• Identity Finder/Forrester Research Webinar: Control Your Data - Duration: 32 minutes.

    • 1 year ago
    Identity Finder CEO Todd Feinman and Forrester Research VP John Kindervag discuss new strategies to control your data as part of a data loss prevention and breach mitigation strategy in the modern ...
  • Sensitive Data Managment - Duration: 111 seconds.

    • 1 year ago
    Sensitive Data Management is more than DLP. Identity Finder Sensitive Data Manager is a software solution that discovers, classifies, remediates, enforces, and reports on sensitive data best practi...
  • Using Identity Finder for the First Time - Duration: 2 minutes, 45 seconds.

    • 2 years ago
    Using Identity Finder for the first time is easy. Identity Finder's powerful validation algorithms and intuitive interface allow you to find social security numbers, credit card numbers, passwords,...
  • Use Case: Verified HIPAA Compliance - Duration: 10 minutes.

    • 3 years ago
    Surgeons, doctors, physicians, pharmacists billing managers, supervising radiologists, and managing nurses are allowed nearly unlimited access to subsets of PHI and often export various PHI fields ...
  • Verified HIPAA Compliance - Duration: 4 minutes, 23 seconds.

    • 3 years ago
    Even if you use only HIPAA- compliant software applications, hospitals, healthcare systems, business associates and clinics can still violate HIPAA and have a breach. Protected Patient Health Info...
  • Identity Finder: Software Security vs. Data Security - Duration: 4 minutes, 48 seconds.

    • 4 years ago
    Holistic data security is when people and technology work together to protect customers and intellectual property. Data security is not a software product. Data Security is an attitude and a corp...
  • Identity Finder DLP Enterprise - Duration: 4 minutes, 43 seconds.

    • 4 years ago
    All data security is a balance of two principles- keeping bad guys away from target data, and decreasing the value of the target. As you store more sensitive information on your computers and netwo...
  • Identity Finder DLP Enterprise Architecture - Duration: 3 minutes, 45 seconds.

    • 4 years ago
    Identity Finder's architecture is flexible, and can be configured to adapt to your unique business needs. You have the option to centrally manage your deployment using the Identity Finder DLP Enter...
  • Identity Finder Data Loss Prevention: Data-at-Rest vs. Data-in-Motion - Duration: 6 minutes, 8 seconds.

    • 4 years ago
    Despite massive security efforts in place today by large organizations, data breaches continue to occur and identity theft is on the rise. There are two primary prevention strategies to searching a...
  • Identity Finder for PCI-DSS 2.0 - Duration: 7 minutes, 58 seconds.

    • 4 years ago
    Protecting Payment Card Industry (PCI) data is a necessity to prevent data breaches. Primary Account Numbers (PANs) leak out of the most secure systems and find their way into employee emails, har...
  • PlayStation Data Leak Could Be Largest Ever - Duration: 100 seconds.

    • 4 years ago
    Sony says that the credit card data of PlayStation users around the world may have been stolen in a hack that forced it to shut down its PlayStation Network for the past week, disconnecting 77 mill...
to add this to Watch Later

Add to

Loading playlists...