Welcome to Resource Center

Title

Ebook

  •  
     

    FBI recommendations to prevent ransomware

  •  
     

    Importance of data discovery in GDPR compliance

  •  
     

    Insider threat management
    handbook

  •  
     

    Developing an effective data loss prevention strategy

  •  
     

    Addressing data security threats

Blogs

  •  
     

    Why companies need URL filtering for enhanced cloud protection

  •  
     

    Healthcare cybersecurity: Our 6-step plan to secure healthcare data

  •  
     

    CISO’s guide to building an ironclad data loss prevention strategy [E-book]

  •  
     

    Alert AA20-302A: Federal agencies warn about ransomware attacks targeting hospitals

  •  
     

    Dealing with data glut: Why ROT data is an issue, and how to manage it

  •  
     

    Bring down data storage costs by getting rid of obsolete data [Savings estimator]

  •  
     

    Is your sensitive data overexposed?

  •  
     

    Access granted: Mastering the art of permissions

  •  
     

    How are USB flash drives a security risk?

  •  
     

    How to manage USB devices

Best Practices

  •  
     

    8 best practices to prevent ransomware

  •  
     

    6 best practices for data loss prevention solution

  •  
     

    10 best practices to fight insider threats

  •  
     

    6 security best practices for USB drive

  •  
     

    10 best practices for setting NTFS permissions

  •  
     

    8 cloud application security best practices

  •  
     

    8 best practices for file integrity monitoring

  •  
     

    12 data security
    best practices

  •  
     

    6 best practices for
    data classification

  •  
     

    10 best practices for
    protecting PII

  •  
     

    8 file server security best
    practices

  •  
     

    10 file storage best
    practices

  •  
     

    6 sensitive data best
    practices

  •  
     

    6 security best practices for email attachments

  •  
     

    8 best practices to prevent data breaches

Infographics

  •  
     

    How to protect your organization from ransomware

  •  
     

    HIPAA guidelines on ransomware attacks

  •  
     

    The cost of storing stale files

  •  
     

    Ace data security with these 4 fundamentals

  •  
     

    10 Ways to securely use removable media devices

  •  
     

    Ignite your business value by leveraging dark data

How to

All Cloud access control Data access control Data storage management Data theft prevention File copy protection File security auditing Sensitive data discovery USB security
Cloud access control

Regulate cloud app access and enforce security policies by learning to:

  • Filter internet content  
  • Block employees from accessing websites  
  • Monitor employee internet usage  
Data access control

Ensure user rights and permissions align with their organizational roles by learning to:

  • Check effective permissions  
Data storage management

Prevent clutter and optimize your file storage by learning to:

  • Delete duplicate files  
  • Find and delete hidden files  
  • Find empty folders  
Data theft prevention

Block unauthorized data transfers from within the organization by learning to:

  • Prevent data theft  
  • Prevent data leakage  
  • Detect and respond to ransomware  
File copy protection

Track and restrict unauthorized file copying by learning to:

  • Detect files copied  
  • Protect files from being copied  
  • Restrict copying files from a server  
File security auditing

Audit critical file accesses and modifications made by learning to:.

  • Find who last accessed a file  
  • Find who changed file permissions  
  • Detect who deleted a file  
Sensitive data discovery

Scan and identify sensitive data stored in files by learning to:

  • Find credit card numbers in files  
USB security

Control and secure USB device usage by learning to:

  • Track files copied to USB  
  • Make USBs read-only  
  • Disable USB ports  
  • Disable USB devices  
  • Write-protect USB drives  

Videos

Combat ransomware

Watch this 1-minute video to find out how DataSecurity Plus, automatically detects and quarantines ransomware.

  •  

    File copy protection

  •  

    Ransomware
    detection and response

  •  

    USB data theft
    protection

Webinars

  • New

    5 key principles of data security

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     
  • Healthcare Data Security: Safeguarding Patient Information

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     
  • Calculated risk: Measuring your data's vulnerability to breaches

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     
  • DLP essentials: Building a data loss prevention plan

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     
  • Hidden risks to sensitive data and how to detect them

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     
  • Building a comprehensive data security strategy

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     
  • Combating permission pitfalls with file analysis

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     
  • Data classification: The cornerstone of DLP

    Presenter

    Lakshmi, Product Expert

    45 Mins

    Watch Now
     

Help Documents

  •  
     

    User manual

  •  
     

    Migration guide

  •  
     

    SSL configuration guide

  •  
     

    Agent document

  •  
     

    HTTP failure troubleshooting guide

  •  
     

    Quick start guide

  •  
     

    Automating database backup guide

  •  
     

    Security hardening
    guide

  •  
     

    NetApp auditing
    guide

  •  
     

    Secure installation
    guide

Case Studies

  •  
     
    New
    Healthcare

    EVMS partnered with DataSecurity Plus
    for sensitive data secure

Product Overview

  •  

    Slide deck

  •  
     

    Datasheet

  •  
     

    Architecture

Compliance

  •  
     

    GDPR

  •  
     

    HIPAA

  •  
     

    PCI

  •  
     

    FISMA

  •  
     

    SOX

  •  
     

    GLBA

  •  
     

    POPI

Security threats

  •  
     

    BadUSB

  •  
     

    USB drop attack

Checklists

  •  
     

    Data security checklist

  •  
     

    Data risk assessment checklist

  •  
     

    PII compliance checklist

  •  
     

    Ransomware prevention and response checklist

 
Email Download Link