Resources

Datasheet

Fortra’s Data Classification Suite for government agencies

The Problem Government agencies collect, use, and store personally identifiable information (PII) about citizens, employees, patients and other individuals every day. Much of this sensitive information is held in unstructured formats such as documents, emails and various other file types, but the exact location and storage of the data is difficult to track. This poses a...
Datasheet

Managing Controlled Unclassified Information: The Role Of Data Classification In Meeting U.S. Government Requirements

Image Introduction After years of deliberation, the U.S. government’s National Archives and Records Administration (NARA) has released more details of its regulation for the protection framework of Controlled Unclassified Information (CUI). The rule is designed to safeguard government data that has not been assigned as confidential...
Datasheet

Collaborate Securely in the Cloud

1. Identify the Business Value of Data Empower your organization to make intelligent, deliberate decisions on how sensitive information is treated in the cloud. With support for automated, suggested, or user-driven classication, Fortra’s Data Classification Suite (DCS) will identify, classify and protect the sensitivity and value of unstructured data. 2. Use Metadata as the...
Datasheet

Fortra’s Data Classification Suite for Microsoft Outlook

Image Fortra’s Data Classification Suite for Microsoft Outlook Whether on the desktop or in the cloud, email continues to be the primary method for sharing information among employees, customers, and partners. This presents a challenge for organizations that must protect information assets while promoting information sharing. The...
Datasheet

Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234

Fortra’s Data Classification Suite (DCS) helps organizations across the finance and insurance sectors meet the information security regulations mandated by the Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234. Noncompliance with APRA can result in substantial fines as well as legal risks and damage to your organization’s reputation. A data breach...
Datasheet

Fortra’s Data Classification Suite (DCS) for Microsoft Office

In today’s collaborative work environments, documents are regularly shared among employees, customers, and partners. This presents a challenge to organizations that must protect information assets while promoting information sharing. The critical first step in solving this challenge is to classify documents at the time of creation, allowing the organization to identify the...
Datasheet

Fortra’s Data Classification Suite (DCS) for Desktop

As the volume of unstructured information grows, the risk of data leakage grows with it. With only a few clicks, users can copy sensitive files from their desktop to email, USB drives, instant messages, and other data leakage points. This increases the risk of serious data leaks, including the disclosure of sensitive information and intellectual property contained in PDFs,...
Datasheet

Access & Protect Data – Anywhere, Anytime

Bridging The Gap To Secure Data The Data Protection Challenge Data is growing exponentially while compliance requirements are expanding and becoming more costly to manage. There are increasing societal implications and expectations about personal data privacy in addition to ensuring the security of your organization’s IP. The explosion of data and complexity of regulatory...
Guide

Classification By Design: The Foundation Of Effective Data Protection Compliance

Image In today’s highly regulated environment, achieving compliance across numerous data privacy laws and regulations is a growing challenge for businesses worldwide. In this paper, we identify the key steps to help organizations sensibly adopt a better data protection posture and with it, build a firm foundation towards compliance...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective...
Guide

Meeting the UK Government Security Classifications (GSC) Requirements

With email the de-facto method of sharing information, government organizations must balance the need to share with the need to protect data from leakage or loss. In an effort to address a problem which is never far from the headlines, the UK Government has revised the requirements in its Government Security Classification (GSC) scheme to ensure information security, privacy...
Guide

Government Classification and Protective Marking Systems

Big data, data governance, data management and securing sensitive data – these are everyday challenges for government organizations around the world, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how classification and protective marking schemes are helping government organizations better secure data. We...
Guide

The Definitive Guide To Data Classification

Image   There are two types of companies: those that run on data and those that will run on data. Infosec professionals will perennially be challenged with more to do than time, budget, and staffing will allow. The most effective method to address this is through prioritization, and in the case of your growing data, prioritization...
Guide

Data Protection Technical Overview

Image What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what...
Guide

Data Discovery And Classification: The Foundation Of Effective Information Governance

Protecting data in accordance with its value or sensitivity is a critical part of information management and data governance. A data discovery and classification exercise, facilitated by the right technology tools, will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity, and ensure that you can demonstrate regulatory compliance by...
Guide

Request A Demo of Fortra's Classifier Suite

Spend less time worrying about your data’s security by spending time with us. During your demo, we will cover: A full run through of Fortra's Classifier Suite, including email and document classification How classification labelling and metadata restricts unauthorized sending The need to classify at a granular level Integration with downstream data protection tools, such...
Datasheet

SAFEMail Client & Server

A Secure Messaging Solution for Defence and Intelligence Environments Using Microsoft Outlook & Exchange At A Glance SAFEmail® Client and Server extends COTS Microsoft Outlook and Exchange message functionality to enhance the systems to support Medium and High Grade messaging capabilities. The modular architecture of SAFEmail provides the flexibility required for defense and...
Datasheet

Enhancing Microsoft AIP with Classifier

Microsoft Information Protection (MIP) provides a data security infrastructure across Microsoft applications, as part of the MS Azure subscription package. MIP is a cloud-based solution which allows you to classify and label Office files and Outlook emails, which in turn drives Microsoft Azure Rights Management (RMS). The underlying aim of MIP is to help organizations...
Datasheet

Enhancing Data Governance: Eliminating the Known Unknown

When discussing data governance tools, it’s no secret the topic of false positives is seen as one of the biggest downfalls. False positives occur when an event is triggered by the data governance policy in error, for example, a combination of numbers could be identified as a credit card number, or a reference number. This means that data can be quarantined unnecessarily,...