UEBA for Compliance Whitepaper
SUPPORTING COMPLIANCE EFFORTS WITH USER & BEHAVIOR ANALYTICS UEBA (user & entity behavior analytics) has emerged as the most promising solution to rampant cyber threats and fraud because it allows security leaders to finally get ahead of attackers by…

Linoma Release Webinar
Join us for a FREE webinar to learn more about the major enhancements and how GoAnywhere MFT can be the all-in-one centralised solution for your organisation’s batch and ad hoc file transfers. Date: Thursday 5th May, 2016 Time: 2:00PM…

Office 365 Single Sign-On Whitepaper
For most organizations, the move to Office 365 is a leap forward in user experience, productivity, IT simplification, and savings. But organizations that fail to implement Single Sign-On (SSO) reliably can slip backwards in several key areas. Risk increases…

Linoma GoDrive by GoAnywhere Video
GoDrive is an on-premise solution that provides Enterprise File Sync and Sharing (EFSS) services for your employees and partners. Complete the form on this page to watch this video now.

Varonis – What We Do Video
Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of…

SSH HD Video
SSH HD Video. Complete the form on this page to watch this video now.

Nlyte Defines Data Center Infrastructure Management (DCIM) – Excitement Video
From the world leader in Data Center Infrastructure Management (DCIM) software focused on planning, managing and optimizing data centers. Complete the form on this page to watch this video now.

Digital Guardian: Security’s Change Agent Video
Digital Guardian: Security’s Change Agent video. Complete the form on this page to watch this video now.

PKWARE Data Security, Compression and Encryption at a Glance Video
PKWARE screen-saver presentation. PKWARE software enables businesses to reduce, secure and move data across the extended enterprise — from mainframes, servers, desktops, mobile devices and into the cloud. Since creating the ZIP standard, PKWARE continues to innovate with compression,…

iSheriff advert Video
iSheriff advert video. Complete the form on this page to watch this video now.

Ipswitch MOVEit DMZ Video
How MOVEit DMZ helps automate, simplify and manage complex file transfer processes and workflows. Complete the form on this page to watch this video now.

Linoma GoAnywhere MFT Video
Linoma GoAnywhere MFT video. Complete the form on this page to watch this video now.

Globalscape: Maximize Uptime with EFT™ High Availability
An active-active implementation of Enhance File Transfer™ (EFT™) High Availability (HA) using two or more EFTs and a load balancer, provides for non-stop availability of your network. Save time and money managing your file transfers and eliminate the problems…

Watchful Software Video
Watchful software video. Complete the form on this page to watch this video now.

Boldon James Video: Data Classification Overview
Leaders in Data Classification Solutions http://www.boldonjames.com/solutions/… Find out what makes Boldon James the first choice for the secure organisation and how you can identify, understand and protect the value of your information using data classification solutions. Complete the form…

Centrify Video: Are Corporations More Vulnerable Than They Admit?
In 2015, Centrify corporation surveyed more than 400 IT decision makers (ITDMs) in the US and UK to find out one thing: are corporations as secure as they should be? Major breaches like Sony and the Office of Personnel…

Insider Threats and Inside Out Security
When it comes to protecting data, the perimeter has become irrelevant. It’s time to protect your data from the inside out: transform your data security with Varonis. Complete the form on this page to watch this on-demand webinar now.

Chaos to Control Creating a Secure Mature File Transfer Process or System or Solution
Moving Files in to extended enterprise requires not only support for higher scale with fewer resources, but also dealing with the relentless challenges of security; compliance, errors, exceptions and problems; and the time and opportunity cost of problem resolution….

Secure File Transfer and Today’s Regulatory Compliance
In this Webinar you will learn not only how to easily achieve compliance, but make sure you stay in compliance. See how using Globalscape’s Secure File Transfer solutions provide a piece of mind whether it’s PCI-DSS, DPA, FSA regulations,…

File Transfer Automation On Demand Webinar
Businesses bring together all kinds of data streams – the bigger the business, the more diverse and disparate the data, but collating these streams means manual scripting and hours of hands-on management. And when information consumers in your organization…

Do Your Data Transfers, Policies and Practices Meet Your Regulatory Obligations?
It doesn’t matter which industry you are in, or how small your business is – you must comply with regulatory directives concerning data.Various directives are used to keep data about your business, your customers and your partners safe –…

Business Intelligence Dashboards for File Transfer
When a file moves into, out of, or within your company, you should know about it. And when a file transfer fails, you – not your supplier or your customer – should be the first to know about that,…

The Secure Dropbox Alternative from Globalscape
In recent years, as more of this data is exchanged, a worrying trend has now become an epidemic. Facing a lack of suitable alternatives offered by their employers, employees have resorted to using personal consumer cloud solutions such as…

Watchful Software; Data Classification That Works
Watchful Software’s RightsWATCH technology allows any organisation to be in complete control of who can ACCESS, CHANGE & VEIW Corporate information now matter where it travels. Learn the following from our simple demonstration how RightsWATCH is able too… Classify,…

Planning An Effective DLP (3.0) Strategy: From Immediate Results to Long Term Goals
DLP, and especially in its recent evolution to DLP 3.0, defines data protection in terms of the combined risks and threats that companies must be able to define, measure, and mitigate in order to protect their most critical data….

The Next Generation in Data Security from Verdasys
In this webinar you will learn how it’s now possible to create an environment that supports both successful and affordable data security while optimizing business enablement and productivity, as well as managing insider threat, compliance and cyber security all…

Watchful Keeping Unstructured Data Secure Whitepaper
Hardening the network perimeter to keep attackers out does not suffice anymore. One needs to also secure the data itself whenever and wherever. Despite efforts to strengthen defenses, control unsecured devices, restrict the usage of social networks, and otherwise…

Watchful True Information Security Only a Click Away… For Anyone Webinar
Download the slides from this pre-recorded entitled ‘True Information Security Only a Click Away… For Anyone’ from July 2015. Complete the form to see this resource in full.

Watchful You Can’t Teach an Old Dog New Tricks Webinar
Download the slides from this pre-recorded entitled ‘You Can’t Teach an Old Dog New Tricks – The fallacy of the ‘Secure Perimeter’ approach’ from June 2015. Complete the form to see this resource in full.

Watchful The X-Factor in Data-Centric Security Webinar
Download the slides from this pre-recorded entitled ‘The X-Factor in Data -Centric Secuirty’ from July 2015. Complete the form to see this resource in full.

Watchful RightsWATCH building on RMS for data-centric data security
RightsWATCH complements and extends Microsoft Rights Management Services (RMS) ensuring that sensitive/confidential information is identified, classified, marked/tagged and tracked appropriately. Further, that information can only be used by those who have been granted proper authority by company policy. RightsWATCH…

Watchful The Five Key Trends for Insider Threats
Download the infographic to learn the five key trends for insider threats. Complete the form to see this resource in full.

