Welcome to Resource Center

Title

Trending

  •  
    How to

    How to detect files copied with DataSecurity Plus.

  •  
    E-book

    Importance of Data discovery in GDPR

  •  
    Infographic

    HIPAA guidelines on ransomware attacks

Ebook

  •  
    FBI recommendations to prevent ransomware

    FBI recommendations to prevent ransomware

  •  
    Importance of Data discovery in GDPR

    Importance of Data discovery in GDPR

  •  
    Insider threat

    Insider threat management
    handbook

  •  
    Ransomware Prevention and Response Checklist

    Ransomware Prevention and Response Checklist

Best Practices

  •  
    8 Best practices to prevent ransomware

    8 Best practices to prevent ransomware

  •  
    6 best practices for data loss prevention solution

    6 best practices for data loss prevention solution

  •  
    10 best practices to fight insider threats

    10 best practices to fight insider threats

Infographics

  •  
    How to protect your organization from ransomware

    How to protect your organization from ransomware

  •  
    Impact of Ransomware on HIPAA

    Impact of Ransomware on HIPAA

  •  
    The cost of storing stale files

    The cost of storing stale files

How to

  •  
     

    How to detect and respond to ransomware attacks.

  •  
     

    How to detect files copied with DataSecurity Plus.

  •  
     

    How to manage duplicate files.

  •  
     

    How to track files copied to USB?

  •  
     

    How to find and delete hidden files

  •  
     

    How to detect who last accessed a file

  •  
     

    How to detect who changed file permissions

  •  
     

    How to detect who deleted a file

Videos

Combat ransomware

Watch this 1-minute video to find out how DataSecurity Plus, automatically detects and quarantines ransomware.

  •  

    File copy protection

  •  

    Ransomware
    detection and response

Help Document

  •  
    Administrator's Guide

    Administrator's Guide

  •  
    Migration

    Migration guide

  •  
    SSL configuration guide

    SSL configuration guide

  •  
    Agent document

    Agent document

  •  
    HTTP failure troubleshooting guide

    HTTP failure troubleshooting guide

Product Overview

  •  
    DataSecurity Plus

    Slide deck

  •  
    DataSecurity Plus datasheet

    Datasheet

Compliance

Security threats

  •  
    BadUSB

    BadUSB

 
Email Download Link