What’s New in Endpoint Protector 5.2.0.5

What’s New in Endpoint Protector 5.2.0.5

A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....
5 Best Practices for PCI DSS Compliance

5 Best Practices for PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements that helps businesses protect their payment systems from breaches, fraud and theft of cardholder data. Developed by the PCI Security Standards Council, PCI DSS...
Reducing Security Risks with Cross-Platform DLP

Reducing Security Risks with Cross-Platform DLP

Nowadays, the majority of businesses work with a mixture of device types and operating systems. Cross-platform Data Loss Prevention (DLP) solutions help diminishing security vulnerabilities in heterogeneous IT environments. Over the past decade, the organizations have...
5 Ways Big Companies Protect their Data

5 Ways Big Companies Protect their Data

In recent years, data protection has become a must for all companies, no matter their size. While big organizations suffering data breaches such as Facebook, Orbitz or Quora are the ones making headlines, a more troubling reality awaits small and mid-sized companies:...
Data Protection Regulations in the Middle East

Data Protection Regulations in the Middle East

The EU’s General Data Protection Regulation has sparked a global legislative movement that aims to vouchsafe individuals’ privacy and curb data vulnerability. While some of these new regulations were years in the making, many were directly influenced by the...
Keeping Source Code Safe with Data Loss Prevention

Keeping Source Code Safe with Data Loss Prevention

When developing new software and algorithms, companies’ number one concern is that they do the job they are meant to do and function efficiently. Cybersecurity features, when implemented, are meant to ensure the protection of users’ data and guard against malicious...