Welcome to Resource Center

Title

Ebook

  •  
     

    FBI recommendations to prevent ransomware

  •  
     

    Importance of data discovery in GDPR compliance

  •  
     

    Insider threat management
    handbook

  •  
     

    Ransomware prevention and response checklist

  •  
     

    Developing an effective data loss prevention strategy

Blogs

  •  
     

    Why companies need URL filtering for enhanced cloud protection

  •  
     

    Healthcare cybersecurity: Our 6-step plan to secure healthcare data

  •  
     

    CISO’s guide to building an ironclad data loss prevention strategy [E-book]

  •  
     

    Alert AA20-302A: Federal agencies warn about ransomware attacks targeting hospitals

  •  
     

    Dealing with data glut: Why ROT data is an issue, and how to manage it

  •  
     

    Bring down data storage costs by getting rid of obsolete data [Savings estimator]

  •  
     

    Is your sensitive data overexposed?

Best Practices

  •  
     

    8 best practices to prevent ransomware

  •  
     

    6 best practices for data loss prevention solution

  •  
     

    10 best practices to fight insider threats

  •  
     

    6 security best practices for USB drive

  •  
     

    10 best practices for setting NTFS permissions

  •  
     

    8 cloud application security best practices

  •  
     

    8 best practices for file integrity monitoring

  •  
     

    12 data security
    best practices

  •  
     

    6 best practices for
    data classification

  •  
     

    10 best practices for
    protecting PII

  •  
     

    8 file server security best
    practices

  •  
     

    10 file storage best
    practices

  •  
     

    6 sensitive data best
    practices

  •  
     

    6 security best practices for email attachments

  •  
     

    8 best practices to prevent data breaches

Infographics

  •  
     

    How to protect your organization from ransomware

  •  
     

    HIPAA guidelines on ransomware attacks

  •  
     

    The cost of storing stale files

  •  
     

    Ace data security with these 4 fundamentals

  •  
     

    10 Ways to securely use removable media devices

  •  
     

    Ignite your business value by leveraging dark data

How to

  •  
     

    How to detect and respond to ransomware attacks

  •  
     

    How to detect files copied with DataSecurity Plus

  •  
     

    How to delete duplicate files

  •  
     

    How to track files copied to USB

  •  
     

    How to find and delete hidden files

  •  
     

    How to detect who last accessed a file

  •  
     

    How to detect who changed file permissions

  •  
     

    How to detect who deleted a file

  •  
     

    How to restrict copying files from server

  •  
     

    How to prevent data theft by employees

  •  
     

    How to find empty folders

  •  
     

    How to make USBs read-only

  •  
     

    How to prevent data leakage

  •  
     

    How to disable USB ports

  •  
     

    How to disable USB devices

  •  
     

    How to filter internet content

  •  
     

    How to prevent files from being copied

  •  
     

    How to find credit card numbers in files

  •  
     

    How to block employees from accessing websites

  •  
     

    How to monitor employee internet usage

Videos

Combat ransomware

Watch this 1-minute video to find out how DataSecurity Plus, automatically detects and quarantines ransomware.

  •  

    File copy protection

  •  

    Ransomware
    detection and response

  •  

    USB data theft
    protection

Webinars

  • New 

    Calculated risk: Measuring your data's vulnerability to breaches

  •  

    DLP essentials: Building a data loss prevention plan

  •  

    Hidden risks to sensitive data and how to detect them

  •  

    Building a comprehensive data security strategy

  •  

    Combating permission pitfalls with file analysis

  •  

    Data classification: The cornerstone of DLP

Help Documents

  •  
     

    User manual

  •  
     

    Migration guide

  •  
     

    SSL configuration guide

  •  
     

    Agent document

  •  
     

    HTTP failure troubleshooting guide

  •  
     

    Quick start guide

  •  
     

    Automating database backup guide

  •  
     

    Security hardening
    guide

Product Overview

  •  

    Slide deck

  •  
     

    Datasheet

  •  
     

    Architecture

Compliance

  •  
     

    GDPR

  •  
     

    HIPAA

  •  
     

    PCI

  •  
     

    FISMA

  •  
     

    SOX

  •  
     

    GLBA

  •  
     

    POPI

Security threats

  •  
     

    BadUSB

  •  
     

    USB drop attack

 
Email Download Link