Resources

Guide

The Incident Responder's Field Guide

Careful cyber security incident response planning provides a formal, coordinated approach for responding to security incidents affecting information assets. This e-book provides easy-to-follow steps for crafting an incident response plan in the event of cyber security attacks.
On-Demand Webinar

A Timeless Problem: Preventing USB Data Loss at Your Organization

In the late ‘90s and early ‘00s, USB flash drives were a hot commodity. Back then, they were not very common, had 8MB of storage and the concept of data leaks or picking up malware from one was not considered a major threat.Fast forward over two decades later and not only are they faster but much, much larger often with capacities of up to 1 terabyte. What could sit on a stick of that size? Your...
Video

Digital Guardian Secure Service Edge

Over the last seven years or so, companies have branched out to a lot of different offerings, cloud based service providers. Organizations are finding they need coverage regardless of where their data is going, regardless of where it's stored, they need to have a product that is able to direct and inspect that traffic to make sure they're not acquiring loss. Enter Secure Service Edge.
On-Demand Webinar

Stories from the Street with a Cybersecurity Veteran: Your Data Is Traveling. Shouldn't Your Security?

Your employees are everywhere. So is your data. Have we equipped our teams to deal with this situation?In this on-demand webinar, cybersecurity industry veteran and Fortra’s Director of Product Management for Data Protection Wade Barisoff will discuss his experience on both sides of the table, both as a Fortune 500 security director as well as leading product direction at Fortra.Our 30-minute...
On-Demand Webinar

The Value of Digital Rights Management

The Value of Digital Rights ManagementIn our highly connected, collaborative economy, you can no longer depend on perimeter-based technologies alone to ensure data confidentiality. Business users need to be able to share files and collaborate on data as a part of everyday business, and risks increase when that data goes beyond your organization’s perimeter.Organizations can depend on a digital...
On-Demand Webinar

Why Pair Data Classification with DRM for End-to-End Data Security

The need to be able to share files and collaborate on data as a part of everyday working is crucial for businesses and their users. This internal and external collaboration, while necessary, presents several security challenges to IT. How much of what users are sharing is sensitive information? Where is it being stored and how is it being shared? Once you have the answers to these questions, how...
Blog

IP Theft: Definition and Examples

IP theft can have long term damaging effects on a company. In this blog, we look at nearly 50 different examples of IP theft to help you better understand the threat.
On-Demand Webinar

Using SOAR Tools to Accelerate and Automate Data Security

One of the biggest challenges for infosec analysts and leaders is being able to respond to the most serious threats before data loss or theft. Security orchestration, automation, and response (SOAR) solutions lets infosec teams integrate and automate responses.Join Chris Saucier, DG SE, for a demonstration of how SOAR tools can retrieve incidents and automate response actions. With reaction faster...
Product Video

Top Trends in Advanced Threats to Sensitive Data in 2019

Your organization regularly faces threats to sensitive data from both inside and outside the organization. The team charged with delivering your information security can tell stories about what they learn from the solutions in place. Digital Guardian manages security programs for hundreds of customers, globally, we see hundreds of stories every day. We see the novel threats that can turn into...
Blog

What is SCADA Security?

Learn about what SCADA security is, examples of threats and vulnerabilities, and more in Data Protection 101, our series on the fundamentals of information security.
Video

The Real World of Cyber Threat Hunting

Watch our webinar with Senior Director of Cyber Security Tim Bandos to learn about common threat hunting use cases so you can better protect your organization.