Tag: Data Loss Prevention



SECUDE participated in the NASSCOM-DSCI Annual Information Security Summit 2017 that was held from December 13-15 at The Leela Palace, Gurgaon. If you missed us there, here is brief account of what transpired. And we are interested to talk to you!


Context-aware Data Loss Prevention

In contrast to content-based Data Loss Prevention (DPL) software, context-aware DLP solutions have the ability to discern the context of the data flow (to and from) and the user. Thereby they enable CISOs to leverage existing investments in SAP data security.


We go beyond traditional data leak prevention functionality: Dola Krishna

Organizations are increasingly going ‘Digital’. But this is not without its due share of challenges, especially when it comes to data security. In this interview with Express Computer, Dola Krishna (Director – Sales) shares his thoughts on solutions that are more robust than standard content-based DLP solutions.


Compromised data is compromised security

The news media recently carried the story of a lost USB stick found on a London street – innocuous enough, except that the stick contained extremely sensitive information on infrastructure security and travel routines of dignitaries, etc. One of the fundamental questions is: Could theft of such information be avoided?


Data security in times of SAP S/4HANA

In an interview with the E-3 magazine, Andreas Opfer and Holger Huegel describe how companies can leverage the architectural changes that are associated with SAP S / 4 HANA in order to raise the data security level.


GDPR is around the corner. Are companies really prepared?

A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered. And the leadership is often clueless about this.


5 steps to implement a successful data classification policy

Many organizations recognize that protecting sensitive information is a critical part of business operations and are now taking steps to ensure strong data protection strategies are integrated into everyday business activities. However, many companies fail to identify the sensitive of data they are trying to protect.