Tag: Data Centric Security

15
Jan

December 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

November, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

15
Dec

Do you need to protect your sensitive CAD files when collaborating with third-party vendors?

CAD files are the intellectual property of the manufacturing industry. Sharing sensitive CAD drawings with third-party vendors carries security risks. Learn more on how HALOCAD can help prevent sensitive CAD data when collaborating with 3rd party vendors/partners.

10
Dec

SECUDE Strengthens HALOCORE® 6.0 With Software-as-a-Service (SaaS), SAP ECTR & Other Features

SECUDE introduces new features to strengthen, safeguard, and protect its clients against evolving cybersecurity threats as part of HALOCORE 6.0 release.

5
Dec

November, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

November, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

16
Nov

The foundational pillars of Zero Trust Strategy and how it enables you to secure your organization’s crown jewels

Orchestrating endpoint visibility, authentication, and security enforcement controls are paramount to achieve a Zero Trust compliance. Here are the 7 foundational pillars that organizations must take into consideration while implementing a Zero Trust strategy.

5
Nov

October, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

October, 2020 Roundup – Latest News, Trends & Updates in Data Centric Security

5
Nov

Six Reasons why Enterprise Digital Rights Management Matters for Data-Centric Security 

EDRM is the core data-centric technology for protecting data in today’s collaborative use cases.  The EDRM market is gaining traction and the adoption curve shows an upward trend. Here are our six reasons why we think EDRM matters for Data-centric security.

19
Apr

How to ascertain suspected data leak from the IT landscape?

Wipro, the India-based IT giant, is in the news for a major breach of its systems. An advanced phishing attack has enabled hackers, possibly government sponsored, to use Wipro’s network to ‘listen’ to information exchanges with customers and external vendors. Is there a way to thwart data leaks right at the beginning? What should be done?

2
Apr

The Simple Printer: Innocuous Office Tool or Source of Silent Data Leak?

The innocuous office printer is a seemingly simple corporate device of everyday use. Despite stringent ‘go-green’ and ‘paperless office’ initiatives printing will continue to be. But what comes out needn’t be authorized printed documents. They may also be vital intellectual property or other sensitive information. It’s time IT Managers look beyond mere maintenance issues.

11
Mar

Why invest in a new CAD file security solution when you can leverage your investment in Microsoft AIP

Manufacturing companies create and manage their IP based on CAD drawings that are often shared outside the organization. The risk of losing this IP is significant. Is there a solution to secure your CAD files without any major additional expense? HALOCAD leverages MIP to protect CAD drawings beyond company’s IT landscape.