Watchful Extending RightsWATCH to Exchange Online and Office 365
Organizations of all sizes are challenged to protect a growing quantity of valuable information against careless mishandling and malicious use. Businesses today need productivity services that help users get more done from virtually anywhere while maintaining security in the…

Watchful Dynamic Data Classification with RightsWATCH
Most organizations have spent time, money, and thought putting into place an Information Control Policy (ICP) that outlines what types of information are important to the organization, how this information should be handled, and who should have access to…

Watchful TypeWATCH e-Biometrics Security
Download the TypeWATCH e-biometrics security sheet to find out more. Complete the form to see this resource in full.

Watchful Secure Collaboration with RightsWATCH and Azure RMS
Email has evolved to become more than a way of exchanging brief messages, it’s now the de facto method for collaboration of all types, regardless of the volume and sensitivity of data being exchanged. This creates a nightmare scenario…

Watchful RightsWATCH Enhancing and Extending Microsoft’s RMS
Download the RightsWATCH enhancing and extending Microsoft’s RMS to find out more. Complete the form to see this resource in full.

Watchful RightsWATCH Data-centric Security Overview
Download the RightsWATCH data-centric security sheet to find out more. Complete the form to see this resource in full.

Watchful RightsWATCH Data-centric Security for Individuals
Download the RightsWATCH data-centric security sheet to find out more. Complete the form to see this resource in full.

Watchful RightsWATCH and the RMS Sharing App in an Azure Environment
RightsWATCH brings significant feature and functionality to the Azure RMS enterprise. RightsWATCH allows information to be classified according to the corporate security policy; it can mark/tag information in accord with that policy; and, it protects the information using the…

Watchful GE Money Customer Case Study
A key role of a financial institution is to protect its customers’ monetary assets, and the greatest asset that the bank itself owns is information about its customers and their assets. For thousands of organizations in the financial sector,…

Varonis Point of View: Varonis and User Behavior Analytics Whitepaper
Security has become a business problem. Though organizations have invested in security, they know they’re not really protected. The recent string of headline-making breaches has not been lost on the C-level suite. Security personnel, for the most part, know…

Varonis How to Detect and Clean Cryptolocker Whitepaper
CryptoLocker is by now a well known piece of malware that can be especially damaging for any data-driven organization. Once the code has been executed, it encrypts files on desktops and network shares and “hold for ransom”, prompting any…

Varonis Insider Threats: Malice, Mistakes, and Mountain Lions Whitepaper
The goal of this whitepaper is to help you understand the most common insider threats and provide actionable tips to help protect against them. First we’ll take a look at the actors involved in insider breaches and dissect the…

Varonis Enterprise Search: Unlocking Hidden Knowledge in Unstructured Data Whitepaper
The major search engine players–Google, Microsoft, Yahoo–have revealed little about their search algorithms. That’s understandable: it’s their secret sauce. However, from the few statements they have made publically, we have some understanding of how the underlying algorithms work in…

Varonis Partner Battlecard
Varonis is the foremost innovator and provider of access, governance, and retention solutions for human-generated data, the fastest-growing and most sensitive class of digital information. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations…

Varonis Express Risk Assessment Datasheet
Security is at the top of everyone’s mind: without proper insight into where sensitive data lives and who has access to it, organizations are at significant risk from external and internal threats. We’ve made our Express Risk Assessment completely…

Varonis Security Solutions
Despite the enormous growth and increasing value of content stored across file shares, intranets, SharePoint, and the cloud, many organizations still lack the security intelligence required to protect unstructured data. Without a scalable way to identify sensitive content, monitor…

Varonis Insider Threats Infographic
Infographic on insider threats. Complete the form to download this resource in full.

SSH Key Management Infographic
Your enterprise may have more Secure Shell trust relationships than employees. A typical 1,000 server environment server has over 15,000 Secure Shell key based trust relationships, with 10% of these granting a high level of privilege including root.Follow these…

SSH Universal SSH Key Manager Datasheet
As the inventors of the Secure Shell protocol, SSH Communications Security is focused on helping IT organizations secure the path to their information assets. Our Universal SSH Key Manager is a multiplatform, scalable solution that brings compliance and control…

SSH Tectia SSH Server for IBM z/OS Datasheet
In large and medium-sized enterprises, mainframes are still relied upon as the most trusted, secure repository for Big Data. Because the mainframe technology itself is a vault for core systems and databases, encryption of the connections coming to and…

SSH Tectia SSH Client Tectia SSH Server Datasheet
Enterprises and government organizations around the world use Tectia SSH Client and Server to secure their most critical IT processes including ad hoc and automated file transfers as well as remote systems administration. They chose Tectia for the features,…

SSH Tectia MobileID Datasheet
With Tectia MobileID you can, increase security for accessing critical systems with no effort from end users, save on operational and maintenance costs with a tokenless solution and activate new users, partners and ac-hoc accounts instantaneously. Two-factor authentication provides…

SSH Missing Identities Datasheet
Identity management in large heterogeneous IT environments is complex and in many enterprises, a work in progress. The fundamental challenge is how to bring disparate operating systems and authentication systems under central management including a unified directory where all…

SSH Secure File Transfers and Data-In-Transit Datasheet
Tectia Server for Linux on IBM System z provides the ultimate SSH data security solution with strong encryption and authentication for mainframe file transfers and data-in-transit. Complete the form to download this resource in full.

SSH Tectia ConnectSecure Datasheet
Tectia ConnectSecure makes file transfer operator’s life easier and offers a cost-effective way to reach an advanced security level in the file transfer network. Complete the form to download this resource in full.

SSH Support Services Datasheet
Enterprises across the globe are facing an increased number of security threats, ranging from mere nuisances such as viruses, to sophisticated hacking attempts. At the same time, new regulatory compliance requirements force enterprises to bolster their defenses, often putting…

SSH CryptoAuditor: An SSH, SFTP and RDP Firewall Datasheet
The security intelligence gap in encrypted channels is a challenge most organizations are aware of but have not been able to get a handle on. Real-time intelligence, proactive data loss prevention and forensics have been enabled throughout the estate,…

SSH CryptoAuditor Datasheet
CryptoAuditor is a network-based, inline traffic monitor that decrypts and records the activities of privileged users without interfering with their normal workflow. Because there are no agents to deploy, it works regardless of what devices users connect with and…

SSH Financial Services Company Gains Visibility & Control Over External Contractors Case Study
For this Financial Services company, controlling access to confidential data is not only crucial to the security of the business, but also mandated by national and international regulation. With over 400,000 financial transactions in excess of several billion USD…

SSH Monitor, Audit & Control Privileged Users in the Cloud Case Study
The customer serves thousands of customers worldwide and is a leading provider of application development, consulting services, product development and cloud hosting. Their customer base consists a number of verticals including government, financial, energy, healthcare, manufacturing, retail and media….

SSH Solution Case Study
As part of a system update, Tamro Corporation decided to upgrade security for its file transfer operations. Since a key requirement was also to ensure compliance with public accountability regulations, the company chose SSH to secure the sharing of…

SSH Key Mobile ID Case Study
A government agency in Singapore needed a flexible and easily-deployed secure authentication solution for its system administrators. SSH solutions allowed the organization to ensure that the right people had access to its mission-critical data with minimal intervention. Complete the…

SSH Key Manager Case Study
In order to meet the challenges of a deadline driven environment, this leading news and media organization needed to streamline provisioning and access controls for application developers and IT staff. Complete the form to download this resource in full.

