A Slicker, Easier Way to Use EasyLock

A Slicker, Easier Way to Use EasyLock

Data has never been more vulnerable than it is today. Companies struggle to keep their data secure as relentless waves of attacks strike at the core of some of the world’s most established brands and trusted online services. Added pressure comes from the adoption of...
How to Prepare your Data at Rest for GDPR Compliance

How to Prepare your Data at Rest for GDPR Compliance

With the GDPR implementation around the corner, companies processing EU data subjects’ personal information need to step up their data protection policies and take decisive action to reach compliance. Under the new legislation, organizations will no longer have the...
How Data Classification and Data Loss Prevention Go Hand in Hand

How Data Classification and Data Loss Prevention Go Hand in Hand

In an age when data can no longer be left unsorted on company networks and data transparency and the protection of sensitive data have become key to reaching compliance with legislations such as the EU’s General Data Protection Regulation (GDPR) and HIPAA,...
Matrix42 Acquires Endpoint Security Expert EgoSecure

Matrix42 Acquires Endpoint Security Expert EgoSecure

Matrix42 expands its portfolio for endpoint security Matrix42 expands its portfolio for endpoint security with key features, such as data encryption, interface and application checks, and security monitoring. The specialist for digital workspace management acquired...
TOP 10 Endpoint Protector Features According to Our Clients

TOP 10 Endpoint Protector Features According to Our Clients

We always enjoy hearing from our customers and partners and their experience with the Endpoint Protector product family. It’s not only a matter of professional satisfaction: we build our products with our clients’ needs always before us, often adding new features from...
5 Tips for Choosing the Best DLP solution for Macs

5 Tips for Choosing the Best DLP solution for Macs

macOS devices are becoming an ever more prominent presence in the work place. This is chiefly due to two trends: bring your own device (BYOD) and employee choice policies. The first allows employees to bring their own devices onto the company network, while the second...