This month we have joined the Linux Foundation as members. The Linux Foundation is a non-profit organization founded in 2007 by the merger of the Open Source Development Labs and the Free Standards Group. The association promotes and supports Linux and the open source projects trough training, events, workgroups, publications and other programs.
“The Linux Foundation protects and promotes the ideals of freedom and generous collaboration established through the development of Linux, and shares these ideals to power any endeavor aiming to make the future a better place in which to live.”
Source: Linux Foundation website
Why we joined Linux Foundation?
We had several reasons to become members of the Linux Foundation. The most important one is the fact that we develop Data Loss Prevention (DLP) and Mobile Device Management (MDM) solutions which are Linux based. As developers …Read more
Every year, some of the most influential companies and professionals gather for 5 days at the flagship information security event – RSA Conference USA held in San Francisco. Innovation is at its best at this event, always bringing fresh and relevant topics.
For us, it is the second year we attend as exhibitors and the experience from last year left us excited for the 2016 edition. More than 600 speakers will address key issues regarding information security, like insider threats, the dark web and cyber espionage, IoT security and others. You can find the full agenda here. If the sessions or exhibitors did not convince you to attend this year’s RSA, here are more reasons.
Data Loss Prevention (DLP) is a hot topic so we are happy to welcome you at our booth #N4328 in the north area of the expo with live demos and great giveaways.
Additionally, we will participate as members of the Trusted Computing…Read more
We talked about the top data security concerns for 2016+ in our previous article, so now we want to continue by giving some pointers on how to protect data against these threats.1. Increase your budget for data security
One of the problems most organizations face is the low budget they assign for data security, being seen as a low priority. In the last few years, budgets have grown, but it happened for big companies and enterprises, leaving small and medium businesses behind. The pressure to increase budgets comes from several directions: industry rules and regulations (HIPAA, PCI, SOX, etc.), more and more breaches that come to light, more complex work environments with more platforms and devices that store sensitive data, etc. With things changing and threats being more sophisticated, increasing budgets to invest in security solutions that prevent data breaches is mandatory.
Statistics about Cloud Services, Shadow IT, Wearables, and IoT show that they are amongst the top data security concerns for organizations. Now, more than ever, apps and interconnected devices are part of our lives and, with data moving back and forth between wearables and smartphones / computers, it is no wonder organizations are becoming more vulnerable.
Cloud services like file sharing tools, social media, etc. are a top data security concern for many organizations due to the fast adoption among employees who use them for easy collaboration and uploading / copying files. Most of the time, these services and applications are not authorized by IT departments but through a Data Loss Prevention solution, businesses have the option to limit data transfers only to trusted web addresses.
Shadow IT is a concern for 71% of security professionals, being justified by the fact that uncontrolled…Read more
As we’re getting ready to circle the 28th of January on the calendar, it’s time to take a second and wish everybody Happy Data Privacy Day! If you’re from a European country, then we meant Happy Data Protection Day!What is Data Privacy Day?
Data Privacy Day is an international holiday created in 2007 that takes place every 28th of January. Initiated by the Council of Europe, the Data Privacy & Protection Day it is recognized by 47 European states, USA and Canada and its purpose is to raise awareness and promote privacy and data protection best practices. With the ever increasing data breaches occurring worldwide and numerous privacy and data security scandals, multiple global organizations have embraced Data Privacy Day.Why should I care?
It’s not just about corporate data, leaked surveillance documents, celebrity naked pictures, personal bank details and social media…Read more
In our encounters and conversations with IT Administrators, IT Managers and data security staff, there are always some questions that pop-up. Some of them are valid concerns or doubts while others are signs of confusion, most of them being fed by vendors’ different approaches to DLP.
Here are 6 frequently asked questions about Data Loss Prevention (DLP):1. Can I detect malware with DLP?
No. Data Loss Prevention is a technology that prevents data breaches and detects confidential data being transferred, used or stored on endpoints based on specific detection techniques, like data matching, rule and regular expression matching, keywords, etc. Dedicated DLP solutions focus on insider threats, while antivirus solutions, on outsider threats. However, there are antivirus solutions that provide light DLP capabilities, like blocking data transfers to e-mail.2. Can I block the…Read more
Recently, I’ve had the pleasure to meet the creator of Pretty Good Privacy (PGP) and pioneer in cryptography, Phil Zimmermann. For all data security experts and vendors, he is an inspiration, especially because his e-mail encryption software became the most widely used in the world, even though he was persecuted by the government, he didn’t have any investors or at least paid staff. It is proof that great products do not need millions of dollars for marketing or large sales teams.
It is interesting how data security evolved since 1991 and how dynamic the industry is today. With new technologies that have emerged and reinterpretation of the old ones, our choices have become more difficult. E-mail encryption is still widely being used successfully. Unfortunately, not only e-mails have to be encrypted to secure data and prevent data breaches.
There is a variety of exit points starting…Read more
I understand why at the end of the year everybody feels the need to look back, to review company’s results and actions, establish next year’s goals, and leave everything in order as you step in a new beginning. It is a great way of keeping track of progress, but also to honor time passing by and allowing yourself / your employees’ to feel nostalgic and excited for what’s next.
We had an amazing year, with ups and downs, but mostly ups, with product updates, bigger team, awards, events, and accomplishments we are proud of.
Endpoint Protector 4, our flagship Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) product has had 3 major updates. Features like integration with SIEM solutions, compatibility with Thin Clients, with Mac OS X El Capitan, many enhancements at the granularity level, with Blacklists, Whitelists, Thresholds, features to support enterprises…
Whether you work with a small or a large company, making sure a quality endpoint protection system is put in place definitely comes first on your to-do list. After all, if data security is not taken seriously, you can’t expect potential clients to take the company seriously. Plus, it will completely tarnish the reputation of the brand, since the general audience will have a hard time placing their trust in it.
Even if you think everything is in order, it’s important to keep in mind that IT security trends tend to shift quite often. This is why it’s vital to ensure your endpoint protection policies will be able to face whatever challenges 2016 will throw at it.
Here are some useful pointers we believe you need to keep in mind if you want to make sure everything is ready for the New Year. Some of them might seem common knowledge to you, but keep in mind that even the most common advice…
Today’s organizations hold extremely sensitive information in their workstations. From passwords to personal emails, financial records, customer databases, an external attacker, a malicious employee or even an innocent, but negligent employee, are able to leak sensitive data and condemn the organization to failure, if proper solutions are not implemented.
While DLP is crucial to prevent such incidents from happening and cannot be replaced, it can be used with other complementary technologies so that it will improve overall data security.1. Encryption
By encrypting files or emails, you will make sure that they are protected from unwanted access. If you use encryption, all your confidential information will be safe even if you decide to move it to a different device.
For example, EasyLock is a cross-platform data encryption solution that is going to help you …Read more