Resources

On-Demand Webinar

Accelerating Zero Trust: Data Labeling and Tagging for Microsoft Outlook and Office Applications

In Fortra's joint webcast with Carahsoft, Accelerating Zero Trust: Data Labeling and Tagging Microsoft Outlook and Office Applications, attendees heard from Fortra's very own George Hibler as he dove into Zero Trust architecture and why data labeling and tagging are critical components. Watch the full, recorded webcast to learn more about: Navigating the unique data landscape...
Blog

Data Classification: Enabling Compliance with GDPR, HIPAA, PCI DSS, SOX, & More

Learn how Fortra's Data Classification Suite can facilitate compliance with GDPR, HIPAA, PCI DSS, SOX, and other prominent data privacy regulations.
On-Demand Webinar

The Digital Personal of Data Protection Act of India 2023

The new Digital Personal Data Protection (DPDP) Act impacts all organizations, both domestic and international, that process personal data of individuals in India. Stay ahead of the curve and ensure a data-secure future for your organisation by watching our video. We will cover the following: What is the DPDP Act? Who does the DPDP apply to? What is Personal Data? ...
Guide

Achieving Compliance with India’s Personal Data Protection Act

Image India's Digital Personal Data Protection (DPDP) Act is a ground-breaking legislation that balances the rights of individuals to protect their personal data with the necessity of processing such data for lawful purposes. The Act imposes obligations on Data Fiduciaries, those processing data, and outlines the rights and duties of...
On-Demand Webinar

Why Data Classification is the Cornerstone of Regulatory Compliance

Achieving compliance across a wealth of new international data compliance regulations is a growing challenge, with many organizations struggling to keep pace. In addition, the rise of globally dispersed workforces and hybrid working environments are placing extraordinary pressure on every organization’s security. Today, data classification offers an increasingly persuasive...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized...
Guide

Meeting CUI Requirements with Fortra’s Data Classification Suite Solutions

Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program defines a uniform policy  for the treatment of unclassified information that requires safeguarding or dissemination controls. The CUI Executive Order specifically adopts, defines, and institutes CUI as the single designation for all information formerly designated by Sensitive but...
Guide

Enhancing Microsoft MIP In An Era Of Enhanced Regulatory Obligation

Image The data protection landscape and compliance environment has changed significantly with the implementation of GDPR, and the many other privacy regulations that have followed suit. It is no longer about what organizations think they need to be doing in order to control their data, but what they are being told they need to do by...
Blog

Data Classification in Finance

Why should the financial services sector adopt a data classification strategy?   Because more than nine out of ten (95%) of data breaches are financially motivated, according to this year’s Verizon Data Breach Investigations Report. Within the finance and insurance sector specifically, the rates were as high as 97% — no surprise there.   However, what may be surprising is...
Blog

Complying With the Export Administration Regulations (EAR): Everything You Need To Know

Image The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for reasons of national security and foreign policy. Here is a breakdown of the essentials your organization should know for proper...
Blog

What Is the Federal Risk and Authorization Management Program (FedRAMP)?

Image An Introduction to FedRAMP In late 2011, the Office of Management and Budget under the Obama Administration released a memorandum that introduced the Federal Risk and Authorization Management Program (FedRAMP), noting that “[in the two years prior], the Administration worked in close collaboration with the National Institute of...
Blog

What Is ISO 27001 and How Can It Help Your Organization?

Image What Is ISO 27001? Everything You Need To Know About ISO 27001:2022 ISO 27001, also known as ISO/IEC 27001, is a widely recognized international standard that defines best practices for implementing and managing information security for an Information Security Management System, or ISMS. The risk-based standard was published...
Blog

Embracing Data Privacy Regulations to Earn Consumer Trust

Image Trust is one of the most important aspects of business, especially when it comes to the collection and use of people’s personal data. As consumers advocate for organizations to take more precautions in handling their personal data, legislative bodies are listening, and more data privacy regulations are being passed globally each...
Blog

Comparing GDPR and CCPA

Image The GDPR in Europe was one of the first major data privacy regulations to be implemented in recent times, followed closely by the CCPA in the United States. And since its enforcement, GDPR has been seen as the “gold standard” when it comes to data protection regulations. However, it is important to remember that each data...