Blog

Dec 5, 2018

Securing Emails Wherever They Go & While They are Being Utilized Automatically

Your Email Has Left the Building. Is it Really Secure? Emails – whether yours or Hillary Clinton’s – have a knack for ending up in the wrong places. Hillary Clinton wanted the convenience of using the same device for personal and official use, so she set up her own email server. It was essentially a [...]

Aug 23, 2018

Why Basic File Encryption is no Longer Enough

Many organizations have implemented basic file encryption to protect their sensitive documents. Basic file encryption will protect information when it is stored and transmitted.  However, as soon as the file is decrypted by the recipient – your sensitive document can now be easily shared with other unauthorized users.  The recipient can easily cut/paste content [...]

Apr 20, 2018

Protecting the Last Mile with End-to-End, Data-Centric Security

As the amount of sensitive information being shared internally across business units and with external third parties grows exponentially, organizations are looking for solutions that will protect documents, wherever they travel, and even while they are being utilized. Traditional security solutions, including email and file encryption are not enough to protect files. Once a recipient [...]

Apr 18, 2018

Why Email Security Is More Important Than Ever Before

Who doesn’t enjoy a little bit of salacious information? Everyday the news outlets are bending our ear. We are human by all means, but leaked emails with sensitive information are costing jobs, influencing elections, impacting corporations financially and who knows what’s next. For example, Sony’s leaked emails cost producer Amy Pascal her job. Democratic National [...]

Mar 16, 2018

Is Data-Centric Security the Answer to NIST Compliance?

Last year there was a record 1,579 data breaches – that’s a 44.7 percent increase in breaches compared to 2016. In light of the severity and frequency of these breaches, companies are taking a deeper look at their cybersecurity protocols. However, there is another reason organizations are reevaluating their security efforts – government regulations. NIST [...]

Feb 28, 2018

Data Classification + DLP + EDRM – The Complete Data Security Story

Data Classification + DLP + EDRM - The Complete Data Security Story Classification…DLP…Encryption…WHAT'S NEXT? Billions of dollars are spent annually on Cyber Security products, yet the threats and breaches continue to rise at unprecedented rates. On-going attempts to control the perimeter such as Applications, Devices and Networks - all become futile based upon the "perfect [...]

Feb 26, 2018

What is and How do you Prepare for the GDPR?

By Darren Wray, CEO, Fifth Step, Ltd GDPR is the biggest change to data protection ever. Not only does it build upon the European data protection requirements that were already in place regionally, but the extraterritorial nature of this law means that it is not just companies in Europe who are busily implementing changes to [...]

Jan 31, 2018

Data Classification, Protection and Compliance – One, Integrated Solution

By David Langton, Marketing Director, Boldon James In today’s mobile and collaborative world, identifying and protecting data once it has left the confines of your corporate data store is increasingly challenging. Applying persistent protection effectively both within and outside an organization requires a combined approach between data classification and rights management. The good news is [...]

Jan 15, 2018

Agentless Data-Centric Security, Expanded Email Protection, Enhanced Usability, and more!

The 2nd half of 2017 was a very exciting time for us. And that’s because we’ve made things much easier and simpler for you! Seclore Rights Management is now smarter than ever before – with agentless document access and editing, expanded email security, better data usage analytics for administrators – and much more! Here are [...]

Dec 29, 2017

Six Predictions for 2018 Data Security – Prediction #6

And now for our final prediction for 2018 related to data security. With security breaches still occurring at record rates, compliance becoming more focused on protecting data even beyond the corporate perimeter, and the use of outsourcing continuing to rise, organizations will need to shift focus from perimeter-centric to data-centric security. Prediction 6: By 2020, [...]