important to the organization, how this information should be handled, and who should have access to…

Read More

Watchful TypeWATCH e-Biometrics Security

Download the TypeWATCH e-biometrics security sheet to find out more. Complete the form to see this resource in full.

Read More

Watchful Secure Collaboration with RightsWATCH and Azure RMS

Email has evolved to become more than a way of exchanging brief messages, it’s now the de facto method for collaboration of all types, regardless of the volume and sensitivity of data being exchanged. This creates a nightmare scenario…

Read More

Watchful RightsWATCH Enhancing and Extending Microsoft’s RMS

Download the RightsWATCH enhancing and extending Microsoft’s RMS to find out more. Complete the form to see this resource in full.

Read More

Watchful RightsWATCH Data-centric Security Overview

Download the RightsWATCH data-centric security sheet to find out more. Complete the form to see this resource in full.

Read More

Watchful RightsWATCH Data-centric Security for Individuals

Download the RightsWATCH data-centric security sheet to find out more. Complete the form to see this resource in full.

Read More

Watchful RightsWATCH and the RMS Sharing App in an Azure Environment

RightsWATCH brings significant feature and functionality to the Azure RMS enterprise. RightsWATCH allows information to be classified according to the corporate security policy; it can mark/tag information in accord with that policy; and, it protects the information using the…

Read More

Watchful GE Money Customer Case Study

A key role of a financial institution is to protect its customers’ monetary assets, and the greatest asset that the bank itself owns is information about its customers and their assets. For thousands of organizations in the financial sector,…

Read More

Varonis Point of View: Varonis and User Behavior Analytics Whitepaper

Security has become a business problem. Though organizations have invested in security, they know they’re not really protected. The recent string of headline-making breaches has not been lost on the C-level suite. Security personnel, for the most part, know…

Read More

Varonis How to Detect and Clean Cryptolocker Whitepaper

CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops and network shares and “hold for ransom”, prompting any…

Read More

Varonis Insider Threats: Malice, Mistakes, and Mountain Lions Whitepaper

The goal of this whitepaper is to help you understand the most common insider threats and provide actionable tips to help protect against them. First we’ll take a look at the actors involved in insider breaches and dissect the…

Read More

Varonis Enterprise Search: Unlocking Hidden Knowledge in Unstructured Data Whitepaper

The major search engine players–Google, Microsoft, Yahoo–have revealed little about their search algorithms. That’s understandable: it’s their secret sauce. However, from the few statements they have made publically, we have some understanding of how the underlying algorithms work in…

Read More

Varonis Partner Battlecard

Varonis is the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations…

Read More

Varonis Express Risk Assessment Datasheet

Security is at the top of everyone’s mind: without proper insight into where sensitive data lives and who has access to it, organizations are at significant risk from external and internal threats. We’ve made our Express Risk Assessment completely…

Read More

Varonis Security Solutions

Despite the enormous growth and increasing value of content stored across file shares, intranets, SharePoint, and the cloud, many organizations still lack the security intelligence required to protect unstructured data. Without a scalable way to identify sensitive content, monitor…

Read More

Varonis Insider Threats Infographic

Infographic on insider threats. Complete the form to download this resource in full.

Read More

SSH Key Management Infographic

Your enterprise may have more Secure Shell trust relationships than employees. A typical 1,000 server environment server has over 15,000 Secure Shell key based trust relationships, with 10% of these granting a high level of privilege including root.Follow these…

Read More

SSH Universal SSH Key Manager Datasheet

As the inventors of the Secure Shell protocol, SSH Communications Security is focused on helping IT organizations secure the path to their information assets. Our Universal SSH Key Manager is a multiplatform, scalable solution that brings compliance and control…

Read More

SSH Tectia SSH Server for IBM z/OS Datasheet

In large and medium-sized enterprises, mainframes are still relied upon as the most trusted, secure repository for Big Data. Because the mainframe technology itself is a vault for core systems and databases, encryption of the connections coming to and…

Read More

SSH Tectia SSH Client Tectia SSH Server Datasheet

Enterprises and government organizations around the world use Tectia SSH Client and Server to secure their most critical IT processes including ad hoc and automated file transfers as well as remote systems administration. They chose Tectia for the features,…

Read More

SSH Tectia MobileID Datasheet

With Tectia MobileID you can, increase security for accessing critical systems with no effort from end users, save on operational and maintenance costs with a tokenless solution and activate new users, partners and ac-hoc accounts instantaneously. Two-factor authentication provides…

Read More

SSH Missing Identities Datasheet

Identity management in large heterogeneous IT environments is complex and in many enterprises, a work in progress. The fundamental challenge is how to bring disparate operating systems and authentication systems under central management including a unified directory where all…

Read More

SSH Secure File Transfers and Data-In-Transit Datasheet

Tectia Server for Linux on IBM System z provides the ultimate SSH data security solution with strong encryption and authentication for mainframe file transfers and data-in-transit. Complete the form to download this resource in full.

Read More

SSH Tectia ConnectSecure Datasheet

Tectia ConnectSecure makes file transfer operator’s life easier and offers a cost-effective way to reach an advanced security level in the file transfer network. Complete the form to download this resource in full.

Read More

SSH Support Services Datasheet

Enterprises across the globe are facing an increased number of security threats, ranging from mere nuisances such as viruses, to sophisticated hacking attempts. At the same time, new regulatory compliance requirements force enterprises to bolster their defenses, often putting…

Read More

SSH CryptoAuditor: An SSH, SFTP and RDP Firewall Datasheet

The security intelligence gap in encrypted channels is a challenge most organizations are aware of but have not been able to get a handle on. Real-time intelligence, proactive data loss prevention and forensics have been enabled throughout the estate,…

Read More

SSH CryptoAuditor Datasheet

CryptoAuditor is a network-based, inline traffic monitor that decrypts and records the activities of privileged users without interfering with their normal workflow. Because there are no agents to deploy, it works regardless of what devices users connect with and…

Read More

SSH Financial Services Company Gains Visibility & Control Over External Contractors Case Study

For this Financial Services company, controlling access to confidential data is not only crucial to the security of the business, but also mandated by national and international regulation. With over 400,000 financial transactions in excess of several billion USD…

Read More

SSH Monitor, Audit & Control Privileged Users in the Cloud Case Study

The customer serves thousands of customers worldwide and is a leading provider of application development, consulting services, product development and cloud hosting. Their customer base consists a number of verticals including government, financial, energy, healthcare, manufacturing, retail and media….

Read More

SSH Solution Case Study

As part of a system update, Tamro Corporation decided to upgrade security for its file transfer operations. Since a key requirement was also to ensure compliance with public accountability regulations, the company chose SSH to secure the sharing of…

Read More

SSH Key Mobile ID Case Study

A government agency in Singapore needed a flexible and easily-deployed secure authentication solution for its system administrators. SSH solutions allowed the organization to ensure that the right people had access to its mission-critical data with minimal intervention. Complete the…

Read More

SSH Key Manager Case Study

In order to meet the challenges of a deadline driven environment, this leading news and media organization needed to streamline provisioning and access controls for application developers and IT staff. Complete the form to download this resource in full.

Read More

SSH Tectia Mainframe Case Study

A global automobile manufacturer with major operations in Europe and North America needed to replace numerous batch processes sending data in the clear with secure, encrypted file transfers. Using SSH Communications Security Tectia Solutions for Mainframe z/OS, this global…

Read More

SSH Andritz Group Case Study

ANDRITZ GROUP integrated SSH MobileID with VPN access to provide an intuitive, administration- free, and tokenless two-factor authentication for its mobile workforce and partners. Complete the form to download this resource in full.

Read More

SSH Cloud Security Case Study

Clearmanage has already implemented security tools and appropriate encryption to protect sensitive information in-transit and in-storage in the cloud environment; however, being able to monitor privileged user activities in the encrypted networks presents an additional layer of complexity. In…

Read More

Secure Islands Data Interceptor for Opentext

Secure Islands Data Immunization concept focuses on the data itself, rather than trying to control the users, channels or storage. Uniquely embedding persistent classification and protection within the data itself at the moment of creation or initial organizational access,…

Read More

Secure Islands IQProtector for ISO 27001 Compliance

ISO 27001 certification is rapidly becoming a requirement to do business with many major multinationals. Even in situations where certification is not strictly required, vendors who are certified are preferred. But beyond this, achieving ISO 27001 compliance is an…

Read More

Secure Islands Making Data Classifiction Work for You

If you’re reading this, there’s probably no need to explain the importance of data classification in your enterprise information security toolbox. The question is likely not “Does my organization need data classification?” but rather “Which data classification solution is…

Read More

Secure Islands Making IRM Work for You

Never before has enterprise IT enabled such extreme productivity. In the borderless, social enterprise, more data is shared between more people in more places, resulting in a radically more creative and collaborative work environment. This open world of sharing…

Read More

Secure Islands IQProtector Data Interceptor for SharePoint

Microsoft SharePoint has become a critical document-management platform for thousands of enterprises, large and small, necessitating the safeguard of vast volumes of sensitive content. The flexibility and granularity to set access permissions within SharePoint allows controlling information stored inside…

Read More

Secure Islands IQProtector Data Interceptor for MS Exchange

Email has become the most heavily used application in the enterprise. High volumes of emails are sent and received all day long between employees and a very wide array of recipients. Emails can carry a variety of data, often…

Read More

Secure Islands IQProtector Data Interceptor for Application Servers

IQProtector Data Interceptor for Application Servers employs Secure Islands’ breakthrough persistent, active data-immunization technology to classify and protect all information created or used on private and public servers with attributes that persist throughout the entire information lifecycle. The data…

Read More

Secure Islands IQProtector Bridge

Secure Islands’ IQProtector Bridge boosts IT and business-process software productivity while maintaining classification and protection of data. Complete the form to download this resource in full.

Read More

Secure Islands IQProtector Scanner for File Stores

IQProtector Scanner crawls through legacy data files of any file type on network shares and file stores such as NAS, SAN, SharePoint, and more, identifying, classifying and protecting valuable data automatically, based on content and context, and according to…

Read More

Secure Islands Data Security for the Financial Sector

With daily news of damaging cyber attacks, data leakage, tightening regulatory restrictions, and increased sensitivity to reporting liabilities – clients of financial organizations are asking tough questions about how exactly to secure their sensitive data and privacy. This growing…

Read More

Secure Islands IQProtector Express

To meet compliance and industry data security regulations – like PCI, HIPaA, the EU Data Protection Directive or ISO 27001 – and to defend business assets, organizations must be able to identify sensitive information and protect it. Assuring that…

Read More

Secure Islands IQProtector Custom Data Interceptor

Data is most effectively classified and protected right at the source – at the point of creation or first access – before it can be exposed. To immunize data immediately at the point of creation, Secure Islands offers scalable…

Read More

Secure Islands IQProtector Enterprise

The risk of data loss hovers over every enterprise. As digitization increasingly permeates business, R&D, service and other vital processes, more and more critical and confidential data is accessible to a wider audience of users including employees, partners and…

Read More

PKWARE Data Center Performance Guide

We recently surveyed our customers on ways to get the best performance out of their data center environments. We got an earful! It wasn’t a surprise that the most common theme in the data center was optimization and reducing…

Read More

PKWARE Open Systems Security Guide

Servers provide the basis for sharing and moving information throughout the enterprise, as well as with external business partners. Every day, a staggering amount of data flows through the data center, much of it is sensitive in nature. When…

Read More

PKWARE Mainframe Security Guide

In this guide, we will dispel some of the common myths associated with System z cryptographic facilities and explore encryption strategies that ensure data is protect- ed not only on the mainframe but as it moves to other computing…

Read More

PKWARE Desktop Security Guide

Focusing only on perimeter security is a battle better suited for bygone times. Nowadays, sensitive data regularly moves from platform to plat- form and from endpoint to endpoint, inside and outside the organization. Some take the approach of securing…

Read More

PKWARE SecureZip DLP Deployment Kit Overview

The SecureZIP DLP Deployment Kit allows organizations to inspect attached encrypted files sent via email and identified by DLP systems prior to them leaving the organization; reducing the risk of non-compliance. As encrypted files attached to email are flagged…

Read More

PKWARE Persistant Data Protection Overview

PKWARE solutions provide persistent data protection for organizations concerned about security throughout the data lifecycle. More than 30,000 PKWARE customers deploy protection on endpoints, servers or through SDKs that follows the data itself. Business partners also choose PKWARE’s Smart…

Read More

PKWARE Tip Sheet

Discover the 7 easy ways to meet and exceed compliance. Secure what is most valuable, remove reliance on SSL and TLS, scramble all pan, protect before you send, hide the keys, split control over keys and prevent “runaway” crypto….

Read More

PKWARE Pkzip and Securezip V15 Datasheet

Controlling escalating data center costs is one of the top concerns of IT executives today regardless of whether the data center is in a physical or cloud environment. There is constant pressure to do more with less and strict…

Read More

PKWARE Major U.S. Bank Case Study

The bank needed to meet PCI DSS compliance requirements, which required them to protect credit card data as it is transmitted, processed, and/or stored. Meeting these compliance requirements would impact several processes throughout their organization. The bank initially set…

Read More

PKWARE Top Ranked Financial Services Institution Case Study

The company’s business goals for this project focused on aligning with requirements for secure data storage and exchange with customers like CVS, Target®, Office Depot® and Discover® Financial, without introducing inefficiencies that would negatively impact those existing business relationships….

Read More

PKWARE Institute for Social and Economic Research Case Study

The ISER’s business goals are centered on securing sensitive research data. Understanding Society studies the socio-economic circumstances and atti- tudes of 100,000 individuals in 40,000 British households. The study also cap- tures biomedical data on 20,000 participants and places…

Read More

PKWARE Healthcare Services Provider Case Study

The prognosis was grim for Ron’s healthcare products. As CIO for a growing, Midwest-based healthcare specialty software vendor, Ron* faced increasing demand from his hospital system customers to add encryp- tion for enhanced security and sharing in its Electronic…

Read More

PKWARE Healthcare Customer Case Study

The company wanted a solution to further its commitment to data privacy and security while ensuring compliance, enhancing processes, encrypting unstructured data and improving overall operations as a private cloud serviceoriented architecture provider. With an expansive client and partner…

Read More

PKWARE Global Bank Case Study

That was the question Param asked his team of security architects at a top-5 global bank after they realized millions of monthly emails and messages went through applications and infrastructure without any insight. Data was streaming in and out…

Read More

PKWARE Food and Beverage Company Case Study

When the company first contacted PKWARE, they were using WinZip® for desktop data compression, but when WinZip was acquired by Corel and began aggressively changing their licensing policies, it was forced to deal with the prospect of large ongoing…

Read More

PKWARE CMS Case Study

The numbers were staggering…years worth of sensitive data about every Medicare and Medicaid recipient ex- changed with hundreds of partner organizations with zero tolerance for security breaches. This posed a significant challenge for the Centers for Medicare & Medicaid…

Read More

Nlyte for ServiceNow ITSM Datasheet

Data center service management (DCSM) products such as Nlyte for ServiceNow ITSM bridge the often-overlooked divide in IT organizations, enabling enterprises to maintain accurate, up-to-the minute information about their IT and data center assets, streamline their processes and improve…

Read More

Nlyte for HP ITSM Datasheet

Data center service management (DCSM) products such as Nlyte for HP ITSM bridge the often-overlooked divide in IT organizations, enabling enterprises to maintain accurate, up-to-the minute information about their IT and data center assets, streamline their processes and improve…

Read More

Nlyte for BMC ITSM Datasheet

Data center service management (DCSM) products such as Nlyte for BMC ITSM bridge the often-overlooked divide in IT organizations, enabling enterprises to maintain accurate, up-to-the minute information about their IT and data center assets, streamline their processes and improve…

Read More

Nlyte BMC ADDM Connector Datasheet

When it comes to data center infrastructure management, you want your modeled assets to match the reality of your data center. In order for you to manage your data center assets, you need to know what you have. Traditionally,…

Read More

Nlyte Configuration Management Datasheet

Configuration Management Databases (CMDBs) are frequently out of date, difficult to maintain, and heavily dependent on network discovered assets. The asset information contained in them is usually limited to cursory Configuration Item (CI) attributes that don’t go very far…

Read More

Nlyte Alarms Datasheet

Configuration Management Databases (CMDBs) are frequently out of date, difficult to maintain, and heavily dependent on network discovered assets. The asset information contained in them is usually limited to cursory Configuration Item (CI) attributes that don’t go very far…

Read More

Nlyte Alarms Datasheet

For real-time data collection, facilities & environmental alarms, now IT and Facilities staff can better monitor, manage and quickly react to physical IT infrastructure managed by the Nlyte data center infrastructure management (DCIM) solution. In the event of a…

Read More

Nlyte SSE Case Study

Increasing demands from the business for more and more IT services accompanied by an on-going program of acquisition, made it apparent that SSE’s two existing data centres would soon run out of capacity and reach the end of their…

Read More

Nlyte Retail Big Box Case Study

When this home improvement giant opened its fourth data center, it realized its DIY solution for data center infrastructure management could no longer do the heavy lifting it needed. While its four data centers were geographically dispersed nationally, it…

Read More

Nlyte PNC Case Study

National City Corp. hired a General Manager of Data Center Operations to manage and optimize all of its data centers. “It quickly become apparent that we needed a new system for managing space, power, and cooling,” they explained. “Like…

Read More

Nlyte Canon Case Study

Before Nlyte was deployed, Canon was using spreadsheets to track their physical infrastructure – managed by various teams. Across the two data centers there were Windows, Unix. Applications and Networking teams, all with their individualized spreadsheets. Quite frankly, there…

Read More

Nlyte Global Technology Company Case Study

Over the past decade, this technology giant experienced exponential growth to become one of the world’s largest companies. Attempting to keep up with the blistering pace of its own expansion, the client deployed data center resources around the world…

Read More

Nlyte Computacenter Case Study

Computacenter first started to think about data centre infrastructure management (DCIM) when the company acquired Digica (a provider of data centre services). Digica focused on providing SAP outsourcing services and had data centres in Warrington, Leeds and Nottingham plus…

Read More

Nlyte Banking Industry Case Study

When this banking behemoth acquired a major Wall Street brokerage firm during the financial crises of 2008, it quickly started consolidating technology systems to ensure the success of the combined companies. Largely, that meant migrating the brokerage firm from…

Read More

Nlyte On-Demand Product Brief

As the recognized data center infrastructure management (DCIM) category founder, Nlyte Software has been providing solutions with a focus on the business aspects of data center asset management since 2004. With 10 years of experience deploying our software in…

Read More

Nlyte DCIM Datasheet

The main challenge for DLLR was transferring sensitive data in a secure and reliable fashion. In addition, each DLLR “trading partner” required different file formats such as fixed width, Excel, CSV or the increasingly popular XML format. It was…

Read More

Linoma State of Maryland DLLR Case Study

The main challenge for DLLR was transferring sensitive data in a secure and reliable fashion. In addition, each DLLR “trading partner” required different file formats such as fixed width, Excel, CSV or the increasingly popular XML format. It was…

Read More

Linoma Integra Bank Case Study

Integra Bank (NASDAQ – IBNK) needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and…

Read More

Linoma IDB Swiss Bank Case Study

Like many financial companies that take their responsibilities for data security very seriously, we decided to encrypt our data backups to protect sensitive customer and bank data. Complete the form to download this resource in full.

Read More

Linoma Dayton Parts Case Study

As a manufacturer and distributor of thousands of parts for light and heavy- duty trucks, Dayton Parts’ primary focus is on their customers. They know that sending personalized price sheets to their valued customers on a regular basis is…

Read More

Linoma Field-Level Encryption Case Study

Data encryption has taken on a much larger role in IT departments ever since the protection of sensitive and confidential information became a high priority for so many companies. We hear a lot of complaints about regulatory compliance, but…

Read More

Linoma Crypto Complete Brochure

Crypto Complete protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Crypto Complete allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. This innovative solution…

Read More

Linoma Go Anywhere Secure Mail Brochure

The Secure Mail module in GoAnywhere MFTTM allows employees and other authorized users to easily send files (packages) to other individuals whenever they need to. Because it is much more secure than traditional email, and doesn’t limit the file…

Read More

Linoma Go Anywhere Managed File Transfer Brochure

GoAnywhere MFTTM is an enterprise-level solution which can manage all of your organization’s file transfer needs through a single interface. With extensive security controls and detailed audit trails, GoAnywhere MFT will help your organization comply with data privacy regulations…

Read More

Linoma Go Anywhere Brochure

GoAnywhere GatewayTM provides an additional layer of security when exchanging data with your trading partners. It allows you to keep file sharing services (e.g. FTP/S, SFTP, HTTP/S servers) and documents safely in your private/internal network. With GoAnywhere Gateway, no…

Read More

Linoma Go Drive Brochure

GoDrive by GoAnywhereTM is an on-premise solution that provides Enterprise File Sync and Sharing (EFSS) services for your employees and partners. Starting with 10 FREE Users, GoDrive files and folders are easily shared between users with advanced collaboration features…

Read More

iSheriff Disrupting The Cybercrime Exploration Life-Cycle

iSheriff disrupts the malware exploitation life-cycle to provide unique threat protection and visibility, delivering more effective threat detection and remediation than traditional perimeter and host-based security models. Complete the form to download this resource in full.

Read More

iSheriff Cloud Security Datasheet

iSheriff is the industry’s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies. Complete the form to download this resource in…

Read More

iSheriff Web Security Datasheet

iSheriff Web Security is a cloud-based Internet filtering and Web 2.0 security service. It provides your users with a safe and secure Internet connection, protected from threats and malware, while ensuring that Web browsing is appropriate and complies with…

Read More

iSheriff Management Console Designed For Managed Service Providers Datasheet

Running an MSP can often be described as “having a large number of irons in the fire without knowing the number of irons, and the constant chance for a few fires to go out of control.” So anytime a…

Read More

iSheriff Endpoint Security Datasheet

The iSheriff Endpoint Security Service is a cloud-based Endpoint Security platform offering advanced anti-malware technology that protects your organization’s endpoint devices from malware, secures & controls applications being used by end users and protects against threats from removable media…

Read More

iSheriff Email Security Datasheet

iSheriff Email Security is a cloud-based anti-spam and email threat protection service. It rids your organization’s email of spam, providing a clean email connection and secures against viruses, blended threats, unwanted content and confidential data leakage. Complete the form…

Read More

iSheriff Safesite Inc. Case Study

Safesite’s three member IT team manages the company’s 45 computer work stations that are used by 110 employees. According to Jon Frank, Safesite’s IT manager, although the information the company stores for customers is paper- based, the security over…

Read More

iSheriff RHWL LLP Case Study

RHWL employees are quite mobile, working in many off-site locations that are unconnected to the firm’s network. When employees work out-of-network it can pose online security risks, such as increased exposure to viruses, malware, and data breaches. Dave Allerton,…

Read More

iSheriff ITEX Case Study

ITEX corporate headquarters is located in Bellevue, Washington, and there are 90+ franchise locations across the United States and Canada. 24,000 members comprise the ITEX marketplace; the franchise offices manage those members and facilitate transactions, while corporate headquarters oversees…

Read More

iSheriff Integrated Business Technology Case Study

Mr. Long needed an Internet security solution that would keep his clients’ machines safe from cyber attacks and computer viruses, and be easy for him to manage. Mr. Long’s previous security software had not performed adequately and thus needed…

Read More

iSheriff AAA Ambulance Case Study

Mr. McDonald needed a solution to protect AAA from malware, spam, and viruses. Remote stations needed monitoring to not only ensure security but also keep workers in those areas productive by enforcing acceptable use policies for Internet browsing. In…

Read More

Ipswitch File Transfer Products Overview Datasheet

Ipswitch products meet the file transfer needs of any organization from small and departmental to global 2000 companies. Millions of users and tens of thousands of companies globally use WS_FTP Server and MOVEit Managed File Transfer to transfer large…

Read More

Ipswitch MOVEit Mobile Datasheet

MOVEit Mobile enables mobile workers to reliably and productively participate in file-based business process workflows, while providing IT the security, visibility and control required to confidently run their business and meet compliance requirements. Complete the form to download this…

Read More

Ipswitch MOVEit File Transfer (DMZ) High Availability and Scalability Datasheet

MOVEit File Transfer has a flexible architecture designed for high availability systems and via integration with Neverfail IT Continuity Engine supports disaster recovery and failover configurations. It can be deployed on two or more systems and in various configurations…

Read More

Ipswitch MOVEit File Transfer (DMZ) Secure File Transfer Server Datasheet

MOVEit File Transfer (DMZ) is a secure File Transfer server for mission-critical data transfers. It delivers fast time-to- value and increased efficiency while meeting strict SLAs, compliance mandates and security requirements. It also lets companies manage and govern the…

Read More

Ipswitch MOVEit Cloud Datasheet

More and more business critical information moves electronically between employees, customers, partners, and applications. IT professionals need solutions that move files efficiently, securely, and reliably to get work done. Managing infrastructure for business processes means IT teams face challenges…

Read More

Ipswitch MOVEit Central Datasheet

MOVEit Central provides a simple but powerful user interface for defining business workflows that’s easy enough for anyone on your IT team to use because no scripting is required. The heart of MOVEit Central is a reliable engine that…

Read More

Ipswitch Failover Datasheet

Ipswitch Failover delivers zero downtime, no data loss, and unified failover management by maximizing availability of MOVEit Managed File Transfer with automated failover. Complete the form to download this resource in full.