SSH Tectia Mainframe Case Study
A global automobile manufacturer with major operations in Europe and North America needed to replace numerous batch processes sending data in the clear with secure, encrypted file transfers. Using SSH Communications Security Tectia Solutions for Mainframe z/OS, this global…

SSH Andritz Group Case Study
ANDRITZ GROUP integrated SSH MobileID with VPN access to provide an intuitive, administration- free, and tokenless two-factor authentication for its mobile workforce and partners. Complete the form to download this resource in full.

SSH Cloud Security Case Study
Clearmanage has already implemented security tools and appropriate encryption to protect sensitive information in-transit and in-storage in the cloud environment; however, being able to monitor privileged user activities in the encrypted networks presents an additional layer of complexity. In…

Secure Islands Data Interceptor for Opentext
Secure Islands Data Immunization concept focuses on the data itself, rather than trying to control the users, channels or storage. Uniquely embedding persistent classification and protection within the data itself at the moment of creation or initial organizational access,…

Secure Islands IQProtector for ISO 27001 Compliance
ISO 27001 certification is rapidly becoming a requirement to do business with many major multinationals. Even in situations where certification is not strictly required, vendors who are certified are preferred. But beyond this, achieving ISO 27001 compliance is an…

Secure Islands Making Data Classifiction Work for You
If you’re reading this, there’s probably no need to explain the importance of data classification in your enterprise information security toolbox. The question is likely not “Does my organization need data classification?” but rather “Which data classification solution is…

Secure Islands Making IRM Work for You
Never before has enterprise IT enabled such extreme productivity. In the borderless, social enterprise, more data is shared between more people in more places, resulting in a radically more creative and collaborative work environment. This open world of sharing…

Secure Islands IQProtector Data Interceptor for SharePoint
Microsoft SharePoint has become a critical document-management platform for thousands of enterprises, large and small, necessitating the safeguard of vast volumes of sensitive content. The flexibility and granularity to set access permissions within SharePoint allows controlling information stored inside…

Secure Islands IQProtector Data Interceptor for MS Exchange
Email has become the most heavily used application in the enterprise. High volumes of emails are sent and received all day long between employees and a very wide array of recipients. Emails can carry a variety of data, often…

Secure Islands IQProtector Data Interceptor for Application Servers
IQProtector Data Interceptor for Application Servers employs Secure Islands’ breakthrough persistent, active data-immunization technology to classify and protect all information created or used on private and public servers with attributes that persist throughout the entire information lifecycle. The data…

Secure Islands IQProtector Bridge
Secure Islands’ IQProtector Bridge boosts IT and business-process software productivity while maintaining classification and protection of data. Complete the form to download this resource in full.

Secure Islands IQProtector Scanner for File Stores
IQProtector Scanner crawls through legacy data files of any file type on network shares and file stores such as NAS, SAN, SharePoint, and more, identifying, classifying and protecting valuable data automatically, based on content and context, and according to…

Secure Islands Data Security for the Financial Sector
With daily news of damaging cyber attacks, data leakage, tightening regulatory restrictions, and increased sensitivity to reporting liabilities – clients of financial organizations are asking tough questions about how exactly to secure their sensitive data and privacy. This growing…

Secure Islands IQProtector Express
To meet compliance and industry data security regulations – like PCI, HIPaA, the EU Data Protection Directive or ISO 27001 – and to defend business assets, organizations must be able to identify sensitive information and protect it. Assuring that…

Secure Islands IQProtector Custom Data Interceptor
Data is most effectively classified and protected right at the source – at the point of creation or first access – before it can be exposed. To immunize data immediately at the point of creation, Secure Islands offers scalable…

Secure Islands IQProtector Enterprise
The risk of data loss hovers over every enterprise. As digitization increasingly permeates business, R&D, service and other vital processes, more and more critical and confidential data is accessible to a wider audience of users including employees, partners and…

PKWARE Data Center Performance Guide
We recently surveyed our customers on ways to get the best performance out of their data center environments. We got an earful! It wasn’t a surprise that the most common theme in the data center was optimization and reducing…

PKWARE Open Systems Security Guide
Servers provide the basis for sharing and moving information throughout the enterprise, as well as with external business partners. Every day, a staggering amount of data flows through the data center, much of it is sensitive in nature. When…

PKWARE Mainframe Security Guide
In this guide, we will dispel some of the common myths associated with System z cryptographic facilities and explore encryption strategies that ensure data is protect- ed not only on the mainframe but as it moves to other computing…

PKWARE Desktop Security Guide
Focusing only on perimeter security is a battle better suited for bygone times. Nowadays, sensitive data regularly moves from platform to plat- form and from endpoint to endpoint, inside and outside the organization. Some take the approach of securing…

PKWARE SecureZip DLP Deployment Kit Overview
The SecureZIP DLP Deployment Kit allows organizations to inspect attached encrypted files sent via email and identified by DLP systems prior to them leaving the organization; reducing the risk of non-compliance. As encrypted files attached to email are flagged…

PKWARE Persistant Data Protection Overview
PKWARE solutions provide persistent data protection for organizations concerned about security throughout the data lifecycle. More than 30,000 PKWARE customers deploy protection on endpoints, servers or through SDKs that follows the data itself. Business partners also choose PKWARE’s Smart…

PKWARE Tip Sheet
Discover the 7 easy ways to meet and exceed compliance. Secure what is most valuable, remove reliance on SSL and TLS, scramble all pan, protect before you send, hide the keys, split control over keys and prevent “runaway” crypto….

PKWARE Pkzip and Securezip V15 Datasheet
Controlling escalating data center costs is one of the top concerns of IT executives today regardless of whether the data center is in a physical or cloud environment. There is constant pressure to do more with less and strict…

PKWARE Major U.S. Bank Case Study
The bank needed to meet PCI DSS compliance requirements, which required them to protect credit card data as it is transmitted, processed, and/or stored. Meeting these compliance requirements would impact several processes throughout their organization. The bank initially set…

PKWARE Top Ranked Financial Services Institution Case Study
The company’s business goals for this project focused on aligning with requirements for secure data storage and exchange with customers like CVS, Target®, Office Depot® and Discover® Financial, without introducing inefficiencies that would negatively impact those existing business relationships….

