Resources

Datasheet

GDPR compliance support that works for your business

Since the launch of GDPR in 2018, organizations have been forced to change their business practices in order to remain compliant. GDPR compliance requires organizations to have visibility into what data they possess, and where it is located. This remains a challenge for many organizations who don’t yet have solutions in place to understand where their data lives and what it...
Guide

Why Zero Trust Needs Data Classification To Work

Image If you’re in charge of securing data at your organization, you already know that classifying it is foundational for data security. It’s especially the case for organizations looking to take a zero trust approach to data protection. What’s Inside: What is Zero Trust, and what is the right approach? Adding context to data, and...
Guide

Three Steps to Protecting PII in the Government

This guide discusses the three key steps that must be taken by government organizations to protect PII they have in their possession. Identify your PII through marking and metadata tagging Educate and build awareness of the organization’s PII among employees, contractors, and partners Select the appropriate controls to protect PII ...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized...
Guide

Meeting CUI Requirements with Fortra’s Data Classification Suite Solutions

Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program defines a uniform policy  for the treatment of unclassified information that requires safeguarding or dissemination controls. The CUI Executive Order specifically adopts, defines, and institutes CUI as the single designation for all information formerly designated by Sensitive but...
Guide

Integrating Information Labelling and Microsoft AD RMS

This guide will examine the challenges of content protection and user acceptance of this technology. It provides an overview of Microsoft’s Active Directory Rights Management Services (AD RMS) and its integration with Fortra Data Classification. This combination provides a powerful and intuitive solution for policy compliance and information protection. ...
Guide

How metadata will accelerate your data protection strategy

Reading this guide will enable you to: Learn how Fortra’s Data Classification Suite leverages metadata to achieve extensibility Identify best practices for a flexible schema that matches your data protection policy Implement metadata which will trigger downstream technologies like encryption or data loss prevention (DLP or CASB) Image ...
Guide

Enhancing Microsoft MIP In An Era Of Enhanced Regulatory Obligation

Image The data protection landscape and compliance environment has changed significantly with the implementation of GDPR, and the many other privacy regulations that have followed suit. It is no longer about what organizations think they need to be doing in order to control their data, but what they are being told they need to do by...
Datasheet

Fortra’s Data Classification Suite for Military

Swift action to commands based on operational understanding are hallmarks of a high-performing and responsive military. And the exchange of classified and even unclassified data – often in electronic form – are the lifeblood for any military organization to thrive and achieve mission success. The key is keeping sensitive data out of the hands of the wrong people. “With the...
Datasheet

Extending Microsoft RMS to Mobile

Mobile Users Can Now Access And Share RMS Protected Information On Mobile Devices With the growth of mobile and cloud technologies it is more important than ever to apply protection that travels with the data. If your information is encrypted it is always protected, even if lost or stolen. Microsoft® Rights Management Services (RMS) provides protection for sensitive documents...
Guide

Data Classification – Why You Need A Specialist Provider

The security landscape has changed in the last couple of years, and organizations need to think about future-proofing their environment. Data classification plays a crucial part of any data security, and organizations need to look to specialist providers for solutions that work for the business needs. Our latest guide demonstrates why organizations need to be picky when it...
Guide

Data Classification: The First Step to Protecting Unstructured Data

Data security breaches can have a huge impact on an organization’s reputation, shattering customer trust and loyalty, so it’s unsurprising that data protection is higher up the boardroom agenda than it’s ever been. In this white paper, we look at how the threat landscape has changed for businesses, the drivers behind the change – both technical and cultural, and the challenges...
Guide

Best Practices for a Successful DLP Deployment

Preventing data loss is much like being engulfed in a swarm of mosquitos – a potential data ‘bite’ can come from anywhere at any time. Understanding how and why data loss can occur is essential to building successful Data Loss Prevention (DLP) policies. Here are some of the key challenges that need to be addressed for a successful DLP deployment. ...
Guide

10 Data Classification Mistakes to Avoid

Count Down the 10 Data Classification Mistakes to Avoid Nearly every CISO knows the importance and value of classifying their data. Having a data classification policy in place makes it easier to locate and retrieve data; it’s also a must for any effective data security plan, especially if you’re looking to address any risk management or compliance needs. While data...
Datasheet

Fortra’s Data Classification Suite Corporate Overview

Image Our products prevent data loss by increasing user security awareness and by enforcing policies that protect sensitive information in emails, documents, and other file types – on the desktop, on mobile devices, and in the Cloud. DOWNLOAD PDF ...
Datasheet

Email Protective Marking Standards (EPMS) Australia

The Australian Government Email Protective Marking Standard (EPMS) is a set of requirements that organizations must follow in order to protect sensitive and classified information that is sent or received by email. The Australian EPMS has been updated several times since its origin in 2005. Read our solution brief to learn about the changes to Email Protective Marking...