The latest news

Sorting:
Sort Ascending
  • BlueFinch becomes reseller of Linoma Software

    BlueFinch has entered into a co-operation with the American ICT supplier Linoma Software. This partnership enables BlueFinch to resell and to use the products of Linoma in the projects of its clients.

  • BlueFinch official IBM Certified Business Partner

    BlueFinch, ICT specialist in the area of Finance and Banking, has been appointed by IBM as IBM Business Partner.

  • Safestone biedt Compliance Center for Linux

    Safestone Technologies, wereldleider op het gebied van compliance- en beveiligingssoftware voor IBM Power Systems, introduceert Compliance Center voor Linux.

  • Veilig en efficiënt bestanden uitwisselen

    Linoma Software is ontwikkelaar van managed file transfer- en encryptie-oplossingen. Deze oplossingen worden op de eerste plaats gebruikt om gevoelige data te beschermen, maar tevens om te voldoen aan data security-reguleringen zoals PCI DSS, HIPAA/HITECH, SOX en GLBA.

  • BlueFinch introduces SystemScan AIX

    Aalsmeer , November 27, 2013 - BlueFinch, ICT specialist in the field of complex ICT infrastructures that are based on IBM technology, introduces a comprehensive system tool for AIX configuration, diagnostic and reporting. SystemScan AIX enables organizations to carry out a thorough inspection of the installation and configuration of their AIX environment.

  • Download free Open PGP software

    GoAnywhere OpenPGP Studio™ is a free desktop tool that makes it easy to protect sensitive files using the popular Open PGP encryption standard.

  • Why you want a centralised MFT solution…

    I regularly visit organisations that are in a state of complete disarray due to an explosion of new file-transfer and software interfaces. This can simply be because the IT Department has attempted to quickly respond to multiple requests and to demands from the business.

  • GoAnywhere Services v4.0 Launched

    Linoma Software is pleased to announce GoAnywhere™ Services version 4.0 with an overhauled interface and a new GoDrive file system for person-to-person file sharing and synchronization.

  • 4 Benefits of On-Premises Enterprise File sync and sharing

    Too many organizations have underestimated the value of mission-critical business documents.  Some employees may take great risks with sensitive or proprietary information and hope that nothing bad happens.

  • SFTP vs FTPS Best solution for Secure FTP

    With large data breaches taking center stage in the media, many businesses have begun paying close attention to internal practices and taking action to improve internal systems and processes. As a result, an increasing number of businesses (people) who rely on data transfers are looking to move away from standard FTP in favor of a more secure method.

  • Customer review; ICE Services

    ICE Services AB is a world-class supplier of business process outsourcing services for Rights Management companies. Based in Bromma Sweden, ICE Services AB took advantage of the GoAnywhere API for file upload and download integration with their music-documentation database, which is used to maintain and house ownership information for all musical works used throughout Europe.

  • Report “Select and Implement a Managed File Transfer Solution”

    nfo-Tech Research Group, an IT research and analysis company, has released a report naming Linoma Software’s GoAnywhere managed file transfer (MFT) solution as having the highest Value Score of the MFT vendor group in Server-to-Server and Ad Hoc Enterprise use cases.

  • GoAnywhere Managed File Transfer 5.0 Released with Unified Interface and Advanced Reporting

    Linoma Software unveils GoAnywhere MFT™ (Managed File Transfer), version 5.0 of its GoAnywhere secure file transfer software. The upgrade combines the workflow automation capabilities of Linoma’s popular GoAnywhere Director solution with secure file transfer protocol (FTP) features from GoAnywhere Services into a single product.

  • 5 Signs your organisation is ready for MFT

    Low-cost file transfer tools allow mid-market businesses to make simple data exchanges both internally and externally.  As your company grows, however, trading partners demand enterprise-level systems to improve reliability and data security.

  • What is AS2?

    Applicability Statement 2 (AS2) is a popular file transfer protocol that allows businesses to exchange data with their trading partners.AS2 combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing the strengths of each of them,

  • No business is an island!

    Want we hebben allemaal te maken met een buitenwereld. Een periferie van partners, leveranciers, filialen en klanten. Het delen van informatie, in welke vorm dan ook, is van alle tijden. En dat geldt in toenemende mate ook voor de risico’s ervan.

  • Webinar Adaptive Redaction

    Webinar: Introducing Adaptive Redaction. Protecting critical information without harming productivity or communication flow.

  • New GoAnywhere Release Automates and Secures File Transfers in Cloud and Private Networks

    The release of GoAnywhere managed file transfer (MFT) solution version 5.5 allows organizations to deploy MFT agents across the enterprise to automate, secure and audit all of their file transfers from a single, centralized location. This new innovation adds to an already extensive suite of security and automation features including encryption at rest and in transit, batch and ad-hoc file transfer, peer-to-peer file collaboration, and more.

  • BlueFinch becomes network-partner of HSD

    Recently BlueFinch has officially partnered with The Hague Security Delta (HSD). HSD is the leading security cluster in Europe with important regional hubs in The Hague, Twente, and Brabant. In a combined effort with all other partners BlueFinch wants to stimulate innovation in security and economic development.

  • Protect your file transfers with Antivirus and DLP integrationDLP, Managed File Transfer, Data Loss Prevention, Clearswift, HelpSystems, BlueFinch

    In order to stop viruses, malware and malicious content from penetrating your organisation, GoAnywhere MFT can be integrated with antivirus solutions by making use of the standard ICAP protocol.

  • Veilig versturen van bestanden met Managed File Transfer

    Iedere organisatie heeft te maken met een buitenwereld - Een periferie van zakelijke partners, filialen, klanten en medewerkers. Bedrijven versturen en ontvangen dagelijks grote hoeveelheden bestanden, variërend van betalingstransacties tot patiëntendossiers.

  • BlueFinch zoekt een Data Exchange Specialist / Product Owner (M/V)

    In verband met de groei van ons bedrijf zijn wij op zoek naar een Data Exchange Specialist / Product Owner die het team van BlueFinch komt versterken.

  • BBES Group: birth of a European data protection giant

    Since last June, Europe has had a new data protection giant: the BBES Group, an alliance between ESBD (France), Blackbridge (Italy), BlueFinch (Netherlands) and Systematik (Germany). With greater strike force, it will enable the four companies to offer better service to their customers at a...

  • BlueFinch is now ISO 27001 certified!

    We are very proud to announce that we are now ISO 27001 certified, making BlueFinch meet the highest recognised security standard.

  • BlueFinch, BlackBridge, ESBD and Systematik establish BBES Group

    The Hague, January 4, 2021 – Data security companies BlueFinch, BlackBridge, ESBD and Systematik joined in the creation of the European company BBES Group. by Ron Diebels It is great news to learn of the combination of these 4 companies specialized in the integration of...

  • What are the different types of transfer protocols available?

    Before implementing a secure file transfer solution, it is good to know the basics of protocols that are involved in the secure transmission of data. by Eloïse Gruber FTP The FTP file transfer protocol is a popular transfer method that has been around for decades....

  • How Data Classification Helps Organisations Maintain a Strong Data Security Posture

    The rise of globally dispersed workforces and new work from home requirements are placing extraordinary pressure on every organisation’s cybersecurity. And wherever there is upheaval, cyber criminals thrive.

  • Blog: Managed File Transfer – An overlooked solution

    Over the last thirteen years I have earned my crust as an “IT architect”. In this job I assist organisations in the planning and implementation of changes in the IT landscape. While most people believe the difficulty lies in designing and communicating the needed changes, a pernicious problem occurs in the stages prior

  • BlueFinch 10 Year Anniversary

    Although the deed of incorporation was officially signed on May 20, the official start date of BlueFinch was May 1st, 2011. Actually May 2nd, as this was the Monday that we all gathered at our fresh new office in Aalsmeer, very close to Schiphol Airport....

  • Blog: Using PGP Encryption To Protect Your Data

    In my career as IT Architect, I have often designed solutions to set up a communication channel with partner companies to exchange confidential information. Only providing a secure transport path does not seem to cut it but maybe PGP Encryption could be possible solution. by...

  • Protocols: SFTP vs FTPS

    How do you transfer sensitive files? Business requirements and security standards have increased in recent years across industries and continents, but many organizations have struggled to keep up. Manual scripts, legacy tools, and single-use software are still utilized by IT and security teams despite their...

  • GoAnywhere awarded best Managed File Transfer product

    For the second year in a row, our MFT solution GoAnywhere has been awarded as best Managed File Transfer product in the market. This research conducted by SoftwareReviews, is based on the feedback of actual users of the application and emphasizes on user experience and vendor support. by Ron Diebels The report exists of 849 reviews, evaluating all relevant software vendors in the Managed File...

