Resources

Guide

Data Protection in the Enterprise

Learn Why Fortra Classification Suite is a better option for organizations that need scalable privacy policies for protecting complex data landscapes.
Guide

Achieving Compliance with India’s Personal Data Protection Act

India's Digital Personal Data Protection (DPDP) Act is a ground-breaking legislation that balances the rights of individuals to protect their personal data with the necessity of processing such data for lawful purposes. The Act imposes obligations on Data Fiduciaries, those processing data, and outlines the rights and duties of Data Principals, individuals to whom the data pertains. It also...
Guide

Why Zero Trust Needs Data Classification To Work

If you’re in charge of securing data at your organization, you already know that classifying it is foundational for data security. It’s especially the case for organizations looking to take a zero trust approach to data protection. What’s Inside: What is Zero Trust, and what is the right approach? Adding context to data, and why this is important How data classification and Zero Trust go hand in...
Guide

Three Steps to Protecting PII in the Government

This guide discusses the three key steps that must be taken by government organizations to protect PII they have in their possession. Identify your PII through marking and metadata tagging Educate and build awareness of the organization’s PII among employees, contractors, and partners Select the appropriate controls to protect PII
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized persons prohibited or...
Guide

Meeting CUI Requirements with Fortra’s Data Classification Suite Solutions

Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program defines a uniform policy for the treatment of unclassified information that requires safeguarding or dissemination controls. The CUI Executive Order specifically adopts, defines, and institutes CUI as the single designation for all information formerly designated by Sensitive but Unclassified (SBU), For...
Guide

Integrating Information Labelling and Microsoft AD RMS

This guide will examine the challenges of content protection and user acceptance of this technology. It provides an overview of Microsoft’s Active Directory Rights Management Services (AD RMS) and its integration with Fortra Data Classification. This combination provides a powerful and intuitive solution for policy compliance and information protection.
Guide

Data Classification – Why You Need A Specialist Provider

The security landscape has changed in the last couple of years, and organizations need to think about future-proofing their environment. Data classification plays a crucial part of any data security, and organizations need to look to specialist providers for solutions that work for the business needs. Our latest guide demonstrates why organizations need to be picky when it comes to a single vendor...
Guide

Data Classification: The First Step to Protecting Unstructured Data

Data security breaches can have a huge impact on an organization’s reputation, shattering customer trust and loyalty, so it’s unsurprising that data protection is higher up the boardroom agenda than it’s ever been. In this white paper, we look at how the threat landscape has changed for businesses, the drivers behind the change – both technical and cultural, and the challenges involved in managing...
Guide

10 Data Classification Mistakes to Avoid

Count Down the 10 Data Classification Mistakes to Avoid Nearly every CISO knows the importance and value of classifying their data. Having a data classification policy in place makes it easier to locate and retrieve data; it’s also a must for any effective data security plan, especially if you’re looking to address any risk management or compliance needs. While data classification is critical to...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective Markings, what these...
Guide

Meeting the UK Government Security Classifications (GSC) Requirements

With email the de-facto method of sharing information, government organizations must balance the need to share with the need to protect data from leakage or loss. In an effort to address a problem which is never far from the headlines, the UK Government has revised the requirements in its Government Security Classification (GSC) scheme to ensure information security, privacy and accountability...
Guide

Government Classification and Protective Marking Systems

Big data, data governance, data management and securing sensitive data – these are everyday challenges for government organizations around the world, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how classification and protective marking schemes are helping government organizations better secure data. We will delve into...
Guide

The Definitive Guide To Data Classification

There are two types of companies: those that run on data and those that will run on data. Infosec professionals will perennially be challenged with more to do than time, budget, and staffing will allow. The most effective method to address this is through prioritization, and in the case of your growing data, prioritization comes from data classification. In this guide you will learn what...
Guide

Data Protection Technical Overview

What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what makes our technology so unique.
Guide

Data Discovery And Classification: The Foundation Of Effective Information Governance

Protecting data in accordance with its value or sensitivity is a critical part of information management and data governance. A data discovery and classification exercise, facilitated by the right technology tools, will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity, and ensure that you can demonstrate regulatory compliance by applying controls and...