Resources

Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized persons prohibited or...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective Markings, what these...
Guide

Data Protection Technical Overview

What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what makes our technology so unique.
Guide

The 5 Steps To Effective Data Protection

Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your file servers and document stores, not protected and unrecoverable because no one knows where to find it. Using data classification helps you regain control over your unstructured data. By involving your users in data classification, they will...