Resources

On-Demand Webinar

Accelerating Zero Trust: Data Labeling and Tagging for Microsoft Outlook and Office Applications

In Fortra's joint webcast with Carahsoft, Accelerating Zero Trust: Data Labeling and Tagging Microsoft Outlook and Office Applications, attendees heard from Fortra's very own George Hibler as he dove into Zero Trust architecture and why data labeling and tagging are critical components. Watch the full, recorded webcast to learn more about: Navigating the unique data landscape...
Video

CUI Compliance with Fortra's Data Classification Suite (DCS) On-Demand Demo

Watch a short demo to see the Fortra CUI configuration in action Navigate CUI complexities with confidence Automatically apply CUI markings Apply the full list of CUI categories and subcategories Manually tailor Banner and Portion markings Endpoint configuration for CUI safeguarding and dissemination controls Template packs to get your organization up and running with CUI...
Guide

Meeting CUI Requirements with Fortra’s Data Classification Suite Solutions

Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program defines a uniform policy  for the treatment of unclassified information that requires safeguarding or dissemination controls. The CUI Executive Order specifically adopts, defines, and institutes CUI as the single designation for all information formerly designated by Sensitive but...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective...
Guide

Data Protection Technical Overview

Image What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what...
Guide

The 5 Steps To Effective Data Protection

Image Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your file servers and document stores, not protected and unrecoverable because no one knows where to find it. Using data classification helps you regain control over your...