Posts
- 2 Key Benefits of an Identity & Access Management Solution
- 4 Stages of Crypto-Ransomware
- 5 Big Myths about DMARC, Debunked
- 5 Key Challenges of Cloud Data Transfer in 2023
- 5 Key Use Cases for User & Entity Behaviour Analytics
- 5 Tips for Large File Transfers
- 5 ways the Healthcare Industry is using Managed File Transfer
- 60 Second Interview With Danny Maher
- 9 Mistakes You Might Make When Sending Big Files
- 9STAR supports its South East Asian Market growth with the appointment of HANDD Business Solutions
- A Comprehensive Guide to UK & EU Data Security Regulations
- A Data Security Update: Looking Ahead to 2017
- A Micro-Guide to User-driven Data Classification Solutions
- AI in Cyber Security Part 1: Infiltration Into the Market
- AI in Cyber Security Part 2: Reinventing Corporate Defences
- An Introduction To Identity Access Management
- Axiomatics and HANDD Business Solutions Partner to Deliver Dynamic Authorization
- Badly Managed SSH Keys Pose a Serious Threat to Your Security
- BEC Cash-out Methods: Email Fraudsters Experimenting With Alternative Approaches
- Blobfish! The Store of the Azure BLOB
- Careers at HANDD
- Celebrating Seven Years at HANDD
- Changing the Security Culture within an organisation
- Choosing the Data Classification Solution That’s Right for Your Enterprise
- Clearmanage Boosts Cloud Security with CryptoAuditor
- Cloud still requires some blue sky thinking
- Cloud Transformation and Data Threats
- Confidencial Partners with HANDD to Provide Best-in-Class Data Protection For Organisations
- Control Your Data By Plumbing It Properly
- Could Data Classification Help Towards DORA Compliance?
- Cyber Security: Protect What You Have
- Data Classification Solutions: Four Points to Consider When Choosing a Provider
- Data Discovery – Stop the ROT
- Data Protection – Put Your Money Where Your Doubt Is
- Data Protection Tips For Small Businesses
- Data Security != IT
- Data Security in Review: What to expect in 2017
- Data Storage: In the Cloud, Or Not?
- Deloitte Data Breach: What Were They Thinking?
- DLP: Do not pass go, do not collect £200
- Don’t React to Ransomware, Prevent It!
- Don’t Forget About Managed File Transfer
- DORA – What’s Next and How Can I Prepare?
- DORA and NIS2 – What Do I Need to Know?
- DORA Regulation, Don’t Panic
- Drop BCC not BOMBS!
- DSPM – Don’t believe the Hype(cycle)?!
- Email Encryption in 2023
- Email Security Case Study: United International Pictures
- Enterprise Data Classification: Why you need best-of-breed data classification
- Five Steps To A Secure Workforce
- Four Key Benefits of Modern Data Classification Tools
- GDPR – One year on
- GDPR: Getting Your House in Order
- Global IT Security consultancy HANDD is Globalscape’s Top United Kingdom Partner in 2018
- Global Trends in Cyber Resilience
- HANDD and BigID announce partnership
- HANDD Business Solutions Announce Partnership With Ava
- HANDD Business Solutions Announce Partnership With Centrify
- HANDD Business Solutions Announces Strategic Secure Islands Partnership
- HANDD Business Solutions Appointed Securonix First UK VAR
- HANDD Business Solutions Congratulate New Partner, iSheriff
- HANDD Partner Tessian Recognised as a Representative Vendor in 2021 Gartner® Market Guide for Email Security
- Have you seen the mail I just sent?
- How Digital Transformation is Reshaping Data Security
- How Does MFT Help Your Business in the Cloud?
- How Security Professionals can Solve the Biological need to Break the Rules
- How to Close Critical Data Loss Prevention (DLP) Gaps in Microsoft 365
- How to Unlock More Benefits From Your Managed File Transfer Solution
- Identity & Access Management: Better Security, Efficiency, Productivity & Compliance
- Importance of Data Discovery
- Important Update on Progress MOVEit Vulnerability (June 2023)
- Introducing Globalscape EFT Version 8.0.4
- Is Dropbox Secure?
- Is there a ‘Silver Bullet’ Product for Complying to DORA?
- Is Your Data At Risk When Using AI?
- iSheriff Announces Acceleration of International Business
- iSheriff Establishes Leading Position in Anti-Malware Efficacy
- It’s Time to Get SASE
- Making the case for IT Modernisation
- Manage Your Data From Cradle to Grave
- Managed File Transfer is Going Places
- Managed File Transfer Predictions 2021
- MFT Case Study; Fidelity International
- MFT, SWIFT, and the Fight Against Cyberfraud
- Navigating DORA: Understanding the Digital Operational Resilience Act
- Navigating the Risks and Rewards of Cloud Transformation
- New Year, New DLP Strategy?
- NIST Cyber Security Framework 2.0 – A New Dawn?
- One Year Until the DORA Regulation Comes into Force
- PKWARE and HANDD Partner to Deliver Complete Suite of Data Security Solutions
- Policing in the Shadows, from home!
- Regulation and Compliance – What Drives Data Security Adoption?
- Responding to a Data Breach – A Five-Step Guide
- Safeguarding Data Privacy in an Evolving Regulatory Environment
- Schedule Your Tech Update
- Secure Your Dropbox Password
- Tailor Made Crisis Simulation
- Taming the Cloud: Cloud Data Protection for the Modern Business
- The AI-volution: Redefining Data Security and Privacy
- The Benefits of Cloud Managed File Transfer
- The Cloud – not all sunshine and rainbows
- The Cost of Doing Nothing About Data Discovery
- The Four Features of Cloud MFT
- The Importance of Identity Access Management Training
- The Importance of Protecting Personal Data
- The Insider Threat – Is Your Organisation in Control?
- The Key to Compliance and Data Control Success
- The Misdirected Email Mishap: A Lesson from Boris Johnson and Laura Kuenssberg
- The outlook is cloudy: The importance of Data Classification and Data Access Governance tools
- The Pros and Cons of Scripting
- The Reason Your Cloud Platform Needs Policing
- The security gaps in Microsoft 365 and how to manage them
- The Ultimate Guide to Data Loss Prevention
- Think EU GDPR Doesn’t Apply? Think Again!
- To Secure Banking Data, Map Out Its Journey In Advance
- Top Mobile App Security Risks
- UEBA: Artificial Intelligence Just Got Intelligent
- Under six months to achieve DORA compliance!
- What are the 5 pillars of DORA?
- What Have We Learned from GDPR?
- What is a ‘Data Centric’ Security Baseline?
- What Is Email Security?
- What is the Digital Operational Resilience Act? Download the Guide
- Who Can You Really Trust?
- Who Must Comply to DORA?
- Why are Top Businesses Turning to Data Classification?
- Why Data Classification Should be Central to Every Organisation’s Security Strategy
- Why Do We Want Data Classification?
- Why Email Security is a Top Cyber Security Control
- Why Improving Cyber Security Awareness Isn’t Enough
- Why Is Data Classification Important?
- Why your MFT Solution matters?
Products
- 3-STEP SECURITY STRATEGY
- BigID Data Intelligence Platform
- Centrify – Identity Service
- Centrify – Privilege Service
- Centrify – Server Suite
- Cloud Protector
- Concentric AI
- Cyber Essentials Readiness
- CyGlass
- Data Hygiene Management Consultancy
- Data Loss Prevention Focused Consultancy
- Data Security as a Service
- Data Security Consultancy
- Digital Guardian
- Digital Operational Resilience Act (DORA)
- Disaster Recovery Sanity Check<br>for Managed File Transfer
- DORA Legislation Consultancy Service
- DORA Legislation Consultancy Services
- Elastic SSO Enterprise
- Enterprise Recon
- Flexera – Corporate Software Inspector
- Flexera – Vulnerability Intelligence Manager
- Fortra’s Agari Brand Protection
- Fortra’s Agari Phishing Defense
- Fortra’s Agari Phishing Response
- Fortra’s Boldon James CAD Classifier
- Fortra’s Boldon James Classifier Reporting
- Fortra’s Boldon James Email Classifier
- Fortra’s Boldon James Exchange Classifier
- Fortra’s Boldon James File Classifier
- Fortra’s Boldon James Mobile Classifier
- Fortra’s Boldon James Mobile Filter
- Fortra’s Boldon James Notes Classifier
- Fortra’s Boldon James Office Classifier
- Fortra’s Boldon James OWA Classifier
- Fortra’s Boldon James Power Classifier
- Fortra’s Boldon James SharePoint Classifier
- Fortra’s Classifier Suite
- Fortra’s Classifier Suite – Classifier Reporting
- Fortra’s Classifier Suite – Email Classifier
- Fortra’s Classifier Suite – Exchange Classifier
- Fortra’s Classifier Suite – File Classifier
- Fortra’s Classifier Suite – Power Classifier
- Fortra’s Classifier Suite – CAD Classifier
- Fortra’s Classifier Suite – Mobile Classifier
- Fortra’s Classifier Suite – Mobile Filter
- Fortra’s Classifier Suite – Notes Classifier
- Fortra’s Classifier Suite – Office Classifier
- Fortra’s Classifier Suite – OWA Classifier
- Fortra’s Classifier Suite – Sharepoint Classifier
- Fortra’s Clearswift Data Loss Prevention
- Fortra’s Clearswift Data Loss Prevention
- Fortra’s Clearswift Secure Email Gateway
- Fortra’s Clearswift Secure ICAP Gateway
- Fortra’s Data Classification Suite
- Fortra’s Data Classification Suite
- Fortra’s Data Classification Suite – Illuminate
- Fortra’s EFT Arcus
- Fortra’s FileCatalyst
- Fortra’s Globalscape EFT Platform
- Fortra’s GoAnywhere MFT
- Fortra’s GoDrive
- Fortra’s TITUS Illuminate
- Fortra’s Vera Digital Rights Management
- Immersive AppSec
- Immersive Crisis
- Immersive CyberPro
- Immersive Talent
- iSheriff – Email Security
- iSheriff – Web Security
- iSheriff – End-Point Security
- LightBeam
- Lookout Cloud Access Security Broker
- Lookout Secure Internet Access
- Lookout Unified Cloud Security Platform
- Lookout Zero Trust Network Access
- Managed File Transfer Awareness Workshops
- Managed File Transfer Benchmarking
- Managed File Transfer Compliance Assessment
- Managed File Transfer Hosted Proof of Concept
- Managed File Transfer Security Best Practices Consultation
- Managed File Transfer Solution<br>Review and Market Comparison
- Managed File Transfer Upgrade Readiness
- Managed File Transfer Workflow Efficiency Review
- Managed File Transfer<br>Managed Services Test Environment
- MFT Managed Services
- Microsoft Purview Deployment Service
- MOVEit
- Radware – Attack Mitigation Service
- Resilient – Incident Response Platform
- Seclore’s Digital Rights Management
- Secure Document Sharing and Signing
- Spirion Sensitive Data Manager
- SSH – SSH Tectia MobileID
- SSH – CryptoAuditor
- SSH – Tectia MobileID
- SSH – Tectia SSH
- SSH – Universal Key Manager
- Support
- Terranova Security
- Watchful – RightsWATCH Platform