  • Is your Enterprise File Sharing Solution Enough?

    Enterprise file sharing solutions are already a great way to encrypt sensitive data in motion, but encryption alone is not enough. Can you ensure that sensitive information is not accidentally transmitted? Are you able to audit who is sending what? And last, but not least, are...

  • Webinar: How to centralise and secure file transfers organisation-wide

    If rounding up the many methods used to transfer files at your organisation feels a bit like herding cats, block off time on your calendar for this important webinar. When transferring sensitive data, “doing your own thing” can have unpleasant consequences. There is an easy...

  • How you can enhance Data Loss Prevention in Microsoft 365

    Protecting customer data from loss and leakage has become a top priority for enterprises over the past decade. Recent HelpSystems research with CISOs in global financial service organisations found that almost one-third believe data breaches have the potential to cause the most damage over the...

  • Auditing and data classification: why is it essential in business?

    While data protection has become a priority, auditing and classification are now essential practices for companies. Find out everything you need to know about this new approach to cybersecurity… by Daan Jacobs Valuable resources Over the years, cyberattacks aimed at stealing personal data from businesses...

  • MFT vs Message Bus integrations

    API’s have emerged as a modern way of making digital systems “talk” to each other without the need for complex and expensive translation and transformation software. When linked via an API, two (or more) systems or applications can send and receive data using standard formats...

  • Top Data Security Challenges (and how to address them)

    Organisations face a constant need to be on the alert and protective of sensitive data. Rather than cobble together a piecemeal solution strategy, relying on a trusted solutions provider that offers a suite of integrated, scalable data security solutions can provide relief. Knowing what data needs to...

  • Remote Working One Year On: What the Future Holds for Cybersecurity

    We are approaching a time when people will start returning to the workplace. Yet with many organizations now embracing a “remote-first” model, where employees will work at home either all or some of the time, what will this mean for cybersecurity? by Daan Jacobs Battling...

  • MFT Agents for remote file transfer automation

    A few years ago, HelpSystems added Agent capabilities to their GoAnywhere Managed File Transfer solution. This extra functionality greatly enhanced an already extensive suite of security and automation features by including encryption at rest and in transit, batch and ad-hoc file transfer, peer-to-peer file collaboration,...

  • Introducing Cyberwatch

    A simple and complete platform to improve your IT defence. While the majority of companies face the demands of a hyperconnected society, cyberattacks are evolving exponentially. According to an Opinion Matters/VMware study, “76% of all companies fear the occurrence of a major cyber incident in...

  • Searching for security online? Here we are!

    BBES Group proudly announces that its website is online. Born in October 2020, the international group specialized in data security now boasts a new, rich website: https://bbes-group.com. The site aims to represent all the services and the solutions currently available in data security, ranging from data classification to managed file transfer, from automation to data loss prevention.  Global...

  • AS2, AS3, AS4 : What are the differences between these protocols?

    If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them.  By Nikolina Kendeš The specifications of AS2 AS2...

  • How to prevent Data Exfiltration

    Today, data is a valuable commodity. It has value to the organisations who own it and to those looking to exploit it through illegal activity. Data can be sensitive information about customers and employees, financial or strategic information, product designs or intellectual property, or any...

  • Which one is better, AS2 or AS4?

    Although they share similarities, there are some key differences between these two protocols, let’s find out which one is better, AS2 or AS4! by Ekron Dries What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely and...

  • What sets GoAnywhere MFT apart

    GoAnywhere MFT has a whole suite of features that were designed to be flexible and to meet customer’s needs. There is a lot of functionality packed into it and for good reason. Organisations have a wide range of needs and a wide variety of compliance...

  • Enhancing Microsoft MIP in an era of enhanced regulatory obligation

    The data protection landscape and its associated compliance environment changed fundamentally with the implementation of the European-wide GDPR in May 2018, with many other privacy regulations following suit around the globe. It is no longer about what organisations think they need to be doing in order to control their data,...

  • What are the current cyber threat trends in 2021?

    Many current cyber threat trends hinge on change and uncertainty caused by the COVID-19 pandemic. Whether it’s a panicked email recipient falling for a phishing scheme, innovations in ransomware, or simply remote workforces offering larger surfaces to attack, the goal of each is to find...

