Huge boost coming in endpoint security spending, study finds

Posted by Camden Swita on August 2 2017

A recent study by a security research firm and antivirus developer shows that a whopping 72 percent of businesses are planning to ramp spending on endpoint security in the coming months. Nearly a third of them plan to significantly boost spending on endpoint security, such as backup, encryption and restore capabilities.

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, data breach, endpoint backup, Ransomware, Data security, endpoint restore, cyber attack

Future cyber attack could be as destructive as superstorm sandy

Posted by Camden Swita on July 18 2017

A future global cyber attack could cause as much economic damage as a major natural disaster like 2012’s Superstorm Sandy, cyber insurance provider Lloyd’s of London wrote in a recent report.

Economic losses could soar to $53 billion and beyond worldwide following an attack on a major cloud service provider, the study, co-written by Lloyd’s and risk-modeling firm Cyence, found.

Read More

Topics: endpoint encryption, endpoint data protection, encryption, endpoint backup, Data security, malware, NotPetya

How It's Made: A Ransomware-riddled Network

Posted by Camden Swita on July 13 2017

A closer look at NotPetya actions after it infected one endpoint

There’s been a lot of talk about how NotPetya made it onto corporate networks in late June. There were two main vectors: attachments in phishing emails and an infected update from tax software made by a Ukrainian company. But how did the ransomware spread after it infected just one endpoint? It had two options: the “flat network” exploit and the “stolen NSA tech” path. The former seems to have been the one most frequently used.

Protect yourself against ransomware

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, encryption, Russia, endpoint backup, Ransomware, update, Data security, malware, ransomware defense, NotPetya, ukraine

“SUPERWEAPON” RANSOMWARE BUILT TO SPREAD, CAUSE DAMAGE, NOT MAKE MONEY

Posted by Camden Swita on June 30 2017

As details emerge about the ransomware behind this week’s global attack, NotPetya, one fact is becoming clear: ransomware is becoming more advanced, destructive and harder to kill—weaponized, if you will.

A report on June 30 by Forbes details just how nasty—and sophisticated—the attack was. Experts are saying it’s more of a “superweapon” designed to wreak havoc, spread fast and damage infected machines than a cash-grabbing tool.

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, encryption, Russia, endpoint backup, Ransomware, update, Data security, malware, ransomware defense, NotPetya, ukraine

Data breaches are a lot like climate change

Posted by Camden Swita on April 18 2017

Data breaches and climate change are a lot alike. Preventing either requires enough people to care about mistakes made one, two, or ten years ago and to change their daily habits to help prevent a growing, if hard to define, problem.

“Information security is a race between peak indifference to surveillance and the point of no return for data-collection and retention,” Cory Doctorow wrote in a recent article on BoingBoing. “The unprecedented leaks in 2016 were not (merely) the result of data gathered last year; much of that data was gathered in the decades [before] this one, inadequately secured and treated as so inconsequential that Yahoo allowed the NSA to backdoor a billions-strong silo filled with data its customers had not even realized they were filling.”

Read More

Topics: endpoint data protection, data breach, newsletter, data in motion, data at rest, corporate data, Corporate theft, climate change

Can I buy your corporate login info?

Posted by Camden Swita on April 4 2017

In our weekly newsletter, we'll bring you insights from our executive team, news and information about data governance and methods you can use to prevent leaks. We’re looking forward to your feedback and hope you enjoy the read. If you'd like to receive future editions, please subscribe.

How does $250 sound?

Recent research shows that’s all it would take for about 7 percent of European employees to cough up access to their corporate networks. 14 percent would sell their login info, although their price points would be a bit higher. The same study, which surveyed 4,000 employees in Europe, found that 29 percent have purposefully sent sensitive information outside their company and 15 percent have taken “business critical” information from one job to another with the purpose of reusing it.

These are facts that every business and IT leader needs to understand and consider how to address.

Read More

Topics: endpoint data protection, newsletter, data in motion, data at rest, corporate data, Vault 7, Corporate theft, CIA

Data security regulations + a spending disconnect

Posted by Camden Swita on March 23 2017

This is a repost of our first weekly newsletter. We'll bring you insights from our executive team, news and information about data governance and methods you can use to prevent leaks. We’re looking forward to your feedback and hope you enjoy the read. If you'd like to receive future editions, please subscribe.

Widespread Adoption of New Financial Data Regulations

If you don’t do business in New York or work in the financial services industry, the New York State Department of Financial Services (NYDFS) rules that went into place March 1 won’t directly impact your day to day…yet.

I say yet because other states are looking at the rules as possible blueprints for their own regulations. Significant takeaways from the regulations include:

Read More

Topics: endpoint data protection, newsletter, data in motion, thales, data at rest

Vaultize is the First Security Company to Fully Secure Text and CSV files with End-to-End Digital Rights Management

Posted by Ankur Panchbudhe on July 14 2016

New Suite Includes Built-In Multi Factor Authentication and Uniquely Protects Encryption Keys with Multi Factor Authentication

Vaultize, the security leader in enterprise digital rights management (eDRM), today announced the general availability of the latest version of the Vaultize Platform, a comprehensive data security solution  providing the most robust end-to-end data security available in the market. With this release Security conscious companies in the Fortune 500 need to ensure that their critical data is completely secure from end to end and can only be accessed with the appropriate rights. With this release Vaultize closes a key gap that exists in eDRM solutions today. Read More

Topics: Digital Rights Management (DRM), Enterprise File Sync & Share, Vault KNOX, enterprise file security, endpoint encryption, endpoint data protection, Secure FIle Sharing, Multi-Factor Authentication (MFA), RADIUS

Case Study – A Global Financial Services

Posted by Jim Mongillo on June 29 2016

Continuing our penetration into security conscious and regulated verticals, we recently won a global contract from a leading financial services company with offices worldwide. After having evaluated many enterprise file security and digital rights management solutions over many months, the company selected Vaultize.


Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Compliance, BYOD, enterprise file sharing, Enterprise File Sync & Share, FTP Replacement, Vault KNOX, Dropbox Alternative, endpoint data protection, Outlook Plugin, data governance, Lotus Notes

Vaultize Helps Its Fortune Customer Recover from a Ransomware Attack

Posted by Paresh Pandey on June 1 2016

Every few days, we see a new headline about organizations becoming target of ransomware. Ransomware is a type of malware, which forces organizations to pay ransom by limiting or preventing their employees from accessing the digital assets (like files and databases) in their possession. A ransomware typically encrypts files on endpoints and file repositories, thus preventing access to the files and then, in order to decrypt the files, demands payment. The ransom prices vary, ranging from a few dollars to thousands of dollars per file – which can run into millions of dollars for a large organization. It is important to note, however, that paying the ransom does not guarantee that users can eventually access the infected system or files.

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Enterprise File Sync & Share, FTP Replacement, enterprise file security, Dropbox Alternative, endpoint encryption, endpoint data protection, Secure FIle Sharing, VPN-free access, endpoint backup, Ransomware

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics