Data breaches are a lot like climate change

Posted by Camden Swita on April 18 2017

Data breaches and climate change are a lot alike. Preventing either requires enough people to care about mistakes made one, two, or ten years ago and to change their daily habits to help prevent a growing, if hard to define, problem.

“Information security is a race between peak indifference to surveillance and the point of no return for data-collection and retention,” Cory Doctorow wrote in a recent article on BoingBoing. “The unprecedented leaks in 2016 were not (merely) the result of data gathered last year; much of that data was gathered in the decades [before] this one, inadequately secured and treated as so inconsequential that Yahoo allowed the NSA to backdoor a billions-strong silo filled with data its customers had not even realized they were filling.”

Read More

Topics: endpoint data protection, data breach, newsletter, data in motion, data at rest, corporate data, Corporate theft, climate change

Can I buy your corporate login info?

Posted by Camden Swita on April 4 2017

In our weekly newsletter, we'll bring you insights from our executive team, news and information about data governance and methods you can use to prevent leaks. We’re looking forward to your feedback and hope you enjoy the read. If you'd like to receive future editions, please subscribe.

How does $250 sound?

Recent research shows that’s all it would take for about 7 percent of European employees to cough up access to their corporate networks. 14 percent would sell their login info, although their price points would be a bit higher. The same study, which surveyed 4,000 employees in Europe, found that 29 percent have purposefully sent sensitive information outside their company and 15 percent have taken “business critical” information from one job to another with the purpose of reusing it.

These are facts that every business and IT leader needs to understand and consider how to address.

Read More

Topics: endpoint data protection, newsletter, data in motion, data at rest, corporate data, Vault 7, Corporate theft, CIA

Data security regulations + a spending disconnect

Posted by Camden Swita on March 23 2017

This is a repost of our first weekly newsletter. We'll bring you insights from our executive team, news and information about data governance and methods you can use to prevent leaks. We’re looking forward to your feedback and hope you enjoy the read. If you'd like to receive future editions, please subscribe.

Widespread Adoption of New Financial Data Regulations

If you don’t do business in New York or work in the financial services industry, the New York State Department of Financial Services (NYDFS) rules that went into place March 1 won’t directly impact your day to day…yet.

I say yet because other states are looking at the rules as possible blueprints for their own regulations. Significant takeaways from the regulations include:

Read More

Topics: endpoint data protection, newsletter, data in motion, thales, data at rest

Vaultize is the First Security Company to Fully Secure Text and CSV files with End-to-End Digital Rights Management

Posted by Ankur Panchbudhe on July 14 2016

New Suite Includes Built-In Multi Factor Authentication and Uniquely Protects Encryption Keys with Multi Factor Authentication

Vaultize, the security leader in enterprise digital rights management (eDRM), today announced the general availability of the latest version of the Vaultize Platform, a comprehensive data security solution  providing the most robust end-to-end data security available in the market. With this release Security conscious companies in the Fortune 500 need to ensure that their critical data is completely secure from end to end and can only be accessed with the appropriate rights. With this release Vaultize closes a key gap that exists in eDRM solutions today. Read More

Topics: Digital Rights Management (DRM), Enterprise File Sync & Share, Vault KNOX, enterprise file security, endpoint encryption, endpoint data protection, Secure FIle Sharing, Multi-Factor Authentication (MFA), RADIUS

Case Study – A Global Financial Services

Posted by Jim Mongillo on June 29 2016

Continuing our penetration into security conscious and regulated verticals, we recently won a global contract from a leading financial services company with offices worldwide. After having evaluated many enterprise file security and digital rights management solutions over many months, the company selected Vaultize.


Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Compliance, BYOD, enterprise file sharing, Enterprise File Sync & Share, FTP Replacement, Vault KNOX, Dropbox Alternative, endpoint data protection, Outlook Plugin, data governance, Lotus Notes

Vaultize Helps Its Fortune Customer Recover from a Ransomware Attack

Posted by Paresh Pandey on June 1 2016

Every few days, we see a new headline about organizations becoming target of ransomware. Ransomware is a type of malware, which forces organizations to pay ransom by limiting or preventing their employees from accessing the digital assets (like files and databases) in their possession. A ransomware typically encrypts files on endpoints and file repositories, thus preventing access to the files and then, in order to decrypt the files, demands payment. The ransom prices vary, ranging from a few dollars to thousands of dollars per file – which can run into millions of dollars for a large organization. It is important to note, however, that paying the ransom does not guarantee that users can eventually access the infected system or files.

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Enterprise File Sync & Share, FTP Replacement, enterprise file security, Dropbox Alternative, endpoint encryption, endpoint data protection, Secure FIle Sharing, VPN-free access, endpoint backup, Ransomware

Vaultize Achieves Accelerated Growth in Financial Year 2015-16

Posted by Anand Kekre on April 14 2016

We are happy to announce that the Company achieved accelerated growth of over 500 percent in revenue for the financial year ending March 2016. We added several large enterprise customers across geographies and verticals to our customer base – fueling our accelerated growth.

Financial_growth_2016.jpg

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Compliance, file security, Enterprise Mobility Management, Enterprise File Sync & Share, endpoint data protection, Data Loss Prevention (DLP), data governance, Return On Investment (ROI)

This International Backup Day, think about Ransomware and not just endpoint backup.

Posted by Ankur Panchbudhe on April 1 2016

As we are moving into 2016, experts are predicting Ransomware to become one of the biggest menaces for enterprises – particularly for those with sensitive, proprietary and private data in their possession.

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Enterprise File Sync & Share, endpoint encryption, endpoint data protection, Secure FIle Sharing, Mobile Collaboration, endpoint backup, Ransomware

Vaultize Enterprise File Security Now Available in East Africa Region

Posted by Sameer Vitkar on February 10 2016

Today we are announcing signing a partnership with CompuLynx, a Value Added reseller (VAR) headquartered in Nairobi, Kenya, to expand our channel ecosystem in East Africa. Our enterprise file security platform that enables secure enterprise file sync & share (EFSS), VPN-free anywhere access and mobile collaboration with built-in Digital Rights Management (DRM) and endpoint backup, is now available in East Africa region through offices of CompuLynx.

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Compliance, Virtual Data Rooms (VDR), BYOD, Enterprise File Sync & Share, FTP Replacement, enterprise file security, Dropbox Alternative, endpoint data protection, data governance, endpoint backup, Value Added Reseller(VAR)

Build Your Defense Against Ransomware Through Endpoint Backup

Posted by Sameer Vitkar on January 21 2016

What is Ransomware? What is the associated security risk? What is our defense mechanism? Your C-level executives may have asked you similar questions, as there has been a sharp rise in the number of incidents of this devastating malware that attempts to extort money from the victims with promises of restoring data infected (actually encrypted) by them.

Read More

Topics: Digital Rights Management (DRM), Compliance, Enterprise File Sync & Share, enterprise file security, Dropbox Alternative, endpoint encryption, endpoint data protection, Secure FIle Sharing, data governance, Mobile Collaboration, endpoint backup, Ransomware

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics