File systems

Sensitive & secret data News

View All News

Sensitive & secret data Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Sensitive & secret data Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Sensitive & secret data

Learn to apply best practices and optimize your operations.

  • Data anonymization techniques less reliable in era of big data

    Data anonymization techniques are designed to preserve privacy of shared data, but do they work with high-dimensional data? Here's what experts have to say. Continue Reading

  • Privileged user access: Managing and monitoring accounts

    Maintaining the security principle of least privilege can prevent abuse of privileged user accounts. Learn about the best practices for monitoring privileged access. Continue Reading

  • New tactics for better endpoint security threat prevention

    Endpoint security threat prevention tools are crucial in your endpoint management strategy. This three-part technical guide will help you develop and advance your existing endpoint security management approach. It includes a chapter that outlines seven fundamental steps to take to make sure endpoints entering your network are kept as secure as possible. Chapter two advises on how to raise that endpoint security baseline even higher by using network access control, data loss prevention and strategic data destruction. Our final chapter considers where a cloud service fits into an enterprise security strategy focused on endpoints.

    This guide is created with today's enterprise infosec pro in mind, the person on the frontlines -- that is, the corporate IT department -- in the battle against the hackers aiming to steal corporate data and infiltrate enterprise networks. Readers of this guide will come away with a better understanding of the latest tools and techniques to provide better endpoint security threat prevention.

     Continue Reading

View All Manage

Problem Solve Sensitive & secret data Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve