Comprehensive software reviews to make better IT decisions
Spirion Swipes Cybersecurity Gold for Data Classification
At the RSA Conference earlier this month, Spirion announced it had won the Gold Cybersecurity Excellence Product Award in the Data Classification category. Spirion offers dedicated focus, solely on data discovery and classification. It aims to help organizations protect their important information by first identifying what their most sensitive data is and where it resides. From there, through tagging, centralized management, and remote control, organizations are able to properly operationalize data classification policies for adequate data protection.
Some standout features boasted by Spirion include the following:
- Unique ability to identify sensitive data through customizable icons that display as file overlays viewable in Windows Explorer and the simple application of metadata tags to sensitive data with persistent updates, as the file updates. As a result, users are educated and empowered to take proper measures to proactively protect data appropriately.
- Impressive speed and precision for discovery, classification, and protection of data. Analytics and machine learning algorithms are used to identify and protect structured and unstructured data – all document types, including images and charts, on desktops, shared drivers, or in the cloud are supported.
- Automated discovery, classification, and protection of data, both at rest and in use. Spirion’s solution aims to rely less on end users’ input, therefore, reducing disruption to business and daily tasks. These classifications can still be fine-tuned, along with providing more information on data users, data owners, and how data is used.
Heightened regulatory privacy and security requirements have been highlighting the critical need for accurate and efficient data classification for businesses of all sizes – all of whom are overwhelmed with massive amounts of sensitive data sprawled across the organization.
However, it is important to remember that despite all the success rates, efficiency scores, and speed tests boasted by any vendor, it comes down to how users are trained and how data is actually handled. A solution is only as good as it is being used.
Tools such as Spirion’s complement and strengthen data loss prevention (DLP) efforts nicely, but unless users are aware of how to appropriately handle data and there are other measures in place, it cannot protect data in isolation. Focusing on employee use of data is foundational to the success of any data classification tool. Further, be cautious of vendors claiming that a top score reflects how effective a product will be for your organization. Consider factors such as cost, ease of implementation, stability, integration with existing solutions, and more.
Want to Know More?
Atlassian has acquired Halp, a real-time helpdesk tool that integrates with Slack. With the broader context of this move being Atlassian and Slack’s strategic alliance, might there be more to this acquisition than meets the eye?
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Organizations are complex and have multiple stakeholders involved in the delivery of a service. In a public sector organization, for example, there are end users, multiple agencies and departments, and vendors involved in the delivery and consumption of the service. Service design methods and tools assist in making sense of these stakeholders’ inter-relationships and allow organizations to make sound decisions during service implementation.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.
The impact of COVID-19, as it became a global pandemic in Q1 of 2020, has affected user sentiment toward software during a growing period of fear, uncertainty, and doubt. To analyze the impact, SoftwareReviews compared Satisfaction (willingness to recommend to a peer), ability to deliver Business Value (fair cost to value), and Likeliness to Renew prior to March 10 and post March 10.
Qualys VMDR Is Now Live: Increasing Security Threats Requires Strong Vulnerability Management Software
Qualys VMDR has hit the live market. Originally unveiled in February 2020 at Qualys Security Conference, VMDR is now publicly available as of April 16, 2020. Partnering with both large and small MSSPs, VMDR is designed to be scalable to any business enterprise and to automate the entire management cycle on all endpoints.
ITSM vendor InvGate announced that due to COVID-19 any organization can use InvGate Service Desk free of charge. This promotion helps IT departments when they need it most while gaining adoption and market traction for InvGate.