Read More

Ipswitch File Transfer Datasheet

File transfer is integral to business processes, yet many businesses are at risk with their existing file transfer processes. File transfer systems are not integrated with existing IT security infrastructure, it’s impossible to control or audit transfers, and files…

Read More

Ipswitch Analytics Datasheet

Ipswitch Analytics is a flexible reporting and monitoring solution for MOVEit Managed File Transfer that ensures reliable, cost-effective, and auditable file transfers between employees, customers and trading partners. Whether you want to improve end-to-end performance and reliability, enable end-users…

Read More

Ipswitch Pharmaceutical Case Study

The pharmaceutical industry is highly regulated – and highly competitive – and secure transfer of confidential and proprietary data is imperative. For one major pharmaceutical company – with hundreds and products and operations around the globe, secure file transfer…

Read More

Ipswitch Hermes Case Study

With awareness of data breaches at an all-time high, financial institutions are working hard to implement policies and solutions that protect sensitive financial information along with their reputations and industry competitiveness. In today’s digital world, critical financial data is…

Read More

Ipswitch The City of Guelph Case Study

Guelph is a mid-sized city in southwestern Ontario which consistently ranks among Canada’s best places to live. With 2,000 employees serving Guelph’s citizens from City Hall and 40 satellite offices that provide police, fire, emergency medical, public works, transit,…

Read More

Ipswitch Enterasys Case Study

Enterasys is the Network Infrastructure and Security Division of Siemens Enterprise Communications GmbH &Co KG, a leading provider of switching, routing and security products. With thousands of customers, partners and employees working together in more than 80 countries worldwide,…

Read More

Globalscape Facilitating Enterprise Compliance Whitepaper

Globalscape’s Enhanced File TransferTM (EFTTM) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper…

Read More

Globalscape Mobile is the New Normal for Conducting Business Whitepaper

These are trying times for IT organizations—particularly when it comes to resolving conflicting demands for security and convenience. IT organizations are being pulled in two different directions: On one side, increasing regulatory compliance and governance mandates require that businesses…

Read More

Globalscape Protecting Payment Information with PCI DSS Version 3 Compliance Whitepaper

When a string of large-scale, high-profile retail data breaches hit last year, credit card data security stole the national spotlight and remains prominent in the minds of many consumers and industry leaders now. How can businesses better fortify their…

Read More

Globalscape Reducing the Costs and Risks of Email Attachments Whitepaper

Email is the main collaboration and communications tool in most businesses today. When users want to share files internally or with customers, partners, and others outside the businesses, they typically use email attachments. This paper discusses how companies can…

Read More

Globalscape Facilitating Enterprise Compliance Whitepaper

Globalscape’s Enhanced File TransferTM (EFTTM) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper…

Read More

Globalscape High Availability Clustering Whitepaper

Businesses count on consistent, dependable access to their mission- critical resources and applications. They rely upon systems such as managed file transfer (MFT) solutions to ensure the security and integrity of these assets and to facilitate uninterrupted processes and…

Read More

Globalscape Protecting Digitalized Assets in Healthcare Whitepaper

The digitization of information has had a tremendous influence on organizations in every sector, but most especially on healthcare. Doctors, nurses, clinicians, and other professionals are increasingly relying on digital file sharing solutions and electronic health records (EHRs) to…

Read More

Globalscape Enterprise Mobility Management 101 Whitepaper

The greatest thing about enterprise mobility is that it empowers employees to be more productive – from anywhere and at any time. Mobility offers that freedom and flexibility so that an employee will no longer need to be tethered…

Read More

Globalscape Multifactor Authentication Whitepaper

The classic username+password authentication to an account is only as secure as the security and complexity of the password. Passwords can be stolen or forgo?en, and can place an unnecessary burden on support departments to reset passwords or to…

Read More

Globalscape Three Ways System Downtime Affects Companies and Four Methods to Minimize It Whitepaper

Downtime happens. Every organization experiences it with today’s unpredictable IT environments. However, the frequency of downtime, and the duration that critical systems are unavailable has become far too acceptable to organizations these days. A recent Globalscape survey of 283…

Read More

Globalscape Dangerous File-Sharing Whitepaper

This report covers the unsanctioned tools that employees use to share sensitive company information, the security, compliance, and governance risks to enterprises, why most IT policies and company-provided tools come up short and steps for reigning in the risky…

Read More

Globalscape Managed File Transfer: Can your business thrive without it? Whitepaper

With so many different moving parts involved in running a successful organization, the last thing you want to do is to put all of that at risk by either not using a managed file transfer (MFT) solution OR by…

Read More

Globalscape WAFS Whitepaper

Relying on person-to-person file transfers or email attachments between users is risky for essential business processes and cumbersome for users. IT organizations want to have a way to enable users to collaborate on documents across wide area networks (WANs)…

Read More

Globalscape Managed File Transfer Buyers Guide Whitepaper

When it comes to managed file transfer, the success of your operation hinges on maximizing productivity and security, while maintaining top- notch compliance—anything less undermines your ROI. And despite the wide offering of managed file transfer (MFT) products on…

Read More

Globalscape Mail Express Datasheet

EFT is offered in six different bundles or “tiers,” as described below. The tiers are organized to meet the needs of small, medium, and enterprise businesses. You are not locked in to these specific groupings. For example, if SMB…

Read More

Globalscape Enhanced File Transfer (EFT) SMB and Enterprise Datasheet

EFT is offered in six different bundles or “tiers,” as described below. The tiers are organized to meet the needs of small, medium, and enterprise businesses. You are not locked in to these specific groupings. For example, if SMB…

Read More

Globalscape Wide Area File Services (WAFS) Datasheet

Globalscape® MIX enables your organization to securely exchange business- to-business data, including large files and sensitive data. This hosted managed file transfer (MFT) service integrates Globalscape’s market- leading Enhanced File TransferTM (EFTTM) solution with proven infrastructure from top hosting…