PKWARE Institute for Social and Economic Research Case Study
The ISER’s business goals are centered on securing sensitive research data. Understanding Society studies the socio-economic circumstances and atti- tudes of 100,000 individuals in 40,000 British households. The study also cap- tures biomedical data on 20,000 participants and places…

PKWARE Healthcare Services Provider Case Study
The prognosis was grim for Ron’s healthcare products. As CIO for a growing, Midwest-based healthcare specialty software vendor, Ron* faced increasing demand from his hospital system customers to add encryp- tion for enhanced security and sharing in its Electronic…

PKWARE Healthcare Customer Case Study
The company wanted a solution to further its commitment to data privacy and security while ensuring compliance, enhancing processes, encrypting unstructured data and improving overall operations as a private cloud serviceoriented architecture provider. With an expansive client and partner…

PKWARE Global Bank Case Study
That was the question Param asked his team of security architects at a top-5 global bank after they realized millions of monthly emails and messages went through applications and infrastructure without any insight. Data was streaming in and out…

PKWARE Food and Beverage Company Case Study
When the company first contacted PKWARE, they were using WinZip® for desktop data compression, but when WinZip was acquired by Corel and began aggressively changing their licensing policies, it was forced to deal with the prospect of large ongoing…

PKWARE CMS Case Study
The numbers were staggering…years worth of sensitive data about every Medicare and Medicaid recipient ex- changed with hundreds of partner organizations with zero tolerance for security breaches. This posed a significant challenge for the Centers for Medicare & Medicaid…

Nlyte for ServiceNow ITSM Datasheet
Data center service management (DCSM) products such as Nlyte for ServiceNow ITSM bridge the often-overlooked divide in IT organizations, enabling enterprises to maintain accurate, up-to-the minute information about their IT and data center assets, streamline their processes and improve…

Nlyte for HP ITSM Datasheet
Data center service management (DCSM) products such as Nlyte for HP ITSM bridge the often-overlooked divide in IT organizations, enabling enterprises to maintain accurate, up-to-the minute information about their IT and data center assets, streamline their processes and improve…

Nlyte for BMC ITSM Datasheet
Data center service management (DCSM) products such as Nlyte for BMC ITSM bridge the often-overlooked divide in IT organizations, enabling enterprises to maintain accurate, up-to-the minute information about their IT and data center assets, streamline their processes and improve…

Nlyte BMC ADDM Connector Datasheet
When it comes to data center infrastructure management, you want your modeled assets to match the reality of your data center. In order for you to manage your data center assets, you need to know what you have. Traditionally,…

Nlyte Configuration Management Datasheet
Configuration Management Databases (CMDBs) are frequently out of date, difficult to maintain, and heavily dependent on network discovered assets. The asset information contained in them is usually limited to cursory Configuration Item (CI) attributes that don’t go very far…

Nlyte Alarms Datasheet
Configuration Management Databases (CMDBs) are frequently out of date, difficult to maintain, and heavily dependent on network discovered assets. The asset information contained in them is usually limited to cursory Configuration Item (CI) attributes that don’t go very far…

Nlyte Alarms Datasheet
For real-time data collection, facilities & environmental alarms, now IT and Facilities staff can better monitor, manage and quickly react to physical IT infrastructure managed by the Nlyte data center infrastructure management (DCIM) solution. In the event of a…

Nlyte SSE Case Study
Increasing demands from the business for more and more IT services accompanied by an on-going program of acquisition, made it apparent that SSE’s two existing data centres would soon run out of capacity and reach the end of their…

Nlyte Retail Big Box Case Study
When this home improvement giant opened its fourth data center, it realized its DIY solution for data center infrastructure management could no longer do the heavy lifting it needed. While its four data centers were geographically dispersed nationally, it…

Nlyte PNC Case Study
National City Corp. hired a General Manager of Data Center Operations to manage and optimize all of its data centers. “It quickly become apparent that we needed a new system for managing space, power, and cooling,” they explained. “Like…

Nlyte Canon Case Study
Before Nlyte was deployed, Canon was using spreadsheets to track their physical infrastructure – managed by various teams. Across the two data centers there were Windows, Unix. Applications and Networking teams, all with their individualized spreadsheets. Quite frankly, there…

Nlyte Global Technology Company Case Study
Over the past decade, this technology giant experienced exponential growth to become one of the world’s largest companies. Attempting to keep up with the blistering pace of its own expansion, the client deployed data center resources around the world…

Nlyte Computacenter Case Study
Computacenter first started to think about data centre infrastructure management (DCIM) when the company acquired Digica (a provider of data centre services). Digica focused on providing SAP outsourcing services and had data centres in Warrington, Leeds and Nottingham plus…

Nlyte Banking Industry Case Study
When this banking behemoth acquired a major Wall Street brokerage firm during the financial crises of 2008, it quickly started consolidating technology systems to ensure the success of the combined companies. Largely, that meant migrating the brokerage firm from…

Nlyte On-Demand Product Brief
As the recognized data center infrastructure management (DCIM) category founder, Nlyte Software has been providing solutions with a focus on the business aspects of data center asset management since 2004. With 10 years of experience deploying our software in…

Nlyte DCIM Datasheet
The main challenge for DLLR was transferring sensitive data in a secure and reliable fashion. In addition, each DLLR “trading partner” required different file formats such as fixed width, Excel, CSV or the increasingly popular XML format. It was…

Linoma State of Maryland DLLR Case Study
The main challenge for DLLR was transferring sensitive data in a secure and reliable fashion. In addition, each DLLR “trading partner” required different file formats such as fixed width, Excel, CSV or the increasingly popular XML format. It was…

Linoma Integra Bank Case Study
Integra Bank (NASDAQ – IBNK) needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and…

Linoma IDB Swiss Bank Case Study
Like many financial companies that take their responsibilities for data security very seriously, we decided to encrypt our data backups to protect sensitive customer and bank data. Complete the form to download this resource in full.

Linoma Dayton Parts Case Study
As a manufacturer and distributor of thousands of parts for light and heavy- duty trucks, Dayton Parts’ primary focus is on their customers. They know that sending personalized price sheets to their valued customers on a regular basis is…

Linoma Field-Level Encryption Case Study
Data encryption has taken on a much larger role in IT departments ever since the protection of sensitive and confidential information became a high priority for so many companies. We hear a lot of complaints about regulatory compliance, but…

Linoma Crypto Complete Brochure
Crypto Complete protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Crypto Complete allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. This innovative solution…

Linoma Go Anywhere Secure Mail Brochure
The Secure Mail module in GoAnywhere MFTTM allows employees and other authorized users to easily send files (packages) to other individuals whenever they need to. Because it is much more secure than traditional email, and doesn’t limit the file…

Linoma Go Anywhere Managed File Transfer Brochure
GoAnywhere MFTTM is an enterprise-level solution which can manage all of your organization’s file transfer needs through a single interface. With extensive security controls and detailed audit trails, GoAnywhere MFT will help your organization comply with data privacy regulations…

Linoma Go Anywhere Brochure
GoAnywhere GatewayTM provides an additional layer of security when exchanging data with your trading partners. It allows you to keep file sharing services (e.g. FTP/S, SFTP, HTTP/S servers) and documents safely in your private/internal network. With GoAnywhere Gateway, no…

Linoma Go Drive Brochure
GoDrive by GoAnywhereTM is an on-premise solution that provides Enterprise File Sync and Sharing (EFSS) services for your employees and partners. Starting with 10 FREE Users, GoDrive files and folders are easily shared between users with advanced collaboration features…

iSheriff Disrupting The Cybercrime Exploration Life-Cycle
iSheriff disrupts the malware exploitation life-cycle to provide unique threat protection and visibility, delivering more effective threat detection and remediation than traditional perimeter and host-based security models. Complete the form to download this resource in full.

