by Varsha K | Jan 3, 2021 | Compliance and Regulations, Cyber security, Data Classification, Data Identification, Data Protection, Data Security, Regulatory Compliance
In today’s global economy, businesses must be compliant with standards established by various countries so they can service customers around the world. One such regulation you can’t afford to ignore is the GDPR (General Data Protection Regulation), which is the core...
by Varsha K | Dec 22, 2020 | Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Protection, Data Security, Endpoint Protector Enterprise, Endpoint Security
In an exciting turn of events for Apple developers, Amazon has announced that, for the first time, macOS will be available on its Amazon Web Services (AWS) cloud. As of 30th November 2020, Amazon Elastic Compute Cloud (EC2) Mac instances for macOS can be...
by Varsha K | Nov 16, 2020 | Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Protection, Data Security
With digitalization efforts ramping up over the course of the last decade, most companies nowadays collect and use data on a daily basis. Ranging from sensitive information of employees and customers such as Personally Identifiable Information (PII) to confidential...
by Varsha K | Nov 15, 2020 | Access Control, Cyber security, Data Loss Prevention, Data Protection, Data Security
New product tiers streamlined to discovery and response levels Safetica Discovery for improved detection of sensitive data for a comprehensive company auditSafetica Protection for management of data security incidents, their investigation, and responseSafetica...
by Varsha K | Oct 27, 2020 | Data Leakage Prevention - DLP, Data Loss Prevention (DLP), Data Protection, Data Security, Endpoint Protector Enterprise
Data at rest refers to all data stored on devices that are not transferred from network to network or device to device. It includes data saved locally on computer hard drives, archived in databases, file systems, and storage infrastructure. Since it does not travel...
by Varsha K | Oct 12, 2020 | Cross Domain Solution, Cyber security, Data Loss Prevention (DLP), Data Protection, Data Security, Endpoint Protector Enterprise
Data in motion, or data in transit, is data moving from one location to another, whether it’s between computers, virtual machines, from an endpoint to cloud services or through a private network and across untrusted internet connections. Once it arrives at its...