Contact Us

Datasheet

Information documents describing the solutions of our technology partners ...

  • [DATASHEET] TITUS | Classification for Desktop
    TITUS Classification for Desktop allows classification of any file type in a Microsoft Windows® environment.
    DOWNLOAD
  • [DATASHEET] TITUS | Classification for G Suite.
    TITUS Data Classification for G Suite is a security solution that enables users to easily and securely identify, classify, secure and share sensitive information within the workflow via SaaS or on prem models.
    DOWNLOAD
  • [DATASHEET] TITUS | Classification for Microsoft Office
    TITUS Classification for Microsoft Office is a security and governance solution that allows organizations to ensure that their documents are used consistently and appropriately.
    DOWNLOAD
  • [DATASHEET] TITUS | Classification for Microsoft Outlook
    TITUS Message Classification is an easy-to-use, multi-platform e-mail security solution that allows every Microsoft Outlook e-mail to be classified and guarded before it is sent.
    DOWNLOAD
  • [DATASHEET] TITUS | Illuminate (Identify and Protect Data-At-Rest)
    TITUS Illuminate helps you determine what and where your data is, who has access to it, and how to protect it.
    DOWNLOAD
  • [DATASHEET] Stealthbits | File Activity Monitor
    Stealthbits enable organizations to robustly capture activity across the enterprise and across multiple platforms and extract meaningful insights from activities to cope with security, compliance, and operational requirements.
    DOWNLOAD
  • [DATASHEET] Stealthbits | Privileged Activity Manager
    Stealthbits Privileged Activity Manager (SbPAM) facilitates secure administrator access using third-generation technology that is both intuitive and easy to deploy.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthINTERCEPT Enterprise Password Enforcer
    StealthINTERCEPT Enterprise Password Enforcer provides protection using a dictionary of millions of compromised passwords aggregated with complexity, character substitution, and policy testing tools.
    DOWNLOAD
  • [BROCHURE] Stealthbits | Data Access Governance
    STEALTHbits Technologies is a cybersecurity software company focused on protecting an organization's credentials and data.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for Active Directory
    As the primary authentication and authorization service for most IT systems, the importance of Active Directory (AD) should not be underestimated.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for Active Directory and Azure Active Directory and Reporting
    StealthAUDIT for Active Directory provides an unorthodox, preconfigured reporting for detailed inspection of your Azure Active Directory environment and identifies the most important issues.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for AD Permissions Analyzer
    StealthAUDIT Active Directory Permissions Analyzer provides easy and automatic determination of effective permissions applied to all Active Directory objects and the most authoritative view available for who can access what in AD.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for Data Access Governance
    With StealthAUDIT Management Platform for Data Access Governance, it fulfills these compliance requirements by performing complete and automatic access management controls on unstructured data in File System, SharePoint and cloud.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for Exchange
    StealthAUDIT for Exchange provides in-depth visibility into the on-premises and online versions of Exchange by combining the data collection, analysis, reporting and improvement capabilities required to manage today's Exchange environments.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for Office 365
    StealthAUDIT for Office 365 determines where your most sensitive information is located in SharePoint Online and OneDrive for Business, and lets you know where to focus on security.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for Sharepoint
    StealthAUDIT for SharePoint performs complete and automated access governance controls over unstructured data residing on organizations' SharePoint on-premises, SharePoint Online, or OneDrive for Business.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for SQL
    StealthAUDIT for SQL enables organizations to automate the process of understanding where SQL databases are located, who can access them, who or what uses access privileges, and where sensitive information is located.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthAUDIT for Windows
    With StealthAUDIT for Windows, organizations can quickly inventory, evaluate and secure their Windows desktop and server infrastructures from a central location without deploying a single agent.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthDEFEND for AD Reduced
    StealthDEFEND is a real-time threat detection and response solution against an organization's attacks on identity information and data.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthINTERCEPT Reduced
    StealthINTERCEPT can detect authentication-based file system attacks, monitor usage, abuse of privileged accounts, and detect critical changes to the environment by stopping all traffic regardless of the log.
    DOWNLOAD
  • [DATASHEET] Stealthbits | StealthRECOVER
    StealthRECOVER provides a powerful browser-based solution for Active Directory Rollback and Recovery using industry best practices and technology.
    DOWNLOAD
  • [DATASHEET ] Clearswift | Secure ICAP Gateway
    Clearswift SECURE ICAP Gateway (SIG) is a unique fully automated critical information protection solution that allows you to control the flow of information in your users' internet traffic.
    DOWNLOAD
  • [BROCHURE] Clearswift | Adaptive DLP
    Clearswift is the easiest way to bring adaptive DLP richness to your organization.
    DOWNLOAD
  • [DATASHEET] Clearswift | ARgon for E-mail
    ARgon uses Clearswift's unique Adaptive Reduction technology and solves the problems caused by traditional Data Loss Prevention (DLP) solutions.
    DOWNLOAD
  • [DATASHEET] Clearswift | E-mail Encryption Secure File Transfer
    Today's solutions that make e-mail secure are well developed, but with it increasing complexity and management costs.
    DOWNLOAD
  • [DATASHEET] Clearswift | Encryption In The Secure E-mail Gateway
    Encryption, which is the bidirectional conversion of meaningful content to incomprehensible content, is the single most powerful information security tool available to the e-mail security administrator.
    DOWNLOAD
  • [DATASHEET] Clearswift | Endpoint DLP
    More than 4 billion records were lost due to data breaches in the first half of 2019. With the introduction of new data protection laws around the world, it is more important than ever to prevent data leaking by external devices.
    DOWNLOAD
  • [DATASHEET] Clearswift | F5 Application Availability
    Clearswift SECURE ICAP Gateway (SIG) can be used with the integration of the unique Adaptive Redaction technology with the F5® BIG-IP® Local Traffic Manager ™ (LTM®).
    DOWNLOAD
  • [DATASHEET] Clearswift | Secure E-mail Archiving
    As email is still the primary collaboration tool, the content and information that organizations send and receive is safe. they need to make sure that it is.
    DOWNLOAD
  • [DATASHEET] Clearswift | Secure E-mail Gateway
    With its deep content review feature and powerful adaptive redaction features, Clearswift SECURE E-mail Gateway eliminates cyber threats and prevents unwanted data breaches in real time.
    DOWNLOAD
  • [DATASHEET] Clearswift | Secure Exchange Gateway
    Clearswift SECURE Exchange Gateway (SXG) protects against expulsion of inappropriate or critical information both internally and externally.
    DOWNLOAD
  • [DATASHEET] Clearswift | Secure Web Gateway
    By using the analysis capabilities of Clearswift SECURE Web Gateway, accidental data leaks, one of the concerns of modern companies, can be detected and prevented.
    DOWNLOAD
  • [DATASHEET] Clearswift | Securing O365 Update
    Clearswift can be implemented in a variety of ways with Office 365, ensuring that the most valuable information for your organization remains secure, even "in the cloud", wherever it is found.
    DOWNLOAD
  • [BROCHURE] INFOGNITO | Sensitive Data Management
    INFOGNITO is a complete solution for discovery, classification and masking of all sensitive, personal and corporate data in structured areas.
    DOWNLOAD
  • [BROCHURE] Wandera | Mobil Thread Defence
    The only solution that provides the broadest protection against cyber threats and access-based risks.
    DOWNLOAD
  • [BROCHURE] TITUS | Data Identification
    TITUS ensures that information is classified, protected, analyzed, securely shared, and regulatory compliance requirements are met by determining and securing the unstructured data of organizations.
    DOWNLOAD
  • [DATASHEET] GoAnywhere | EDI
    EDI, or Electronic Data Interchange, is a file format used by B2B (Business to Business) partners to send and receive business transactions.
    DOWNLOAD
  • [DATASHEET] GoAnywhere | Gateway
    GoAnywhere Gateway provides an additional layer of security to your data exchange with your trading partners. Allows you to securely share your file sharing services (eg FTP / S, SFTP, HTTP / S servers) and files on your private / on-premises network.
    DOWNLOAD
  • [DATASHEET] GoAnywhere | Secure E-mail
    Providing a secure solution for sending files by email, the Secure Email module in GoAnywhere allows employees and other authorized users to easily send files (packages) to other people.
    DOWNLOAD
  • [BROCHURE] GoAnywhere | MFT
    GoAnywhere MFT is an enterprise-grade solution that secures, automates and manages your organization's file transfer needs with a single interface.
    DOWNLOAD
  • [DATASHEET] GoAnywhere | MFT+Clearswift
    GoAnywhere MFT and Clearswift, the security products of HelpSystems, work together to share information with an unprecedented level of management and security.
    DOWNLOAD
  • [DATASHEET] GoAnywhere | Modules
    GoAnywhere is a robust and complete managed file transfer solution. Modules are available to meet various file transfer requirements.
    DOWNLOAD
  • [DATASHEET] GoAnywhere | PCI DSS
    PCI DSS applies to any organization that processes credit or debit card information worldwide. Failing a PCI DSS audit can result in fines, but IT's responsibilities extend beyond avoiding these penalties.
    DOWNLOAD
  • [DATASHEET] Boldon James | CAD Classifier
    Boldon James CAD Classifier product family brings the benefits of data classification to design documents produced by specific CAD applications.
    DOWNLOAD
  • [DATASHEET] Boldon James | E-mail Classifier
    Boldon James Email Classifier applies visual and metadata classification tags to help prevent sensitive data from being sent to the wrong recipient and increase security awareness.
    DOWNLOAD
  • [DATASHEET] Boldon James | Mac Classifier
    Boldon James Mac Classifier offers the benefits of user-centric data classification to organizations using Mac devices.
    DOWNLOAD
  • [DATASHEET] Boldon James | Office Classifier
    Boldon James Office Classifier supports this by enabling users to apply visual tags to documents and embed these tags into document metadata.
    DOWNLOAD
  • [BROCHURE] Boldon James | Classifier
    Boldon James has been a data classification pioneer for over 30 years. It helps many of the world's most successful organizations control their data to improve business performance.
    DOWNLOAD
  • [BROCHURE] Enterprise Recon | Sensitive Data Discovery
    Enterprise Recon is a complete solution for discovery, improvement and monitoring of all sensitive personal and corporate data on your network.
    DOWNLOAD
  • [DATASHEET] Enterprise Recon | Sensitive Data Discovery
    Ground Labs has three versions to best suit your evolving data discovery needs: Enterprise Recon PCI, Enterprise Recon PII, and Enterprise Recon Pro.
    DOWNLOAD
Close
Searching...

Pages related to your search

Solutions related to your search

News related to your search

Blog articles related to your search

Downloads related to your search