iSheriff Cloud Security Datasheet
iSheriff is the industry’s first cloud-based security platform: providing fully integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies. Complete the form to download this resource in…

iSheriff Web Security Datasheet
iSheriff Web Security is a cloud-based Internet filtering and Web 2.0 security service. It provides your users with a safe and secure Internet connection, protected from threats and malware, while ensuring that Web browsing is appropriate and complies with…

iSheriff Management Console Designed For Managed Service Providers Datasheet
Running an MSP can often be described as “having a large number of irons in the fire without knowing the number of irons, and the constant chance for a few fires to go out of control.” So anytime a…

iSheriff Endpoint Security Datasheet
The iSheriff Endpoint Security Service is a cloud-based Endpoint Security platform offering advanced anti-malware technology that protects your organization’s endpoint devices from malware, secures & controls applications being used by end users and protects against threats from removable media…

iSheriff Email Security Datasheet
iSheriff Email Security is a cloud-based anti-spam and email threat protection service. It rids your organization’s email of spam, providing a clean email connection and secures against viruses, blended threats, unwanted content and confidential data leakage. Complete the form…

iSheriff Safesite Inc. Case Study
Safesite’s three member IT team manages the company’s 45 computer work stations that are used by 110 employees. According to Jon Frank, Safesite’s IT manager, although the information the company stores for customers is paper- based, the security over…

iSheriff RHWL LLP Case Study
RHWL employees are quite mobile, working in many off-site locations that are unconnected to the firm’s network. When employees work out-of-network it can pose online security risks, such as increased exposure to viruses, malware, and data breaches. Dave Allerton,…

iSheriff ITEX Case Study
ITEX corporate headquarters is located in Bellevue, Washington, and there are 90+ franchise locations across the United States and Canada. 24,000 members comprise the ITEX marketplace; the franchise offices manage those members and facilitate transactions, while corporate headquarters oversees…

iSheriff Integrated Business Technology Case Study
Mr. Long needed an Internet security solution that would keep his clients’ machines safe from cyber attacks and computer viruses, and be easy for him to manage. Mr. Long’s previous security software had not performed adequately and thus needed…

iSheriff AAA Ambulance Case Study
Mr. McDonald needed a solution to protect AAA from malware, spam, and viruses. Remote stations needed monitoring to not only ensure security but also keep workers in those areas productive by enforcing acceptable use policies for Internet browsing. In…

Ipswitch File Transfer Products Overview Datasheet
Ipswitch products meet the file transfer needs of any organization from small and departmental to global 2000 companies. Millions of users and tens of thousands of companies globally use WS_FTP Server and MOVEit Managed File Transfer to transfer large…

Ipswitch MOVEit Mobile Datasheet
MOVEit Mobile enables mobile workers to reliably and productively participate in file-based business process workflows, while providing IT the security, visibility and control required to confidently run their business and meet compliance requirements. Complete the form to download this…

Ipswitch MOVEit File Transfer (DMZ) High Availability and Scalability Datasheet
MOVEit File Transfer has a flexible architecture designed for high availability systems and via integration with Neverfail IT Continuity Engine supports disaster recovery and failover configurations. It can be deployed on two or more systems and in various configurations…

Ipswitch MOVEit File Transfer (DMZ) Secure File Transfer Server Datasheet
MOVEit File Transfer (DMZ) is a secure File Transfer server for mission-critical data transfers. It delivers fast time-to- value and increased efficiency while meeting strict SLAs, compliance mandates and security requirements. It also lets companies manage and govern the…

Ipswitch MOVEit Cloud Datasheet
More and more business critical information moves electronically between employees, customers, partners, and applications. IT professionals need solutions that move files efficiently, securely, and reliably to get work done. Managing infrastructure for business processes means IT teams face challenges…

Ipswitch MOVEit Central Datasheet
MOVEit Central provides a simple but powerful user interface for defining business workflows that’s easy enough for anyone on your IT team to use because no scripting is required. The heart of MOVEit Central is a reliable engine that…

Ipswitch Failover Datasheet
Ipswitch Failover delivers zero downtime, no data loss, and unified failover management by maximizing availability of MOVEit Managed File Transfer with automated failover. Complete the form to download this resource in full.

Ipswitch File Transfer Datasheet
File transfer is integral to business processes, yet many businesses are at risk with their existing file transfer processes. File transfer systems are not integrated with existing IT security infrastructure, it’s impossible to control or audit transfers, and files…

Ipswitch Analytics Datasheet
Ipswitch Analytics is a flexible reporting and monitoring solution for MOVEit Managed File Transfer that ensures reliable, cost-effective, and auditable file transfers between employees, customers and trading partners. Whether you want to improve end-to-end performance and reliability, enable end-users…

Ipswitch Pharmaceutical Case Study
The pharmaceutical industry is highly regulated – and highly competitive – and secure transfer of confidential and proprietary data is imperative. For one major pharmaceutical company – with hundreds and products and operations around the globe, secure file transfer…

Ipswitch Hermes Case Study
With awareness of data breaches at an all-time high, financial institutions are working hard to implement policies and solutions that protect sensitive financial information along with their reputations and industry competitiveness. In today’s digital world, critical financial data is…

Ipswitch The City of Guelph Case Study
Guelph is a mid-sized city in southwestern Ontario which consistently ranks among Canada’s best places to live. With 2,000 employees serving Guelph’s citizens from City Hall and 40 satellite offices that provide police, fire, emergency medical, public works, transit,…

Ipswitch Enterasys Case Study
Enterasys is the Network Infrastructure and Security Division of Siemens Enterprise Communications GmbH &Co KG, a leading provider of switching, routing and security products. With thousands of customers, partners and employees working together in more than 80 countries worldwide,…

Globalscape Facilitating Enterprise Compliance Whitepaper
Globalscape’s Enhanced File TransferTM (EFTTM) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper…

Globalscape Mobile is the New Normal for Conducting Business Whitepaper
These are trying times for IT organizations—particularly when it comes to resolving conflicting demands for security and convenience. IT organizations are being pulled in two different directions: On one side, increasing regulatory compliance and governance mandates require that businesses…

Globalscape Protecting Payment Information with PCI DSS Version 3 Compliance Whitepaper
When a string of large-scale, high-profile retail data breaches hit last year, credit card data security stole the national spotlight and remains prominent in the minds of many consumers and industry leaders now. How can businesses better fortify their…

Globalscape Reducing the Costs and Risks of Email Attachments Whitepaper
Email is the main collaboration and communications tool in most businesses today. When users want to share files internally or with customers, partners, and others outside the businesses, they typically use email attachments. This paper discusses how companies can…

Globalscape Facilitating Enterprise Compliance Whitepaper
Globalscape’s Enhanced File TransferTM (EFTTM) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper…

Globalscape High Availability Clustering Whitepaper
Businesses count on consistent, dependable access to their mission- critical resources and applications. They rely upon systems such as managed file transfer (MFT) solutions to ensure the security and integrity of these assets and to facilitate uninterrupted processes and…

