Resources

Datasheet

NIST SP 800-171 and CUI

Meet Compliance Requirements To Protect Controlled Unclassified InformationOriginally imposed in 2017, NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be be compliant with DFARS Part 252.204-7012. Other executive branch agencies may also require...
Case Study

Dow Corning Uses Classification Labels to Help Protect Intellectual Property

Large organizations understand the importance of properly handling sensitive information both within and outside of the company. Instituting an organization-wide IP protection program to lock down access to valuable information is crucial, and key to this is a clear and consistent global standard for handling email and document information with the application of labels.
Case Study

Large Canadian Financial Institution Enhances Data Protection Strategy with McAfee and Fortra

When sensitive information gets into the wrong hands, the costs can be severe: fines, lawsuits, embarrassing headlines, loss of intellectual property, even risk to public safety. Using techniques such as data classification and content validation, Fortra's Data Classification Suite (DCS) enforces policy and mitigates data loss - raising user awareness and preventing data breaches at the source. ...
Case Study

Turkcell Builds Complete Approach to Data Loss Prevention with Fortra

Global telecommunications operators require the highest levels of security as they deal with large volumes of personal information, trade secrets and other sensitive data. In an extremely competitive market, locking down data is critical, and high levels of data security help drive market advantage. ...
On-Demand Webinar

Why Pair Data Classification with Secure Collaboration for End-to-End Data Security

The need to be able to share files and collaborate on data as a part of everyday working is crucial for businesses and their users. This internal and external collaboration, while necessary, presents several security challenges to IT. How much of what users are sharing is sensitive information? Where is it being stored and how is it being shared? Once you have the answers to these questions, how...
On-Demand Webinar

Why Data Classification is the Cornerstone of Regulatory Compliance

Achieving compliance across a wealth of new international data compliance regulations is a growing challenge, with many organizations struggling to keep pace. In addition, the rise of globally dispersed workforces and hybrid working environments are placing extraordinary pressure on every organization’s security. Today, data classification offers an increasingly persuasive answer to help prevent...
On-Demand Webinar

Go Beyond "One-Size-Fits-All" Data Classification: Protect What Your Business Cares About

This webinar highlights how data protection regulations are requiring more granular labelling and why you need to be sub-categorizing your data to have an effective and meaningful data classification policy. The following subjects will be covered: How data protection regulations are requiring more granular labeling Why you need to be sub-categorizing your data to have an effective and...
On-Demand Webinar

Extending Microsoft Purview Information Protection Through Data Loss Prevention (DLP)

Microsoft Information Protection (MIP) delivers a set of data protection solutions integrated into and focused upon the Microsoft environment, while Digital Guardian Data Loss Prevention (DLP) extends that protection to the rest of the OSs, browsers, and applications you rely upon. When integrated, MIP and Digital Guardian work together to provide you with the best and most complete data...
On-Demand Webinar

Data Classification Take 30: The 5 Steps to Effective Data Protection

Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your files servers and document stores, not protected and unrecoverable because no-one knows it exists let alone where to find it. Using data classification helps you regain control over your unstructured data. By involving your users in the...
Case Study

Morpho Classifies and Protects Sensitive Information and Meets Export Control Requirements with Fortra

Morpho, Safran’s security business, addresses emerging security requirements for individuals, businesses and countries. Its expertise spans three core markets: identification of persons and goods, production and personalization of e-documents, detection of threats and substances. Morpho has over 7,700 employees in more than 40 countries. With integrated systems operating in more than 100 countries...
Datasheet

Fortra Data Classification Reporting Server

Data classification delivers many benefits, but it’s important that youcan measure that success and demonstrate the value to the executives and compliance and governance teams within your organization. Utilizing reporting capabilities enables you to keep track of what users are doing with data and where data is stored, as well as making sure...
Datasheet

Fortra's Data Classification Suite Corporate Overview

The Foundation of Data Security Fortra’s Data Classification solutions enable organizations to classify, protect, analyze, and confidently share regulatory compliance requirements by identifying and securing unstructured data. “Forrester believes classification is the foundation for all of data security, and it’s critical for the success of other data security solutions, such as DLP, rights...
Video

Fortra’s Data Classification Suite Take-30 Webinars

Get step-by-step instructions in this 4-part webinar seriesLearn why data classification is a crucial data security tool, and how to position it to key stakeholdersHow to get started with planning your data classification policyUnderstand the importance of technical expertise when it comes to implementing your classification solutionUnderstand how you can grow your classification schema to...
Datasheet

GDPR compliance support that works for your business

Since the launch of GDPR in 2018, organizations have been forced to change their business practices in order to remain compliant. GDPR compliance requires organizations to have visibility into what data they possess, and where it is located. This remains a challenge for many organizations who don’t yet have solutions in place to understand where their data lives and what it contains. Ultimately,...
Video

CUI Compliance with Fortra's Data Classification Suite (DCS) On-Demand Demo

Watch a short demo to see the Fortra CUI configuration in actionNavigate CUI complexities with confidenceAutomatically apply CUI markingsApply the full list of CUI categories and subcategoriesManually tailor Banner and Portion markingsEndpoint configuration for CUI safeguarding and dissemination controlsTemplate packs to get your organization up and running with CUI compliance quickly and...
Guide

Why Zero Trust Needs Data Classification To Work

Zero Trust has been one of the cybersecurity industry's favorite buzzwords for a few years and for good reason; it's emerged as a legitimate strategy that—assuming the correct groundwork is laid—can help effectively guard against threats and strengthen an organization’s security posture. If you’re in charge of securing data at your organization, you already know that classifying it is foundational...
Guide

Three Steps to Protecting PII in the Government

This guide discusses the three key steps that must be taken by government organizations to protect PII they have in their possession.Identify your PII through marking and metadata taggingEducate and build awareness of the organization’s PII among employees, contractors, and partnersSelect the appropriate controls to protect PII...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized persons prohibited or...