The risk of external devices

The risk of external devices

Most of us own and use external devices for data transfers. Be it USB flash drives, external drives, cameras or mobile phones, they all make it easy and comfortable to transfer important data. On the other hand, they also bring a couple of security problems that...
Detect sensitive content with Safetica 8.3

Detect sensitive content with Safetica 8.3

Safetica originally started out as a context DLP. Back in the day, this was the market standard. In the past few years, however, the requirements for regulatory compliance and the consecutive switch of working tools have resulted in a new DLP need. Nowadays it is...
Safetica 8.3 – Reduce the risk of data leaks with the reinvented Web and Application control

Safetica 8.3 – Reduce the risk of data leaks with the reinvented Web and Application control

Let’s take a sneak peek at what Safetica 8.3 has in store for you. After introducing 3 ways to protect your data, we will now present how to stop malware and reduce the risk of data leaks by controlling website and application access. Risks for effective business...
Safetica 9.0 – Data Protection without a Manual

Safetica 9.0 – Data Protection without a Manual

Set up your data protection without reading instructions. Reveal the most pressing security issues without spending hours analyzing monitored data. With the new Safetica 9.0 it is no longer only a dream. Read the essentials of more than 150 enhancements and redesigned...
Safetica 9.1: Sensitive Data and Cloud E-mail Under Control

Safetica 9.1: Sensitive Data and Cloud E-mail Under Control

A brand new version of your sensitive data protection solution, Safetica 9.1, is coming! Today, we’ll show you how to discover risks on Office 365 Exchange Online. With the help of new rules, you can now better identify sensitive content in your business, and there...
Safetica DLP 9.0 – Manage data security from a single place

Safetica DLP 9.0 – Manage data security from a single place

Enterprise software is complicated, and changing a company’s security software settings takes time and effort. This is how things have always been, and there’s nothing anyone can do about it. Or is there? This is what we asked ourselves last year when we were coming...