Globalscape Protecting Digitalized Assets in Healthcare Whitepaper
The digitization of information has had a tremendous influence on organizations in every sector, but most especially on healthcare. Doctors, nurses, clinicians, and other professionals are increasingly relying on digital file sharing solutions and electronic health records (EHRs) to…

Globalscape Enterprise Mobility Management 101 Whitepaper
The greatest thing about enterprise mobility is that it empowers employees to be more productive – from anywhere and at any time. Mobility offers that freedom and flexibility so that an employee will no longer need to be tethered…

Globalscape Multifactor Authentication Whitepaper
The classic username+password authentication to an account is only as secure as the security and complexity of the password. Passwords can be stolen or forgo?en, and can place an unnecessary burden on support departments to reset passwords or to…

Globalscape Three Ways System Downtime Affects Companies and Four Methods to Minimize It Whitepaper
Downtime happens. Every organization experiences it with today’s unpredictable IT environments. However, the frequency of downtime, and the duration that critical systems are unavailable has become far too acceptable to organizations these days. A recent Globalscape survey of 283…

Globalscape Dangerous File-Sharing Whitepaper
This report covers the unsanctioned tools that employees use to share sensitive company information, the security, compliance, and governance risks to enterprises, why most IT policies and company-provided tools come up short and steps for reigning in the risky…

Globalscape Managed File Transfer: Can your business thrive without it? Whitepaper
With so many different moving parts involved in running a successful organization, the last thing you want to do is to put all of that at risk by either not using a managed file transfer (MFT) solution OR by…

Globalscape WAFS Whitepaper
Relying on person-to-person file transfers or email attachments between users is risky for essential business processes and cumbersome for users. IT organizations want to have a way to enable users to collaborate on documents across wide area networks (WANs)…

Globalscape Managed File Transfer Buyers Guide Whitepaper
When it comes to managed file transfer, the success of your operation hinges on maximizing productivity and security, while maintaining top- notch compliance—anything less undermines your ROI. And despite the wide offering of managed file transfer (MFT) products on…

Globalscape Mail Express Datasheet
EFT is offered in six different bundles or “tiers,” as described below. The tiers are organized to meet the needs of small, medium, and enterprise businesses. You are not locked in to these specific groupings. For example, if SMB…

Globalscape Enhanced File Transfer (EFT) SMB and Enterprise Datasheet
EFT is offered in six different bundles or “tiers,” as described below. The tiers are organized to meet the needs of small, medium, and enterprise businesses. You are not locked in to these specific groupings. For example, if SMB…

Globalscape Wide Area File Services (WAFS) Datasheet
Globalscape® MIX enables your organization to securely exchange business- to-business data, including large files and sensitive data. This hosted managed file transfer (MFT) service integrates Globalscape’s market- leading Enhanced File TransferTM (EFTTM) solution with proven infrastructure from top hosting…

Globalscape Managed Information Xchange (MIX) Datasheet
Globalscape® MIX enables your organization to securely exchange business- to-business data, including large files and sensitive data. This hosted managed file transfer (MFT) service integrates Globalscape’s market- leading Enhanced File TransferTM (EFTTM) solution with proven infrastructure from top hosting…

Globalscape Mobile Transfer Client Datasheet
IT departments everywhere are faced with an increasingly difficult balancing act between providing their organization’s employees with access to corporate data from their mobile device, and keeping corporate data from falling into the wrong hands. If corporate policy favors…

Globalscape Active-Active High Availability with EFT Datasheet
Meet Those “Five-Nines” SLAs! With active-active configuration and horizontal scalibility you can configure a network that is available without interruption. When you bring a node down for upgrades or patches, the other nodes continue to process transactions, meeting those…

Globalscape Security Solutions Datasheet
Globalscape supplies security? solutions to the majority of the Fortune 100 companies, many of them running our managed file transfer solu?ons in mul?ple, globally dispersed datacenters. Complete the form to download this resource in full.

Globalscape Web Transfer Client Datasheet
Globalscape’s Enhanced File TransferTM (EFTTM) offers a thin client, the Web Transfer Client (WTC), which can be used by any trading partner using virtually any modern Web browser to exchange files. The WTC lowers costs and increases flexibility for…

Globalscape Enhanced File Transfer (EFT) SMB Datasheet
Enhanced File TransferTM (EFTTM) SMB, designed for small-to-medium businesses, enables your organiza?on to securely manage file transfers among worldwide offices, clients, and partners, ensuring that data confiden?ality and integrity are preserved during transport and storage. Our best-in-class managed file…

Globalscape OpenPGP Module FAQ Datasheet
Encrypt file transfers with the Globalscape® EFTTM OpenPGP module. Complete the form to download this resource in full.

Globalscape Enhanced File Transfer Datasheet
Offering unsurpassed customiza?on, EFTTM Enterprise is the managed file transfer solu?on used and trusted by the U.S. Army, Fortune 100 companies, and businesses around the world. With opera?onal efficiency in mind, EFT Enterprise features quick and intui?ve setup, advanced…

Globalscape Content Integrity Control (CIC) Module Datasheet
Enhanced File Transfer (EFT) is Globalscape’s best-in-class, customizable managed file transfer software and a leader in Gartner’s Magic Quadrant for MFT. Companies of all sizes (including the US Army) use EFT, trusting its unmatched simplicity and top-notch security. EFT’s…

Globalscape scConnect Security Datasheet
These days, your digital content can be stored on your desktop computer, work laptop, and servers—pre?y much everywhere. However, that content can be tough to find, difficult to access, and impossible to share with colleagues when you are away…

Globalscape scConnect Datasheet
These days, your digital content can be stored on your desktop computer, work laptop, and servers—pre?y much everywhere. However, that content can be tough to find, difficult to access, and impossible to share with colleagues when you are away…

Globalscape RBFCU Enhanced File Transfer Case Study
RBFCU’s vice president of Information Systems, Charles Beierle, sought an easier way to send sensitive files both inside the organization and externally to vendors. Like many financial institutions, RBFCU had a number of vendors with whom they needed to…

Globalscape AON EFT Case Study
The Human Capital division of Aon Corporation needed a better way to automate their data processes. Its existing system had proven difficult to manage and time consuming to modify. Even simple changes or additions to automated processes required a…

Digital Guardian A Day in the Life of Your Sensitive Data Infographic
See how we protect your sensitive data every minute of the day. Complete the form to download this resource in full.