Read More

Globalscape Managed Information Xchange (MIX) Datasheet

Globalscape® MIX enables your organization to securely exchange business- to-business data, including large files and sensitive data. This hosted managed file transfer (MFT) service integrates Globalscape’s market- leading Enhanced File TransferTM (EFTTM) solution with proven infrastructure from top hosting…

Read More

Globalscape Mobile Transfer Client Datasheet

IT departments everywhere are faced with an increasingly difficult balancing act between providing their organization’s employees with access to corporate data from their mobile device, and keeping corporate data from falling into the wrong hands. If corporate policy favors…

Read More

Globalscape Active-Active High Availability with EFT Datasheet

Meet Those “Five-Nines” SLAs! With active-active configuration and horizontal scalibility you can configure a network that is available without interruption. When you bring a node down for upgrades or patches, the other nodes continue to process transactions, meeting those…

Read More

Globalscape Security Solutions Datasheet

Globalscape supplies security? solutions to the majority of the Fortune 100 companies, many of them running our managed file transfer solu?ons in mul?ple, globally dispersed datacenters. Complete the form to download this resource in full.

Read More

Globalscape Web Transfer Client Datasheet

Globalscape’s Enhanced File TransferTM (EFTTM) offers a thin client, the Web Transfer Client (WTC), which can be used by any trading partner using virtually any modern Web browser to exchange files. The WTC lowers costs and increases flexibility for…

Read More

Globalscape Enhanced File Transfer (EFT) SMB Datasheet

Enhanced File TransferTM (EFTTM) SMB, designed for small-to-medium businesses, enables your organiza?on to securely manage file transfers among worldwide offices, clients, and partners, ensuring that data confiden?ality and integrity are preserved during transport and storage. Our best-in-class managed file…

Read More

Globalscape OpenPGP Module FAQ Datasheet

Encrypt file transfers with the Globalscape® EFTTM OpenPGP module. Complete the form to download this resource in full.

Read More

Globalscape Enhanced File Transfer Datasheet

Offering unsurpassed customiza?on, EFTTM Enterprise is the managed file transfer solu?on used and trusted by the U.S. Army, Fortune 100 companies, and businesses around the world. With opera?onal efficiency in mind, EFT Enterprise features quick and intui?ve setup, advanced…

Read More

Globalscape Content Integrity Control (CIC) Module Datasheet

Enhanced File Transfer (EFT) is Globalscape’s best-in-class, customizable managed file transfer so?ware and a leader in Gartner’s Magic Quadrant for MFT. Companies of all sizes (including the US Army) use EFT, trus?ng its unmatched simplicity and top-notch security. EFT’s…

Read More

Globalscape scConnect Security Datasheet

These days, your digital content can be stored on your desktop computer, work laptop, and servers—pre?y much everywhere. However, that content can be tough to find, difficult to access, and impossible to share with colleagues when you are away…

Read More

Globalscape scConnect Datasheet

These days, your digital content can be stored on your desktop computer, work laptop, and servers—pre?y much everywhere. However, that content can be tough to find, difficult to access, and impossible to share with colleagues when you are away…

Read More

Globalscape RBFCU Enhanced File Transfer Case Study

RBFCU’s vice president of Information Systems, Charles Beierle, sought an easier way to send sensitive files both inside the organization and externally to vendors. Like many financial institutions, RBFCU had a number of vendors with whom they needed to…

Read More

Globalscape AON EFT Case Study

The Human Capital division of Aon Corporation needed a better way to automate their data processes. Its existing system had proven difficult to manage and time consuming to modify. Even simple changes or additions to automated processes required a…

Read More

Digital Guardian A Day in the Life of Your Sensitive Data Infographic

See how we protect your sensitive data every minute of the day. Complete the form to download this resource in full.

Read More

Digital Guardian For Windows Datasheet

Microsoft Windows® is the most widely deployed operating system in the world, and consequently the most vulnerable to security threats. Critical patches and security updates are issued frequently, but this reactive approach leaves you poorly equipped to defend your…

Read More

Digital Guardian Savant Protection Application Whitelisting Datasheet

Application whitelisting adds a critical layer of defense against evolving threats such as zero-day attacks that endpoint anti-malware frequently fail to detect. But most of today’s whitelisting products are too difficult to deploy, time-consuming to manage, and reliant on…

Read More

Digital Guardian Management Console Datasheet

The Digital Guardian Management Console (DGMC) is your web-based command center within our Digital Guardian data- centric security platform. It enables you to create and manage policies, alerts, and reports. Data use policies that you configure in the DGMC…

Read More

Digital Guardian Managed Security Program (MSP) Datasheet

Digital Guardian MSP service offerings align with our product offerings to address your organization’s unique requirements. Start with DG for Data Visibility and Control for out-of-the-box visibility and device control. Choose DG for DLP to get everything you need–full…

Read More

Digital Guardian Data Protection Integration with FireEye Datasheet

Digital Guardian is a scalable platform that protects intellectual property and other sensitive data against insider threats and outsider malware attacks. Digital Guardian provides visibility into data movement to detect malware and it provides controls to prevent malware from…

Read More

Digital Guardian Data Protection for Law Firms Datasheet

In 2011 over 80 US-based law firms reported system breaches, many resulting in the loss of sensitive client data. According to the FBI, the biggest threat is corporate espionage targeting firms that represent companies on securities, intellectual property, and…

Read More

Digital Guardian Visibility Study Datasheet

Digital Guardian offers the industry’s only on-demand data visibility study powered by the proven, patented Digital Guardian platform. This service is appropriate for virtually every organization with proprietary or regulated data; it is designed to provide actionable intelligence on…

Read More

Digital Guardian Data Loss Prevention Datasheet

Breaches are inevitable, losing data is not. Digital Guardian for Data Loss Prevention gives you everything you need – the deepest visibility, the fine-grained control and the industry’s broadest data protection coverage – to stop sensitive data from getting…

Read More

Digital Guardian Data Protection for Citrix ShareFile Datasheet

Many IT organizations want a secure alternative to consumer-style file sharing services. Enterprises need full control over their data while maintaining productivity, by providing users with mobile access to information and synchronizing data across all devices. Citrix ShareFile is…

Read More

Digital Guardian USDHS Continuous Diagnostics & Mitigation Datasheet

In 2014, the US Department of Homeland Security issued a task order for Continuous Diagnostics and Mitigation (CDM) tools. This program “moves away from historical compliance reporting toward combating threats to the nation’s networks on a real- time basis.”…

Read More

Digital Guardian Data Protection Integration With HP ArcSight Datasheet

The HP ArcSight Security Intelligence platform is a unified security solution that helps safeguard businesses by giving complete visibility into activity across the IT infrastructure, including outsider threats such as malware and hackers, insider threats such as data breaches…

Read More

Digital Guardian Advanced Threat Protection Datasheet

Attacks are inevitable. With the proper protocols and tools in place, you can spot and contain breaches before sensitive data gets out. Complete the form to download this resource in full.

Read More

Digital Guardian Add-On Modules Datasheet

Digital Guardian offers a suite of add-on modules that provide advanced encryption, extend your protection to the network and more. Complete the form to download this resource in full.

Read More

Digital Guardian Multibilion-Dollar Global Financial Services Firm Case Study

The investment banking division of the organization investigates and evaluates possible mergers and acquisitions. Each of these strategic deals can be worth billions of dollars, and information and analysis supporting each individual deal is highly confidential. Even the formulas…

Read More

Digital Guardian Multi-National Banking Company Case Study

With over 50 million credit card customers around the world, the company was subject to the Payment Card Industry Data Security Standards (PCI-DSS). The standards require that sensitive credit card information be encrypted at rest, and that access to…

Read More

Digital Guardian Large Managed Healthcare Provider Case Study

The organization had strong network defenses, but also many mobile users. A Virtual Private Network (VPN) was in place, but users were not diligent in using it. Enforcing controls on users that were not connected to the network was…

Read More

Digital Guardian Luxury Sports Car Manufacturer Case Study

The team’s designs are developed and tested at their research center in Europe. Data is also on laptops at race venues around the world. The large amount of data processing equipment used required the team to travel with not…

Read More

Digital Guardian Jabil Manufacturing MSP Case Study

When Graham joined Jabil in 2013, a comprehensive security review revealed that Jabil had 52,000 workstations that were secured, but not at the levels the security team thought appropriate given the risks. Should a security breach leak a customer’s…

Read More

Digital Guardian Global Pharmaceutical Company Case Study

For each new drug produced, pharmaceutical companies require hundreds of researchers, scientists, and clinical trial organizations to work together efficiently. Delays in time-to-market erode revenues and profits.Any solution that helped monitor and control this company’s IP must not impede…

Read More

Digital Guardian Global 100 Technology Conglomerate Case Study

The company was concerned that identifying critical data would be difficult. As a technology manufacturer, it used many types of software in the design process, including source code for its software, 3-D computer-aided design and simulation software, and proprietary…

Read More

Digital Guardian Fortune 100 Manufacturer Case Study

The staggeringly high number illustrates the high cost of stolen IP. The event prompted an initiative to introduce risk management measures to guard against an incident of this kind happening again. The project, initially conceived as a response to…

Read More

Digital Guardian Energy Division Case Study

The company had over 40,000 employees in locations around the world who required access to the IP. Their infrastructure included desktops, laptops, Windows® Servers and Fileshares, as well as virtual environments. The IP was used in multiple applications, including…

Read More

Digital Guardian Fortune 1000 Manufacturer Case Study

Managing desktops can be a challenge given the rise of spear phishing attacks, couple that with multiple users on a single machine and you have a potential for rapid system drift. This drift opens the door to malware, or…

Read More

Digital Guardian ITAR Case Study

The aerospace client had worldwide operations and was a major supplier to the Department of Defense. It shared sensitive information in multiple formats with its supply chain. As a defense contractor, some, but not all of the data they…

Read More

Centrify Identity Service, Mac Smart Card Edition Datasheet

Centrify Identity Service, Mac Smart Card Edition enables IT administrators to manage and secure Mac OS X systems using existing tools and processes so that Macs become a security peer to Windows systems. Centrify extends its proven Centrify for…

Read More

Centrify Server Suite Datasheet

Whether working to mitigate the risks of insider threats and advanced persistent threats, or to meet PCIDSS, SOX or other industry mandates and government regulations in an increasingly multi-platform and cloud- based environment, IT organizations require a unified identity…

Read More

Centrify Privilege Serivce Datasheet

IT organizations are increasingly required to manage hybrid deployments that combine cloud-based and data center infrastructure. IT admins, both internal and outsourced, need to login from inside and outside of the corporate perimeter. In order to meet these challenges,…

Read More

Centrify Identity Service, Enterprise Mobility Management Datasheet

Centrify Identity Service offers an easy-to-deploy, cloud-based service that enables centralized and secure mobile device management using existing directory service infrastructure. It provides single sign-on to cloud, on-premises and mobile apps on from mobile devices, as well as multi-factor…

Read More

Centrify Identity Service, Mac Edition Datasheet

With Centrify Identity Service, Mac Edition, organizations can manage and secure Macs with the same tools they use to manage PCs. In addition, Centrify extends your management and security infrastructure into the cloud and also lets Apple iOS and…

Read More

Centrify Identity Service Datasheet

Centrify Identity Service uniquely unifies cloud app and mobile management into an enterprise cloud service. Centrify leverages identity to secure and manage users’ access to applications from any device, regardless of location. Complete the form to download this resource…

Read More

Centrify Server Suite, Standard Edition Datasheet

Centrify Server Suite, Standard Edition, centralizes authentication and privileged user access across disparate systems and applications by extending Active Directory-based authentication, enabling use of Windows Group Policy and single sign-on. Complete the form to download this resource in full.

Read More

Centrify SBA Communications Case Study

When SBA Communications began using SaaS-based apps like Innotas, ExpenseWatch and Yammer, they implemented Microsoft’s Active Directory Federation Service (AD FS) at an approximate total cost of $35,000 for identity management. While implementation and application integration proved challenging, the…

Read More

Centrify Ouachita School District Case Study

As part of a process to replace a legacy email system with Microsoft Office 365, the Ouachita school district was looking to incorporate a single sign-on (SSO) solution that would facilitate the transition to Active Directory for user authentication…

Read More

Centrify National Weather Service Case Study

In order to adhere to HSPD-12 regulations, government agencies like NOAA are required to use Common Access Cards (CAC cards) for two-factor authentication across all machines within the environment including Windows, Linux and Mac. This requirement extends to all…

Read More

Centrify Morris Communications Case Study

When Morris Communications decided to migrate from on-premises Office to Office365, Arup Chakraborty, Solution Architect at NIIT Technologies Limited, began looking for a solution that could provide the identity federation services required. If he could identify a comprehensive solution…

Read More

Centrify Interval International Case Study

A period of rapid organic growth combined with a series of acquisitions made it apparent to Interval International that their infrastructure was in need of an upgrade. “Our data center was mostly Windows with a small number of Linux…

Read More

Centrify Essendon Volkswagen Case Study

Nearing the end of a contract that outsourced the community services ELC supervised, the company decided to bring the services in house and offer them directly to the public. It was a large undertaking that would require nearly 100…

Read More

Centrify ELC Case Study

Nearing the end of a contract that outsourced the community services ELC supervised, the company decided to bring the services in house and offer them directly to the public. It was a large undertaking that would require nearly 100…

Read More

Centrify Identity Management Case Study

Until recently, CAA was using an in-house-developed, legacy application that required Internet Explorer 8 to manage access to 200 websites used for a variety of core business activities. But because the application hadn’t been adequately maintained and updated over…

Read More

Centrify Morehouse College Case Study

In the process of upgrading traditional user apps to cloud solutions — including the replacement of Microsoft Exchange with Office 365 — Morehouse College CIO Clifford Russell knew that multiple new log-ins would be challenging for staff, faculty and…

Read More

Centrify HIPAA Case Study

Apttus is a cloud-based company with a very small on-site infrastructure — virtually all of its server and storage needs are met in the cloud. Salesforce, NetSuite, Concur, Dropbox, Office 365 and other SaaS apps comprise the majority of…

Read More

Boldon James Classifier 360 Whitepaper

Data classification enables organisations to add context to the unstructured information that they hold in messages, documents and files. This classification context allows the organisation to focus protection on the more sensitive data and ensure safe sharing whilst also…

Read More

Boldon James User Driven Classification Whitepaper

With ever-increasing volumes of data to handle, the proliferation of communication channels, a wide range of security threats and the need to provide ready access to systems for customers and partners, organisations need to find more effective ways to…

Read More

Boldon James Data Protection Presentation

An overview presentation of ‘Putting Data Classification at the Foundation of Data Protection’. Complete the form to download this resource in full.

Read More

Boldon James SharePoint Presentation

An overview presentation of Sharepoint: information security’s wakest link? by Martin Sugden of Boldon James. Complete the form to download this resource in full.

Read More

Boldon James Exchange Classifier Datasheet

With new data protection legislation on the horizon and data breaches an ever-growing threat, it’s no longer enough for organisations to rely solely on endpoint solutions to ensure that sensitive data is handled appropriately and consistently through its journey…

Read More

Boldon James Mobile Classifier Datasheet

With an increasing variety of mobile devices in use in modern workplaces, IT teams are challenged not only by the complexity of managing diverse platforms, but also by the security risks present when personal and corporate data co-exist on…

Read More

Boldon James SharePoint Classifier Datasheet

Organisations are increasingly adopting Microsoft SharePoint® for collaboration and document management. As a result, large volumes of sensitive information are now concentrated in these systems, requiring users to be increasingly conscious of the security and safeguarding requirements of this…

Read More

Boldon James Power Classifier Datasheet

Classification provides a means for organisations to organise and extract value from unstructured information. Most organisations already possess a substantial legacy of unstructured data and the Big Data phenomenon has resulted in an exponential rise in the volume of…

Read More

Boldon James OWA Classifier Datasheet

Email is the primary collaboration tool in most organisations, so it’s no surprise that it’s a common source of information leakage, with most data loss caused by user negligence. Boldon James OWA Classifier puts labelling at the heart of…

Read More

Boldon James Office Classifier Datasheet

Processes used to control the distribution of sensitive documents were mostly created in a paper-based world. Updating these controls to cope with the increased risk of data loss presented by email and document processing systems presents a significant challenge….

Read More

Boldon James Notes Classifier Datasheet

Email is the primary collaboration tool in most organisations, so it’s no surprise that it’s a common source of information leakage, with most data loss caused by user error. Boldon James Notes Classifier puts labelling at the heart of…

Read More

Boldon James File Classifier Datasheet

Organisations face the problem of controlling sensitive information that is held in a rapidly expanding range of different electronic formats – from the humble text file through to image files, PDFs and CAD documents. Without the ability to apply…

Read More

Boldon James Email Classifier Datasheet

Email is the primary collaboration tool in most organisations, so it’s no surprise that it’s a common source of information leakage, with most data loss caused by user error. Boldon James Email Classifier puts labelling at the heart of…

Read More

Boldon James Classifier Administration Datasheet

Classifier Administration is a unified management console for defining and applying Labelling policies to any part of your organisation, enabling these policies to operate at the heart of your data loss prevention strategy. The console is provided with the…

Read More

Boldon James Mobile Filter Datasheet

Many organisations provide mobile devices for their staff that permit roaming access to their corporate email. However, there are many situations in which it is undesirable to hold sensitive messages on such devices – the challenge being how to…

Read More

Boldon James User Driven Classification Datasheet

With ever-increasing volumes of data to handle, the proliferation of communication channels, a wide range of security threats and the need to provide ready access to systems for customers and partners, organisations need to find more effective ways to…

Read More

Boldon James Oil and Gas Classifier Customer Case Study

Resource Excerpt: The natural gas exploration and production industry relies heavily upon emails and large attachments that address a wide variety of commercially‐sensitive issues, including surveys, projected productions, financials, legal responsibilities and implications, etc. The client is a multinational…

Read More

Boldon James South West Fire and Rescue Customer Case Study

The Public Services Network (PSN) Code of Connection and the Cabinet Office Security Policy Framework (SPF) outlines standards, best‐ practice guidelines and approaches to protecting UK Government assets and requires organisations to have implemented a protective marking system. The…

Read More

Boldon James Allianz Customer Case Study

With this Group-wide focus on security best-practice, Allianz Ireland was aware that, in common with several other OEs, they needed to comply with Group standards for Data Classification. Although they had other compensating security controls (such as encrypting sensitive…

Read More

Boldon James Mobile Classifier Sales Flyer

Whilst enterprise mobility brings many benefits, it comes with an increased risk to sensitive data resulting from personal and corporate data being accessed from the same device. Although many organisations recognise the importance of data classification as part of…

Read More

Boldon James ITAR Fact Sheet

Protecting critical business data is a continual challenge for global aerospace and defense organizations. For those organizations in the defense and aerospace industries, it is paramount to ensure that sensitive data is protected and controlled in order to adhere…

Read More