  • File Transfers from/to AWS S3 Buckets

    Today’s businesses operate in a truly cloud-centric world and storing data in the cloud is a task that most modern IT teams need to handle.  At BlueFinch, we help hundreds of customers automate and secure their file transfers. In the process, we learn a lot...

  • Essential cyber security books for your fall reading list!

    We spend the majority of our time on the internet reading short snippets of information about cyber security which makes it difficult to really understand the holistic view. Reading books, however, is an excellent way to get some additional and unique insight into the industry....

  • Free VIP tickets for TBX Event!

    November 3rd and 4th, Utrecht, Jaarbeurs  We’re happy to announce that BlueFinch takes part in TBX Event (Tech, Business, Accelerate), the long-awaited successor to the IT exhibition Infosecurity.nl, Data & Cloud Expo.  Rooted in the belief that with the right IT solutions your business challenges can be resolved and the digital transformation in...

  • How Titus assists you with GDPR compliance

    Titus enhances the effectiveness of your personal data protection and privacy program by identifying what data you have, how sensitive it is, and how it should be handled by your security stack. By Nikolina Kendes Industry and analyst research have indicated that identifying and classifying...

  • Using Clearswift Secure Email Gateway to Enhance Data Security in Microsoft Office 365

    In this article, we look at the common areas of concern we hear from customers using the Office 365 Enterprise E5 and Microsoft E5 platforms and look at how the ClearSwift Secure Email Gateway (SEG) can be used to provide enhanced Adaptive Data Loss Prevention (A-DLP) protection and...

  • 7 Scenarios in Which to Use Encryption Software

    Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs. By Ekron Dries What is Data Encryption Software? Data encryption software, also called file encryption...

  • TBX Event 2021 and E-Crime & Cybersecurity Nordics 2021

    Conferences and Trade Shows. They were never really gone, but that time of the year is back again and so is BlueFinch. Two important gatherings were attended in late October and early November, TBX event and E-crime & Cybersecurity Nordics.  TBX Event 2021  Finally, after more than a year of pandemic isolation, we were able to speak to people in...

  • Data security with a holistic approach

    With a continuous news stream about security incidents and new regulations for privacy protection, it’s more important than ever for organisations to think seriously about data privacy and data security together.   By: Ekron Dries If we look at IT security, most organisations have a strong focus on perimeter defence: building walls to block...

  • How Data Breaches can be prevented with Secure Mail

    Data breaches are one of the worst nightmares of every IT security professional. Regardless of the level of IT security applied by the company, your employees’ actions during digital communication remain the weakest link in data security. Many reports state that more than 60% of all data...

  • Migration of XFB Gateway for PeSIT transfers

    This month, we talk about another customer case where an existing and expensive solution was successfully replaced with GoAnywhere MFT. Read about the business drivers, the challenges and learn more about the migration to success in this article. by Eloïse Gruber Customer industry: Banking & Finance  What were...

  • Meeting GDPR Requirements with GoAnywhere MFT

    The General Data Protection Regulation (GDPR) is a regulation approved by the European Parliament. It applies to all organisations that handle and process EU citizens’ data,

  • Municipality of ’s-Hertogenbosch unlocks data in a secure and pragmatic manner with new Managed File Transfer solution

    Data plays an increasingly important role in our society. This requires a variety of measures to deal with this, to process and store data, and to protect it. Managed File Transfer (MFT) is a solution for the secure transfer of sensitive and large files, as well as the exchange of incoming and outgoing...

  • Data Privacy vs. Data Security: What’s the Difference?

    Understandably, the terms data security and data privacy are frequently muddled together and sometimes used interchangeably. While they are naturally connected, they are also unique and separate concepts.  by Richard Verkaik To help ensure the data your customers and employees entrust to your organisation is...

  • All the best for 2022 from BlueFinch

    First, we would like to thank all our colleagues, customers and partners for making 2021 such a memorable year and we wish you and your families a happy, prosperous and healthy New Year. by Ekron Dries 2021 has been the year of wins for BlueFinch,...

  • Data Classification Best Practices

    Data classification tools not only help organisations to protect their data, but they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between...

  • Have you Zivvered it?

    Remote working, a rise in security incidents, evolving regulatory pressures; these are challenges faced across all industries today. Securing digital communications has never been more important. Hybrid working has placed an enormous strain on IT resources and, in addition to shouldering the responsibilities of their...

  • What Is Email Phishing? [How to Protect Your Enterprise] 

    Phishing emails can steal sensitive data and cost companies’ reputation. However, protecting a company from these scammers doesn’t need to be difficult.  Phishing emails are a social engineering attack used to steal your personal information like passwords or credit card numbers. The victim receives an email...

  • File Transfers from/to – Azure Storage (Blob & ADLS Gen1/2)

    We live in the age of digitalization where businesses are seeking new ways to lower costs while improving their efficiency. Cloud services like Microsoft Azure stand as a true testament to this concept. Microsoft provides a smart solution for modern-day storage problems which is Azure...

  • Looking at 2022: New Year, New Data Security Strategies

    Despite massive growth in data security spending, the number of data breaches is increasing. With constant changes in how and where work is done—thanks in part to growth in both cloud computing and mobile device usage—the threats are changing, too. And so are the strategies...

  • Controlling, securing, and managing user access to sensitive data 

    Majority of companies shares, analyses, collects and archives a multitude of information. Today, for the most part, in a dematerialized way. This digital data is valuable because it makes possible to carry out the smooth running of the internal and external organisational aspects of the...

  • Prevent email spoofing and avoid business email compromise with DMARC!

    Wondering how DMARC affects email? Here’s a comprehensive guide explaining what DMARC is, how it affects email, and why your company needs it for security.  By Ekron Dries What is DMARC?  What does DMARC stands for? DMARC, short for Domain-based Message Authentication, Reporting and Conformance,...

  • Customized online forms secured with GoAnywhere MFT 

    Filling out a form is an act of trust. When you ask people to fill out a form to collect the information you need to operate your business, individuals are trusting you to keep the data you collect safe and secure. Whether it is patients submitting...

  • The Royal Danish Library automates the collection of digital cultural heritage with Managed File Transfer

    Denmark has had a legal deposit law in place since 1781, which is used to collect printed cultural heritage. Legal deposit has now been expanded to include digital publications, as well as radio and television content. One of their tasks as Denmark’s national library is...

  • BlueFinch is Top Growth Partner of 2021!

    BlueFinch is excited to share the news with all of our customers and partners that we have been awarded with the Top Growth Partner Award for 2021! This achievement is the result of a positive and constructive relationship with both customers and HelpSystems as one...

  • The importance of software support for your business

    The software you use in your business is like the oil that keeps your car running smoothly. It’s taken for granted when it’s doing its job properly, but as soon as something goes wrong, things can come grinding to a shuddering halt.  Based on our...

  • Vulnerability scanner: the new essential tool for your IT security team!

    Vulnerabilities are part of digital life. They are the result of the increasing complexity of code and system, coupled with gaps in the cybersecurity practices of designers and users. While it is impossible to completely eradicate vulnerabilities in code and system, improving their processing offers...

  • FTP vs. TFTP vs. FileCatalyst: What is the Difference? 

    Transferring files over the internet is a common task in today’s digital world and it’s important to find and use protocol that fits your organisation’s needs.  by: Ekron Dries A protocol is a set of rules and messages between a sender and a receiver. It...

  • Keep the security of your information systems under control

    A company shares, analyses and collects a multitude of information, which is now largely dematerialized. This digital data is valuable because it allows the smooth running of the internal and external organization of the company. This data constitutes an important part of the company’s capital In...

  • DLP and Secure File Transfer

    Whether it’s protecting sensitive data or controlling your company’s outbound content, implementing a DLP (Data Loss Prevention) solution will help maintain data visibility and control in line with your corporate policy. Let’s see together the crucial role of DLP in the security of your data....

  • GoAnywhere 7 Is Here 

    The long anticipated version 7 of the award-winning GoAnywhere MFT was released last week, bringing new features and many improvements, that will certainly appeal many of our customers.  For those who can’t wait, the 7.0 BETA is already available for download and can be installed...

  • Essential practices for successful cybersecurity strategy – Pentest and Vulnerability scanner

    The pen test and the vulnerability scanner are two essential practices for the implementation of a successful security strategy. However, do you know the differences and complementarities of these two cybersecurity mechanisms? by: Eloïse Gruber What is a “vulnerability scanner”? Vulnerability scanner is a software...

  • e-Crime & Cybersecurity Congress Nordics

    24th May, Stockholm, Sweden  “Can anyone prove they’re secure? Everyone is a third party. So, if businesses will increasingly only work with the cybersecure, how can you prove you are? Especially if your third parties aren’t…..”  BlueFinch is pleased to announce the participation in the...

  • CISO Perspectives: Data Security Survey 2022

    How COVID-19 impacted organizations’ data security – and how leaders are feeling today in the face of increased threats. The COVID-19 pandemic permanently changed cybersecurity, from cloud migration to remote work to security at the edge, and at the same time, threats have increased. With...

  • GoAnywhere MFT Use Cases

    By Eloise Gruber Use Case #1 – Healthcare sector This healthcare facility had a dual need for file transfers: to provide security and to manage the growth of file exchanges with other institutions. The company had initially set up an in-house tool that stored files...

  • BlueFinch at the e-Crime and Cybersecurity Congress

    BlueFinch together with HelpSystems, was present as a sponsor to the e-Crime & Cybersecurity Nordics 2022 on the 24th of May in Stockholm. By Ekron Dries It turned out to be a great day full of interesting panel discussions by CISO’s from leading companies like...

  • Netwrix Use Case Suite on Data Auditing and Classification

    by Eloise Gruber Use case #1 – Manufacturing sector This particular company is a leading manufacturer of production machines for wood. It had to ensure that all data relating to the machines it produces remained secure. The company wanted to quickly detect security breaches and...

  • BBES Group Convention

    Malaga, June 10, 2022 –The first BBES Group yearly convention in Malaga brought together all the familiar faces in a stunning décor and was filled with inspiring sessions and lots of fun. Since the BBES Group was founded one and a half years ago, it...

  • BlueFinch-ESBD Group: your trusted partner for securing your data 

    We are pleased to announce the merger between ESBD and BlueFinch. After more than seven years of collaboration it was time to combine our knowledge, services, and solutions for securing your data. With the merger BlueFinch and ESBD continue as the BlueFinch-ESBD Group: a European...

  • Self-Service concept with GoAnywhere MFT 

    Before we dive into this topic, let’s have a quick look what Self-Service actually means.  “Self-service is the practice of serving oneself, usually when purchasing items. Common examples include … at buffet-style restaurants, where the customer serves their own plate of food from a large,...

  • Privileged Access Security (PAM) 

    While cyberattacks and malware make headlines, one of the biggest security threats companies face comes from trusted users with privileged access to sensitive data. Many companies report that internal attacks are becoming more frequent and that they feel vulnerable to them.  by Eloise Gruber Security...

  • Is Managed File Transfer dead? 

    As cybersecurity technology continues to advance, some might ask whether secure Managed File Transfer (MFT) is fading away as a viable option for organisations to use for their file transfer needs. If organisations do choose to utilize MFT for their secure file transfer purposes, they...

  • Why it’s Time to Adopt Zero Trust Architecture 

    If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion.  To the outsider, it’s a term...

  • Enterprise Data Security: Why It Matters and How To Build a Strategy 

    Before trying to better understand what enterprise data security is, it’s best to know the meaning of data security in a broader sense. In essence, data security is everything that surrounds the protection of digital data from destructive forces or unwanted actions of unauthorized users,...

  • Common Questions About Fast File Transfer 

    There is no doubt we live in an information-intensive world, one in which getting the right data quickly is often pivotal to an organization’s success. Moving files from point A to point B requires many considerations, but when it comes to large, mission-critical files that...

  • Data Classification: One Piece of the Puzzle

    Implementing a Data Classification solution into your environment will do wonders for your cyber security stance. While Data Classification is the logical start of creating a security policy, it is just one piece of the puzzle. By simply marking information and giving it that all important identity, you’re on the right track, but what...

  • Why is organising data so difficult for most companies?

    When your network starts to contain a lot of duplicated, outdated, or negligible data, it does suffer the productivity and the organisation of records. The good news is that you can remedy this situation with the right tools. by Ron Diebels How does this impact...

  • Major release of Cyberwatch: discover the features of v12.0 

    Cyberwatch 12.0 is the new version of the vulnerability management and compliance monitoring platform, and has been released end of September 2022.   This article introduces you to the main features of this major Cyberwatch update.  By Maxime Alay-Eddine  Introduction of a new simpler, clearer, more...

  • Revoke Access to Your Files from Anywhere – Digital Rights Management (DRM) and How it Works 

    Your auditor sends a copy of your company’s recent financial statements to his firm to verify another clean pass. Because he’s worked there for years, he sends the file to his partner without encrypting it and leaves for the day. On his way home, his...

Leave your mail for our newsletter