Digital Guardian For Windows Datasheet
Microsoft Windows® is the most widely deployed operating system in the world, and consequently the most vulnerable to security threats. Critical patches and security updates are issued frequently, but this reactive approach leaves you poorly equipped to defend your…

Digital Guardian Savant Protection Application Whitelisting Datasheet
Application whitelisting adds a critical layer of defense against evolving threats such as zero-day attacks that endpoint anti-malware frequently fail to detect. But most of today’s whitelisting products are too difficult to deploy, time-consuming to manage, and reliant on…

Digital Guardian Management Console Datasheet
The Digital Guardian Management Console (DGMC) is your web-based command center within our Digital Guardian data- centric security platform. It enables you to create and manage policies, alerts, and reports. Data use policies that you configure in the DGMC…

Digital Guardian Managed Security Program (MSP) Datasheet
Digital Guardian MSP service offerings align with our product offerings to address your organization’s unique requirements. Start with DG for Data Visibility and Control for out-of-the-box visibility and device control. Choose DG for DLP to get everything you need–full…

Digital Guardian Data Protection Integration with FireEye Datasheet
Digital Guardian is a scalable platform that protects intellectual property and other sensitive data against insider threats and outsider malware attacks. Digital Guardian provides visibility into data movement to detect malware and it provides controls to prevent malware from…

Digital Guardian Data Protection for Law Firms Datasheet
In 2011 over 80 US-based law firms reported system breaches, many resulting in the loss of sensitive client data. According to the FBI, the biggest threat is corporate espionage targeting firms that represent companies on securities, intellectual property, and…

Digital Guardian Visibility Study Datasheet
Digital Guardian offers the industry’s only on-demand data visibility study powered by the proven, patented Digital Guardian platform. This service is appropriate for virtually every organization with proprietary or regulated data; it is designed to provide actionable intelligence on…

Digital Guardian Data Loss Prevention Datasheet
Breaches are inevitable, losing data is not. Digital Guardian for Data Loss Prevention gives you everything you need – the deepest visibility, the fine-grained control and the industry’s broadest data protection coverage – to stop sensitive data from getting…

Digital Guardian Data Protection for Citrix ShareFile Datasheet
Many IT organizations want a secure alternative to consumer-style file sharing services. Enterprises need full control over their data while maintaining productivity, by providing users with mobile access to information and synchronizing data across all devices. Citrix ShareFile is…

Digital Guardian USDHS Continuous Diagnostics & Mitigation Datasheet
In 2014, the US Department of Homeland Security issued a task order for Continuous Diagnostics and Mitigation (CDM) tools. This program “moves away from historical compliance reporting toward combating threats to the nation’s networks on a real- time basis.”…

Digital Guardian Data Protection Integration With HP ArcSight Datasheet
The HP ArcSight Security Intelligence platform is a unified security solution that helps safeguard businesses by giving complete visibility into activity across the IT infrastructure, including outsider threats such as malware and hackers, insider threats such as data breaches…

Digital Guardian Advanced Threat Protection Datasheet
Attacks are inevitable. With the proper protocols and tools in place, you can spot and contain breaches before sensitive data gets out. Complete the form to download this resource in full.

Digital Guardian Add-On Modules Datasheet
Digital Guardian offers a suite of add-on modules that provide advanced encryption, extend your protection to the network and more. Complete the form to download this resource in full.

Digital Guardian Multibilion-Dollar Global Financial Services Firm Case Study
The investment banking division of the organization investigates and evaluates possible mergers and acquisitions. Each of these strategic deals can be worth billions of dollars, and information and analysis supporting each individual deal is highly confidential. Even the formulas…

Digital Guardian Multi-National Banking Company Case Study
With over 50 million credit card customers around the world, the company was subject to the Payment Card Industry Data Security Standards (PCI-DSS). The standards require that sensitive credit card information be encrypted at rest, and that access to…

Digital Guardian Large Managed Healthcare Provider Case Study
The organization had strong network defenses, but also many mobile users. A Virtual Private Network (VPN) was in place, but users were not diligent in using it. Enforcing controls on users that were not connected to the network was…

Digital Guardian Luxury Sports Car Manufacturer Case Study
The team’s designs are developed and tested at their research center in Europe. Data is also on laptops at race venues around the world. The large amount of data processing equipment used required the team to travel with not…

Digital Guardian Jabil Manufacturing MSP Case Study
When Graham joined Jabil in 2013, a comprehensive security review revealed that Jabil had 52,000 workstations that were secured, but not at the levels the security team thought appropriate given the risks. Should a security breach leak a customer’s…

Digital Guardian Global Pharmaceutical Company Case Study
For each new drug produced, pharmaceutical companies require hundreds of researchers, scientists, and clinical trial organizations to work together efficiently. Delays in time-to-market erode revenues and profits.Any solution that helped monitor and control this company’s IP must not impede…

Digital Guardian Global 100 Technology Conglomerate Case Study
The company was concerned that identifying critical data would be difficult. As a technology manufacturer, it used many types of software in the design process, including source code for its software, 3-D computer-aided design and simulation software, and proprietary…

Digital Guardian Fortune 100 Manufacturer Case Study
The staggeringly high number illustrates the high cost of stolen IP. The event prompted an initiative to introduce risk management measures to guard against an incident of this kind happening again. The project, initially conceived as a response to…

Digital Guardian Energy Division Case Study
The company had over 40,000 employees in locations around the world who required access to the IP. Their infrastructure included desktops, laptops, Windows® Servers and Fileshares, as well as virtual environments. The IP was used in multiple applications, including…

Digital Guardian Fortune 1000 Manufacturer Case Study
Managing desktops can be a challenge given the rise of spear phishing attacks, couple that with multiple users on a single machine and you have a potential for rapid system drift. This drift opens the door to malware, or…

Digital Guardian ITAR Case Study
The aerospace client had worldwide operations and was a major supplier to the Department of Defense. It shared sensitive information in multiple formats with its supply chain. As a defense contractor, some, but not all of the data they…

Centrify Identity Service, Mac Smart Card Edition Datasheet
Centrify Identity Service, Mac Smart Card Edition enables IT administrators to manage and secure Mac OS X systems using existing tools and processes so that Macs become a security peer to Windows systems. Centrify extends its proven Centrify for…

Centrify Server Suite Datasheet
Whether working to mitigate the risks of insider threats and advanced persistent threats, or to meet PCIDSS, SOX or other industry mandates and government regulations in an increasingly multi-platform and cloud- based environment, IT organizations require a unified identity…

Centrify Privilege Serivce Datasheet
IT organizations are increasingly required to manage hybrid deployments that combine cloud-based and data center infrastructure. IT admins, both internal and outsourced, need to login from inside and outside of the corporate perimeter. In order to meet these challenges,…

Centrify Identity Service, Enterprise Mobility Management Datasheet
Centrify Identity Service offers an easy-to-deploy, cloud-based service that enables centralized and secure mobile device management using existing directory service infrastructure. It provides single sign-on to cloud, on-premises and mobile apps on from mobile devices, as well as multi-factor…

Centrify Identity Service, Mac Edition Datasheet
With Centrify Identity Service, Mac Edition, organizations can manage and secure Macs with the same tools they use to manage PCs. In addition, Centrify extends your management and security infrastructure into the cloud and also lets Apple iOS and…

Centrify Identity Service Datasheet
Centrify Identity Service uniquely unifies cloud app and mobile management into an enterprise cloud service. Centrify leverages identity to secure and manage users’ access to applications from any device, regardless of location. Complete the form to download this resource…

Centrify Server Suite, Standard Edition Datasheet
Centrify Server Suite, Standard Edition, centralizes authentication and privileged user access across disparate systems and applications by extending Active Directory-based authentication, enabling use of Windows Group Policy and single sign-on. Complete the form to download this resource in full.

Centrify SBA Communications Case Study
When SBA Communications began using SaaS-based apps like Innotas, ExpenseWatch and Yammer, they implemented Microsoft’s Active Directory Federation Service (AD FS) at an approximate total cost of $35,000 for identity management. While implementation and application integration proved challenging, the…

Centrify Ouachita School District Case Study
As part of a process to replace a legacy email system with Microsoft Office 365, the Ouachita school district was looking to incorporate a single sign-on (SSO) solution that would facilitate the transition to Active Directory for user authentication…

Centrify National Weather Service Case Study
In order to adhere to HSPD-12 regulations, government agencies like NOAA are required to use Common Access Cards (CAC cards) for two-factor authentication across all machines within the environment including Windows, Linux and Mac. This requirement extends to all…

Centrify Morris Communications Case Study
When Morris Communications decided to migrate from on-premises Office to Office365, Arup Chakraborty, Solution Architect at NIIT Technologies Limited, began looking for a solution that could provide the identity federation services required. If he could identify a comprehensive solution…

Centrify Interval International Case Study
A period of rapid organic growth combined with a series of acquisitions made it apparent to Interval International that their infrastructure was in need of an upgrade. “Our data center was mostly Windows with a small number of Linux…

Centrify Essendon Volkswagen Case Study
Nearing the end of a contract that outsourced the community services ELC supervised, the company decided to bring the services in house and offer them directly to the public. It was a large undertaking that would require nearly 100…

Centrify ELC Case Study
Nearing the end of a contract that outsourced the community services ELC supervised, the company decided to bring the services in house and offer them directly to the public. It was a large undertaking that would require nearly 100…

Centrify Identity Management Case Study
Until recently, CAA was using an in-house-developed, legacy application that required Internet Explorer 8 to manage access to 200 websites used for a variety of core business activities. But because the application hadn’t been adequately maintained and updated over…

Centrify Morehouse College Case Study
In the process of upgrading traditional user apps to cloud solutions — including the replacement of Microsoft Exchange with Office 365 — Morehouse College CIO Clifford Russell knew that multiple new log-ins would be challenging for staff, faculty and…

Centrify HIPAA Case Study
Apttus is a cloud-based company with a very small on-site infrastructure — virtually all of its server and storage needs are met in the cloud. Salesforce, NetSuite, Concur, Dropbox, Office 365 and other SaaS apps comprise the majority of…

Boldon James Classifier 360 Whitepaper
Data classification enables organisations to add context to the unstructured information that they hold in messages, documents and files. This classification context allows the organisation to focus protection on the more sensitive data and ensure safe sharing whilst also…

Boldon James User Driven Classification Whitepaper
With ever-increasing volumes of data to handle, the proliferation of communication channels, a wide range of security threats and the need to provide ready access to systems for customers and partners, organisations need to find more effective ways to…

Boldon James Data Protection Presentation
An overview presentation of ‘Putting Data Classification at the Foundation of Data Protection’. Complete the form to download this resource in full.

Boldon James SharePoint Presentation
An overview presentation of Sharepoint: information security’s wakest link? by Martin Sugden of Boldon James. Complete the form to download this resource in full.

Boldon James Exchange Classifier Datasheet
With new data protection legislation on the horizon and data breaches an ever-growing threat, it’s no longer enough for organisations to rely solely on endpoint solutions to ensure that sensitive data is handled appropriately and consistently through its journey…

Boldon James Mobile Classifier Datasheet
With an increasing variety of mobile devices in use in modern workplaces, IT teams are challenged not only by the complexity of managing diverse platforms, but also by the security risks present when personal and corporate data co-exist on…

Boldon James SharePoint Classifier Datasheet
Organisations are increasingly adopting Microsoft SharePoint® for collaboration and document management. As a result, large volumes of sensitive information are now concentrated in these systems, requiring users to be increasingly conscious of the security and safeguarding requirements of this…

Boldon James Power Classifier Datasheet
Classification provides a means for organisations to organise and extract value from unstructured information. Most organisations already possess a substantial legacy of unstructured data and the Big Data phenomenon has resulted in an exponential rise in the volume of…

Boldon James OWA Classifier Datasheet
Email is the primary collaboration tool in most organisations, so it’s no surprise that it’s a common source of information leakage, with most data loss caused by user negligence. Boldon James OWA Classifier puts labelling at the heart of…

Boldon James Office Classifier Datasheet
Processes used to control the distribution of sensitive documents were mostly created in a paper-based world. Updating these controls to cope with the increased risk of data loss presented by email and document processing systems presents a significant challenge….

Boldon James Notes Classifier Datasheet
Email is the primary collaboration tool in most organisations, so it’s no surprise that it’s a common source of information leakage, with most data loss caused by user error. Boldon James Notes Classifier puts labelling at the heart of…

Boldon James File Classifier Datasheet
Organisations face the problem of controlling sensitive information that is held in a rapidly expanding range of different electronic formats – from the humble text file through to image files, PDFs and CAD documents. Without the ability to apply…

Boldon James Email Classifier Datasheet
Email is the primary collaboration tool in most organisations, so it’s no surprise that it’s a common source of information leakage, with most data loss caused by user error. Boldon James Email Classifier puts labelling at the heart of…

Boldon James Classifier Administration Datasheet
Classifier Administration is a unified management console for defining and applying Labelling policies to any part of your organisation, enabling these policies to operate at the heart of your data loss prevention strategy. The console is provided with the…

Boldon James Mobile Filter Datasheet
Many organisations provide mobile devices for their staff that permit roaming access to their corporate email. However, there are many situations in which it is undesirable to hold sensitive messages on such devices – the challenge being how to…

Boldon James User Driven Classification Datasheet
With ever-increasing volumes of data to handle, the proliferation of communication channels, a wide range of security threats and the need to provide ready access to systems for customers and partners, organisations need to find more effective ways to…

Boldon James Oil and Gas Classifier Customer Case Study
Resource Excerpt: The natural gas exploration and production industry relies heavily upon emails and large attachments that address a wide variety of commercially‐sensitive issues, including surveys, projected productions, financials, legal responsibilities and implications, etc. The client is a multinational…

Boldon James South West Fire and Rescue Customer Case Study
The Public Services Network (PSN) Code of Connection and the Cabinet Office Security Policy Framework (SPF) outlines standards, best‐ practice guidelines and approaches to protecting UK Government assets and requires organisations to have implemented a protective marking system. The…

Boldon James Allianz Customer Case Study
With this Group-wide focus on security best-practice, Allianz Ireland was aware that, in common with several other OEs, they needed to comply with Group standards for Data Classification. Although they had other compensating security controls (such as encrypting sensitive…

Boldon James Mobile Classifier Sales Flyer
Whilst enterprise mobility brings many benefits, it comes with an increased risk to sensitive data resulting from personal and corporate data being accessed from the same device. Although many organisations recognise the importance of data classification as part of…

Boldon James ITAR Fact Sheet
Protecting critical business data is a continual challenge for global aerospace and defense organizations. For those organizations in the defense and aerospace industries, it is paramount to ensure that sensitive data is protected and controlled in order to adhere…
