What is FTP Security? Securing FTP Usage
File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
File Transfer Protocol is widely used in corporate networks yet has inherent data security risks. Here’s an overview of some of the challenges of FTP security and methods to address them.
After the "year of the healthcare breach," many healthcare organizations are taking steps to improve their data protection strategies to meet regulatory requirements and secure health information against costly data breaches. Here's an overview of the data protection requirements for compliance and beyond.
Cloud storage and file sharing apps bring a many benefits to enterprises due to their scalability and convenience. However, when not managed properly, file sharing can have serious implications from a data security standpoint. Read on to learn about the risks of unmanaged file sharing and how companies can securely adopt file sharing systems.
Learn about data discovery and the role it plays in many data protection solutions in Data Protection 101, our series on the fundamentals of data security.
Deciding between endpoint DLP and network DLP isn't always a simple task. Watch our video for a breakdown of the key differences between each approach and questions to help you choose the best solution for your data protection needs.
File fingerprinting, also known as data fingerprinting or document fingerprinting, is a technique employed by many network data loss prevention solutions for identifying and tracking data across a network. Read on to learn more about fingerprinting and the security benefits of a DLP solution with data fingerprinting capabilities.
Learn about common uses for network data loss prevention solutions, from insider threat protection to compliance.
Learn how public key cryptography works as well as common uses for this cryptographic method.
Get a definition of content inspection and learn how content inspection technology plays a key role in data loss prevention and regulatory compliance.
Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks. Read on to learn how to better protect PII from unintentional exposure.