Resources

Blog

What Is Data Governance? A Quick Guide

The explosion of data and the velocity of its delivery have compelled organizations to incorporate an integrated set of processes, practices, and policies to guide their data use. Data governance ensures there’s a well-defined, company-wide framework that can foster proper data stewardship. What Is Data Governance? Data Governance refers to managing the availability, usability, integrity, and...
Blog

Data Classification: Enabling Compliance with GDPR, HIPAA, PCI DSS, SOX, & More

Learn how Fortra's Data Classification Suite can facilitate compliance with GDPR, HIPAA, PCI DSS, SOX, and other prominent data privacy regulations.
Blog

The Benefits of Pairing Digital Guardian with Fortra's Data Classification Suite

Digital Guardian’s data classification capabilities have helped organizations better understand their data for years but for businesses looking to empower further their users and automate their data protection programs, there are additional options available. Fortra's acquisition of Boldon James and Titus three years ago has brought a wealth of data classification knowledge and technology under...
Blog

Introducing Fortra's Data Classification

We’re writing today to share news about an exciting new beginning for the Titus and Boldon James products. Fortra has long been a global expert in software for data classification and we’re thrilled to share that beginning today, the two brands will live under the same roof, on a new microsite, as Fortra’s Data Classification. Whether you're looking for product information , educational data...
Case Study

Dow Corning Uses Classification Labels to Help Protect Intellectual Property

Large organizations understand the importance of properly handling sensitive information both within and outside of the company. Instituting an organization-wide IP protection program to lock down access to valuable information is crucial, and key to this is a clear and consistent global standard for handling email and document information with the application of labels.
Case Study

Large Canadian Financial Institution Enhances Data Protection Strategy with McAfee and Fortra

When sensitive information gets into the wrong hands, the costs can be severe: fines, lawsuits, embarrassing headlines, loss of intellectual property, even risk to public safety. Using techniques such as data classification and content validation, Fortra's Data Classification Suite (DCS) enforces policy and mitigates data loss - raising user awareness and preventing data breaches at the source.
Case Study

Morpho Classifies and Protects Sensitive Information and Meets Export Control Requirements with Fortra

Morpho, Safran’s security business, addresses emerging security requirements for individuals, businesses and countries. Its expertise spans three core markets: identification of persons and goods, production and personalization of e-documents, detection of threats and substances. Morpho has over 7,700 employees in more than 40 countries. With integrated systems operating in more than 100 countries...
Blog

Data Categorization or Data Classification?

In the last few years, there has been a dramatic shift from data classification being a “nice to have” tool, to becoming a necessity. Behind this momentum, private companies and organizations are implementing data classification using “traditional” taxonomies and schemas that work for governments and militaries but don’t necessarily translate well into the workflow or culture of commercial...
Case Study

Classifier Suite Extends Classification Support At EU Agency

The Customer is a newly established EU agency to provide a long-term solution for the operational management of large-scale IT systems instrumental to the asylum, border management and migration policies of the EU. The agency was established in 2011, with over 200 employees and have offices throughout Europe.
Blog

What Is Data Classification?

What Is Data Classification And What Can It Do For My Business? Data classification is an approach to identifying, protecting and managing information which has rapidly become best practice. Implemented as part of a layered security strategy, it enables an enterprise to defend itself against a variety of threats - from aggressive outsiders to untrained or well-meaning insiders - while unlocking...