March 2020 | SC Media

Print Issue: March 2020

Code42 Next-Gen Data Loss Protection

Code42 Next-Gen Data Loss Protection offers centralized visibility and simplifies data risk detection and response through the collection of file content and metadata. It collects file content and user file activities from email-leveraging agents, endpoints and the cloud. The product protects and monitors cloud files through direct integrations with leading cloud collaboration platforms. Code42’s protective…

Digital Guardian – Data Protection Platform 7.6

Digital Guardian Data Protection Platform offers data protection independent of threat actors, data types, systems, applications, devices or points of access. This cloud-based model unifies endpoint detection, response and data loss prevention to protect against internal threats and accidental data theft, using the same agent. Endpoint detection and response protect against outsider threats and attackers…

Fidelis Cybersecurity Fidelis Network 9.2.4

The core of Fidelis Security is its patented technology, Deep Session Inspection (DSI), which scrutinizes the content of network sessions across all ports and protocols in real time to detect data policy violations, sensitive information and advanced threats. It processes, reassembles and iteratively decodes all packets for analysis. This recursive approach to information decoding lets…

iStorage Limited cloudAshur–cloud data encryption module

IStorage cloudAshur eliminates security vulnerabilities within cloud platforms by providing more control of data through a variety of access authorizations. It can be used to securely encrypt and share email attachments and large files and to securely encrypt and store data on a PC or Mac. The solution provides security is through the cloudAshur PIN…

McAfee Total Protection for DLP 11.4

McAfee Total Protection for DLP protects Windows and Mac endpoints across more than 10 exfiltration vectors and offers additional blocking and monitoring capabilities for email and web traffic protection. It strongly emphasizes discovery, inventory and classification of personal data to give visibility and define what constitutes sensitive content. The solution has native and third-party options…

Zecurion DLP 9

Zecurion DLP largely focuses on internal security, offering advanced forensic investigation and control features that detect policy violations, insecurely stored data, data usage and transfers. It immediately notifies security officers about security lapses, so teams can address and resolve issues quickly. The platform also protects intellectual property DLP and uses hybrid analysis. The robust monitoring…

First Look: MAFAZO Ignyte Assurance Platform

At a glance Product: Ignyte Assurance Platform Vendor: MAFAZOPrice: Subscription starts at $50,000What it does:  Automates control mapping for compliance frameworks.What we liked: Simple and straightforward user interface.The Bottom Line: Saves time for organizations managing multiple compliance frameworks. MAFAZO’s Ignyte Assurance Platform offering provides organizations with a broad view of compliance requirements and the gaps…

SC Product Reviews: Data loss prevention

Securing data has become a labor-intensive task due to tremendous increases in volume and the far-reaching vectors it traverses. Only recently have compliance standards and frameworks cracked down on information security practices and most organizations still do not sufficiently monitor their data or control its accessibility. The aggressive changes in security protocols and tightened compliance…

Cybersecurity: Poised for a giant leap forward

Cybersecurity has enjoyed good health but is an industry itching for innovation and transformation – and the next big thing, Teri Robinson reports. When Neil Armstrong climbed down the ladder on the Apollo 11 lunar module, the Eagle, and toed the moon’s surface, as he so aptly stated, his small step simultaneously represented a giant…

The hottest topic: Ransomware

The attacks that transpired last year alone arguably made ransomware the hot topic of the year and most likely a leading contender for 2020, as well, but a new element that cropped up late last year – attackers adding a layer of blackmail to the threat of locking a target’s computer system – solidified its…

Next post in Features