Resources

Datasheet

Managing Controlled Unclassified Information: The Role Of Data Classification In Meeting U.S. Government Requirements

Introduction After years of deliberation, the U.S. government’s National Archives and Records Administration (NARA) has released more details of its regulation for the protection framework of Controlled Unclassified Information (CUI) . The rule is designed to safeguard government data that has not been assigned as confidential or secret, but which should not necessarily be made public, as it is...
Datasheet

Collaborate Securely in the Cloud

1. Identify the Business Value of Data Empower your organization to make intelligent, deliberate decisions on how sensitive information is treated in the cloud. With support for automated, suggested, or user-driven classication, Fortra’s Data Classification Suite (DCS) will identify, classify and protect the sensitivity and value of unstructured data. 2. Use Metadata as the Foundation for Secure...
Datasheet

Fortra’s Data Classification Suite for Microsoft Outlook

Fortra’s Data Classification Suite for Microsoft Outlook Whether on the desktop or in the cloud, email continues to be the primary method for sharing information among employees, customers, and partners. This presents a challenge for organizations that must protect information assets while promoting information sharing. The critical first step in solving this challenge is to classify email at the...
Datasheet

Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234

Fortra’s Data Classification Suite (DCS) helps organizations across the finance and insurance sectors meet the information security regulations mandated by the Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234. Noncompliance with APRA can result in substantial fines as well as legal risks and damage to your organization’s reputation. A data breach resulting from...
Datasheet

Fortra’s Data Classification Suite (DCS) for Microsoft Office

In today’s collaborative work environments, documents are regularly shared among employees, customers, and partners. This presents a challenge to organizations that must protect information assets while promoting information sharing. The critical first step in solving this challenge is to classify documents at the time of creation, allowing the organization to identify the information’s value, and...
Datasheet

Fortra’s Data Classification Suite (DCS) for Desktop

As the volume of unstructured information grows, the risk of data leakage grows with it. With only a few clicks, users can copy sensitive files from their desktop to email, USB drives, instant messages, and other data leakage points. This increases the risk of serious data leaks, including the disclosure of sensitive information and intellectual property contained in PDFs, videos, images, and...
Datasheet

Access & Protect Data – Anywhere, Anytime

Bridging The Gap To Secure Data The Data Protection Challenge Data is growing exponentially while compliance requirements are expanding and becoming more costly to manage. There are increasing societal implications and expectations about personal data privacy in addition to ensuring the security of your organization’s IP. The explosion of data and complexity of regulatory governance combined with...
Guide

Classification By Design: The Foundation Of Effective Data Protection Compliance

In today’s highly regulated environment, achieving compliance across numerous data privacy laws and regulations is a growing challenge for businesses worldwide. In this paper, we identify the key steps to help organizations sensibly adopt a better data protection posture and with it, build a firm foundation towards compliance. This paper includes: How data breaches are driving regulatory change...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective Markings, what these...
Guide

Meeting the UK Government Security Classifications (GSC) Requirements

With email the de-facto method of sharing information, government organizations must balance the need to share with the need to protect data from leakage or loss. In an effort to address a problem which is never far from the headlines, the UK Government has revised the requirements in its Government Security Classification (GSC) scheme to ensure information security, privacy and accountability...
Guide

Government Classification and Protective Marking Systems

Big data, data governance, data management and securing sensitive data – these are everyday challenges for government organizations around the world, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how classification and protective marking schemes are helping government organizations better secure data. We will delve into...
Guide

The Definitive Guide To Data Classification

There are two types of companies: those that run on data and those that will run on data. Infosec professionals will perennially be challenged with more to do than time, budget, and staffing will allow. The most effective method to address this is through prioritization, and in the case of your growing data, prioritization comes from data classification. In this guide you will learn what...
Guide

Data Protection Technical Overview

What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what makes our technology so unique.
Guide

Data Discovery And Classification: The Foundation Of Effective Information Governance

Protecting data in accordance with its value or sensitivity is a critical part of information management and data governance. A data discovery and classification exercise, facilitated by the right technology tools, will enable an enterprise to find its sensitive data, label it with the appropriate sensitivity, and ensure that you can demonstrate regulatory compliance by applying controls and...
Guide

Request A Demo of Fortra's Classifier Suite

Spend less time worrying about your data’s security by spending time with us. During your demo, we will cover: A full run through of Fortra's Classifier Suite , including email and document classification How classification labelling and metadata restricts unauthorized sending The need to classify at a granular level Integration with downstream data protection tools, such as DLP We will show you...
Datasheet

SAFEMail Client & Server

A Secure Messaging Solution for Defence and Intelligence Environments Using Microsoft Outlook & Exchange At A Glance SAFEmail® Client and Server extends COTS Microsoft Outlook and Exchange message functionality to enhance the systems to support Medium and High Grade messaging capabilities. The modular architecture of SAFEmail provides the flexibility required for defense and intelligence messaging...
Datasheet

Enhancing Microsoft AIP with Classifier

Microsoft Information Protection (MIP) provides a data security infrastructure across Microsoft applications, as part of the MS Azure subscription package. MIP is a cloud-based solution which allows you to classify and label Office files and Outlook emails, which in turn drives Microsoft Azure Rights Management (RMS). The underlying aim of MIP is to help organizations capitalize on the information...
Datasheet

Enhancing Data Governance: Eliminating the Known Unknown

When discussing data governance tools, it’s no secret the topic of false positives is seen as one of the biggest downfalls. False positives occur when an event is triggered by the data governance policy in error, for example, a combination of numbers could be identified as a credit card number, or a reference number. This means that data can be quarantined unnecessarily, stopping people going...
Datasheet

Australian Privacy Act – Privacy Amendment Fact Sheet

Protect personal data and avoid financial penalties and reputational damage in the face of constantly evolving privacy legislation. Privacy laws are front and center for most countries in 2022, and Australia is no exception. The Australian Privacy Act addresses the management and handling of personal data. It applies to any organization that holds data on Australian citizens, irrespective of where...