Don't Sit On Your Security Problem - Do Something About It

Posted by Ankur Panchbudhe on October 6 2016

I meet a lot of managers and executives at organizations around the world who aren’t sure if their organization’s data is really secure or not. Many of them know their employees are using consumer-grade file sharing platforms every single day and sending unencrypted email attachments, but they often assume that the developers of the consumer-grade products – Dropbox, Google, etc. – are somehow protecting their data from breaches and leaks. They’re in essence setting their organization up for a big, expensive mess.

It’s easy to believe that as we work in today’s always on, always connected world, we are for the most part safe from cybersecurity threats that we read about in the news. But the truth is that we and the companies that we work at are not. Data leaks, breaches and thefts are, frankly, inevitable if proper precautions are not taken. And they often come as results not of malicious hackers bypassing network security but of mistakes made by employees in dispersing or sharing sensitive information or of intentional leakage and theft by disgruntled workers.

Read More

Topics: File Sharing, Information Security, file security, vDRM, DRM

Takeaways from Gartner Security Summit 2015

Posted by Sameer Vitkar on September 3 2015

 Vaultize exhibited its enterprise digital rights management (eDRM aka information rights management) integrated with enterprise file sync & share (EFSS) at the Gartner Security and Risk Management Summit in Mumbai on September 1 and 2, 2015 as Silver Sponsor.

Read More

Topics: Information Security, Gartner, Event

Vaultize Exhibiting Enterprise Rights Management at Gartner Security Summit

Posted by Sameer Vitkar on August 6 2015

Vaultize will be exhibiting its enterprise digital rights management (eDRM aka information rights management) with enterprise file sync & share (EFSS) at the Gartner Security and Risk Management Summit in Mumbai on September 1 and 2, 2015. It will be participating as Silver Sponsor.

Read More

Topics: Announcements, Information Security, Conference, Gartner

5 Most Common File Security Mistakes

Posted by Anand Kekre on May 28 2015

With the rise in workforce mobility, rapid advance of consumerization, BYOD trends and the increasing need to satisfy regulatory, privacy and confidentiality requirements, companies are realizing the need for investing in file security.

Many IT managers/CIO/CISO think that just deploying enterprise digital rights management (DRM aka Information Rights Management or IRM), Data Loss Prevention (DLP), Mobile Device Management (MDM) or Data Protection solutions are enough and their responsibility ends there. Although standalone DRM, DLP and MDM have been of immense value, they just remain as check-boxes on paper - without widespread corporate adoption and acceptance. A well-thought approach to file security makes a big difference in the way that organizations do business, meet compliance requirements, ensure privacy, and protect the digital assets of the company – and, in the era of consumerization, allow end-users to be more productive and efficient.

Read More

Topics: Data Protection, Mobile Content Management (MCM), Digital Rights Management (DRM), File Sharing, Information Security, Mobility (EMM), Thought Leadership, file security

Vaultize Introduces Enterprise Digital Rights Management in its Virtual Data Room Solution

Posted by Anand Kekre on May 21 2015

We are today announcing the availability of Digital Rights Management (DRM, aka Information Rights Management or IRM) fully integrated with our Virtual Data Room (VDR) offering further strenghtning our leadership in Enterprise File Sync & Share (EFSS), mobile collaboration and VPN-free anywhere access.

Read More

Topics: DLP, Digital Rights Management (DRM), Virtual Data Rooms (VDR), Announcements, Information Security

Information-centric Security – Thinking Beyond Traditional Perimeter-based Security

Posted by Anand Kekre on April 30 2015

Over a period of time, companies have heavily invested into security products including firewalls, anti-spam and intrusion prevention/detection that protect the corporate network (call it, corporate perimeter). This approach to information security is not enough in today’s world of consumerization, mobility and BYOD where data is being increasingly used from devices that are outside the corporate perimeter. Hence the practice of protecting corporate data through network and perimeter-based security measures is now being seen as ineffective in the light of security breaches and company data leaks in the recent past. 

Read More

Topics: Mobility, Digital Rights Management (DRM), Information Security, Mobility (EMM), Thought Leadership

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics