member sign-in
Forgot password? Create new account Close

Data Security


Data security is the practice of keeping data protected from corruption and unauthorized access. The focus behind data security is to ensure privacy while protecting personal or corporate data.

Data classification

Regain control over your unstructured data. By classifying your data you can retrieve it more easily and identify more accurately the data you need to protect. Data classification can reduce the risk of costly data leakage and increase the efficiency of your business. ...

Content Aware and DLP

A set of technologies used to protect confidential information. Content-Aware and Data Loss Prevention technology is designed, using data-centric concept, to prevent inadvertent or accidental leaks or exposure of sensitive enterprise information outside authorized channels ...

Data Encryption

Data Encryption is a technology that uses encryption in order to prevent unauthorized access to data. Encryptionis the process of transforming information into a form that cannot be read without the possession of special knowledge, referred to as a key. The purpose of encryption ...

Manage and Secure file transfer

A set of technologies focused on secure data transfer and the exchange of information between companies and organizations. Solutions for automated exchange, ad-hoc transfers and permanent linkage are available. In each case, the aim is to replace comparatively insecure FTP ...

File Integrity / Activity Monitoring (FIM)

:  File Integrity/Activity Monitoring is the technology that monitors files of all types and detects changes in these files that can lead to increased risk of data compromise and is a critical tool in the fight against sensitive data compromise. Intelligence of the ...

Data classification

Regain control over your unstructured data. By classifying your data you can retrieve it more easily and identify more accurately the data you need to protect. Data classification can reduce the risk of costly data leakage and increase the efficiency of your business....


  • Webinar - Rethinking the Human Factor in Security

    Join this interesting and insightful webinar with recognised speaker and author Bruce Hallas and data security expert Martin Sugden, CEO at Boldon James, who will explore how organisations need to empower the user and go beyond training and education to ensure human behaviours are positively influenced to deliver real security and business value. Watch this webinar to learn: Learnings from research into the impact of human behaviour on user trust and security posture How to design a security approach that empowers humans The challenges associated ...

    read all
  • Boldon James expands European reach with appointment of Provision

    QinetiQ’s data security company Boldon James, the leading specialist provider of data classification and secure messaging solutions, today appointed Provision Enterprise Technology Solutions to take on distribution and support the growing demand for Boldon James market leading Classifier data classification solutions to customers and resellers across Romania & the Republic of Moldova. Founded in Romania, in 1997, Provision is a leading Romanian value-added distributor that provides a broad offering of enterprise security solutions and professional services. ...

    read all
  • HPE Enterprise Secure Key Manager Best Practices

    Managing encryption keys, monitoring logs, running frequent system backups, and intelligent user supervision are all necessary elements of managing data encryption environments, but can quickly be overwhelming and confusing even for experienced IT teams. Access this white paper now to learn how to use the HPE Enterprise Secure Key Manager. When configured as show in this white paper, will provide an effective and secure repository for your encryption keys environment and streamline: • Password management • Rekeying • Managing users, groups, ...

    read all
  • Cybersecurity Leadership Forum

    Register today to ensure your seat at the annual Forcepoint, powered by Raytheon, Cybersecurity Leadership Forum. The event will host discussions on the current state of cybersecurity and how to best prepare for future threats. This year’s forum is a unique opportunity to engage with thought leaders and hundreds of peers across Industry, Defense, Intelligence, Federal, Civilian and State & Local government. This year's keynote speakers include: General Michael Hayden – Retired four-star general who served as director ...

    read all
  • Gain Email “Peace of Mind in the Cloud”

    Believe it or not, email still leads the way for communications in enterprise companies. Email is where much of our business takes place and is still the collaboration platform of choice. The average user sends a median of 30 emails and receives a median of 100 and spends more than 150 minutes per day doing work in email. That adds up to an average of 2.5 hours a day working in email. However, email remains one of the most vulnerable systems in IT. From Oct. 2013 through Feb. 2016, law enforcement received reports from more than 17,000 victims of business email ...

    read all