- WhatsUp Gold
- WS_FTP® Professional
- WS_FTP® Server
Resources
- Boldon James Allianz Customer Case Study
- Boldon James Classifier 360 Whitepaper
- Boldon James Classifier Administration Datasheet
- Boldon James Data Protection Presentation
- Boldon James Email Classifier Datasheet
- Boldon James Exchange Classifier Datasheet
- Boldon James File Classifier Datasheet
- Boldon James ITAR Fact Sheet
- Boldon James Mobile Classifier Datasheet
- Boldon James Mobile Classifier Sales Flyer
- Boldon James Mobile Filter Datasheet
- Boldon James Notes Classifier Datasheet
- Boldon James Office Classifier Datasheet
- Boldon James Oil and Gas Classifier Customer Case Study
- Boldon James OWA Classifier Datasheet
- Boldon James Power Classifier Datasheet
- Boldon James SharePoint Classifier Datasheet
- Boldon James SharePoint Presentation
- Boldon James South West Fire and Rescue Customer Case Study
- Boldon James User Driven Classification Datasheet
- Boldon James User Driven Classification Whitepaper
- Boldon James Video: Data Classification Overview
- Business Intelligence Dashboards for File Transfer
- Centrify ELC Case Study
- Centrify Essendon Volkswagen Case Study
- Centrify HIPAA Case Study
- Centrify Identity Management Case Study
- Centrify Identity Service Datasheet
- Centrify Identity Service, Enterprise Mobility Management Datasheet
- Centrify Identity Service, Mac Edition Datasheet
- Centrify Identity Service, Mac Smart Card Edition Datasheet
- Centrify Interval International Case Study
- Centrify Morehouse College Case Study
- Centrify Morris Communications Case Study
- Centrify National Weather Service Case Study
- Centrify Ouachita School District Case Study
- Centrify Privilege Serivce Datasheet
- Centrify SBA Communications Case Study
- Centrify Server Suite Datasheet
- Centrify Server Suite, Standard Edition Datasheet
- Centrify Video: Are Corporations More Vulnerable Than They Admit?
- Chaos to Control Creating a Secure Mature File Transfer Process or System or Solution
- Digital Guardian A Day in the Life of Your Sensitive Data Infographic
- Digital Guardian Add-On Modules Datasheet
- Digital Guardian Advanced Threat Protection Datasheet
- Digital Guardian Data Loss Prevention Datasheet
- Digital Guardian Data Protection for Citrix ShareFile Datasheet
- Digital Guardian Data Protection for Law Firms Datasheet
- Digital Guardian Data Protection Integration with FireEye Datasheet
- Digital Guardian Data Protection Integration With HP ArcSight Datasheet
- Digital Guardian Energy Division Case Study
- Digital Guardian For Windows Datasheet
- Digital Guardian Fortune 100 Manufacturer Case Study
- Digital Guardian Fortune 1000 Manufacturer Case Study
- Digital Guardian Global 100 Technology Conglomerate Case Study
- Digital Guardian Global Pharmaceutical Company Case Study
- Digital Guardian ITAR Case Study
- Digital Guardian Jabil Manufacturing MSP Case Study
- Digital Guardian Large Managed Healthcare Provider Case Study
- Digital Guardian Luxury Sports Car Manufacturer Case Study
- Digital Guardian Managed Security Program (MSP) Datasheet
- Digital Guardian Management Console Datasheet
- Digital Guardian Multi-National Banking Company Case Study
- Digital Guardian Multibilion-Dollar Global Financial Services Firm Case Study
- Digital Guardian Savant Protection Application Whitelisting Datasheet
- Digital Guardian USDHS Continuous Diagnostics & Mitigation Datasheet
- Digital Guardian Visibility Study Datasheet
- Digital Guardian: Security’s Change Agent Video
- Do Your Data Transfers, Policies and Practices Meet Your Regulatory Obligations?
- File Transfer Automation On Demand Webinar
- Globalscape RBFCU Enhanced File Transfer Case Study
- Globalscape Active-Active High Availability with EFT Datasheet
- Globalscape AON EFT Case Study
- Globalscape Content Integrity Control (CIC) Module Datasheet
- Globalscape Dangerous File-Sharing Whitepaper
- Globalscape Enhanced File Transfer (EFT) SMB and Enterprise Datasheet
- Globalscape Enhanced File Transfer (EFT) SMB Datasheet
- Globalscape Enhanced File Transfer Datasheet
- Globalscape Enterprise Mobility Management 101 Whitepaper
- Globalscape Facilitating Enterprise Compliance Whitepaper
- Globalscape Facilitating Enterprise Compliance Whitepaper
- Globalscape High Availability Clustering Whitepaper
- Globalscape Mail Express Datasheet
- Globalscape Managed File Transfer Buyers Guide Whitepaper
- Globalscape Managed File Transfer: Can your business thrive without it? Whitepaper
- Globalscape Managed Information Xchange (MIX) Datasheet
- Globalscape Mobile is the New Normal for Conducting Business Whitepaper
- Globalscape Mobile Transfer Client Datasheet
- Globalscape Multifactor Authentication Whitepaper
- Globalscape OpenPGP Module FAQ Datasheet
- Globalscape Protecting Digitalized Assets in Healthcare Whitepaper
- Globalscape Protecting Payment Information with PCI DSS Version 3 Compliance Whitepaper
- Globalscape Reducing the Costs and Risks of Email Attachments Whitepaper
- Globalscape scConnect Datasheet
- Globalscape scConnect Security Datasheet
- Globalscape Security Solutions Datasheet
- Globalscape Three Ways System Downtime Affects Companies and Four Methods to Minimize It Whitepaper
- Globalscape WAFS Whitepaper
- Globalscape Web Transfer Client Datasheet
- Globalscape Wide Area File Services (WAFS) Datasheet
- Globalscape: Maximize Uptime with EFT™ High Availability
- Insider Threats and Inside Out Security
- Ipswitch Analytics Datasheet
- Ipswitch Enterasys Case Study
- Ipswitch Failover Datasheet
- Ipswitch File Transfer Datasheet
- Ipswitch File Transfer Products Overview Datasheet
- Ipswitch Hermes Case Study
- Ipswitch MOVEit Central Datasheet
- Ipswitch MOVEit Cloud Datasheet
- Ipswitch MOVEit DMZ Video
- Ipswitch MOVEit File Transfer (DMZ) High Availability and Scalability Datasheet
- Ipswitch MOVEit File Transfer (DMZ) Secure File Transfer Server Datasheet
- Ipswitch MOVEit Mobile Datasheet
- Ipswitch Pharmaceutical Case Study
- Ipswitch The City of Guelph Case Study
- iSheriff AAA Ambulance Case Study
- iSheriff advert Video
- iSheriff Cloud Security Datasheet
- iSheriff Disrupting The Cybercrime Exploration Life-Cycle
- iSheriff Email Security Datasheet
- iSheriff Endpoint Security Datasheet
- iSheriff Integrated Business Technology Case Study
- iSheriff ITEX Case Study
- iSheriff Management Console Designed For Managed Service Providers Datasheet
- iSheriff RHWL LLP Case Study
- iSheriff Safesite Inc. Case Study
- iSheriff Web Security Datasheet
- Linoma Crypto Complete Brochure
- Linoma Dayton Parts Case Study
- Linoma Field-Level Encryption Case Study
- Linoma Go Anywhere Brochure
- Linoma Go Anywhere Managed File Transfer Brochure
- Linoma Go Anywhere Secure Mail Brochure
- Linoma Go Drive Brochure
- Linoma GoAnywhere MFT Video
- Linoma GoDrive by GoAnywhere Video
- Linoma IDB Swiss Bank Case Study
- Linoma Integra Bank Case Study
- Linoma Release Webinar
- Linoma State of Maryland DLLR Case Study
- Nlyte Alarms Datasheet
- Nlyte Alarms Datasheet
- Nlyte Banking Industry Case Study
- Nlyte BMC ADDM Connector Datasheet
- Nlyte Canon Case Study
- Nlyte Computacenter Case Study
- Nlyte Configuration Management Datasheet
- Nlyte DCIM Datasheet
- Nlyte Defines Data Center Infrastructure Management (DCIM) – Excitement Video
- Nlyte for BMC ITSM Datasheet
- Nlyte for HP ITSM Datasheet
- Nlyte for ServiceNow ITSM Datasheet
- Nlyte Global Technology Company Case Study
- Nlyte On-Demand Product Brief
- Nlyte PNC Case Study
- Nlyte Retail Big Box Case Study
- Nlyte SSE Case Study
- Office 365 Single Sign-On Whitepaper
- PKWARE CMS Case Study
- PKWARE Data Center Performance Guide
- PKWARE Data Security, Compression and Encryption at a Glance Video
- PKWARE Desktop Security Guide
- PKWARE Food and Beverage Company Case Study
- PKWARE Global Bank Case Study
- PKWARE Healthcare Customer Case Study
- PKWARE Healthcare Services Provider Case Study
- PKWARE Institute for Social and Economic Research Case Study
- PKWARE Mainframe Security Guide
- PKWARE Major U.S. Bank Case Study
- PKWARE Open Systems Security Guide
- PKWARE Persistant Data Protection Overview
- PKWARE Pkzip and Securezip V15 Datasheet
- PKWARE SecureZip DLP Deployment Kit Overview
- PKWARE Tip Sheet
- PKWARE Top Ranked Financial Services Institution Case Study
- Planning An Effective DLP (3.0) Strategy: From Immediate Results to Long Term Goals
- Secure File Transfer and Today’s Regulatory Compliance
- Secure Islands Data Interceptor for Opentext
- Secure Islands Data Security for the Financial Sector
- Secure Islands IQProtector Bridge
- Secure Islands IQProtector Custom Data Interceptor
- Secure Islands IQProtector Data Interceptor for Application Servers
- Secure Islands IQProtector Data Interceptor for MS Exchange
- Secure Islands IQProtector Data Interceptor for SharePoint
- Secure Islands IQProtector Enterprise
- Secure Islands IQProtector Express
- Secure Islands IQProtector for ISO 27001 Compliance
- Secure Islands IQProtector Scanner for File Stores
- Secure Islands Making Data Classifiction Work for You
- Secure Islands Making IRM Work for You
- SSH Andritz Group Case Study
- SSH Cloud Security Case Study
- SSH CryptoAuditor Datasheet
- SSH CryptoAuditor: An SSH, SFTP and RDP Firewall Datasheet
- SSH Financial Services Company Gains Visibility & Control Over External Contractors Case Study
- SSH HD Video
- SSH Key Management Infographic
- SSH Key Manager Case Study
- SSH Key Mobile ID Case Study
- SSH Missing Identities Datasheet
- SSH Monitor, Audit & Control Privileged Users in the Cloud Case Study
- SSH Secure File Transfers and Data-In-Transit Datasheet
- SSH Solution Case Study
- SSH Support Services Datasheet
- SSH Tectia ConnectSecure Datasheet
- SSH Tectia Mainframe Case Study
- SSH Tectia MobileID Datasheet
- SSH Tectia SSH Client Tectia SSH Server Datasheet
- SSH Tectia SSH Server for IBM z/OS Datasheet
- SSH Universal SSH Key Manager Datasheet
- The Next Generation in Data Security from Verdasys
- The Secure Dropbox Alternative from Globalscape
- UEBA for Compliance Whitepaper
- Varonis – What We Do Video
- Varonis Enterprise Search: Unlocking Hidden Knowledge in Unstructured Data Whitepaper
- Varonis Express Risk Assessment Datasheet
- Varonis How to Detect and Clean Cryptolocker Whitepaper
- Varonis Insider Threats Infographic
- Varonis Insider Threats: Malice, Mistakes, and Mountain Lions Whitepaper
- Varonis Partner Battlecard
- Varonis Point of View: Varonis and User Behavior Analytics Whitepaper
- Varonis Security Solutions
- Watchful RightsWATCH Data-centric Security for Individuals
- Watchful RightsWATCH Data-centric Security Overview
- Watchful RightsWATCH Enhancing and Extending Microsoft’s RMS
- Watchful TypeWATCH e-Biometrics Security
- Watchful Dynamic Data Classification with RightsWATCH
- Watchful Extending RightsWATCH to Exchange Online and Office 365
- Watchful GE Money Customer Case Study
- Watchful Keeping Unstructured Data Secure Whitepaper
- Watchful RightsWATCH and the RMS Sharing App in an Azure Environment
- Watchful RightsWATCH building on RMS for data-centric data security
- Watchful Secure Collaboration with RightsWATCH and Azure RMS
- Watchful Software Video
- Watchful Software; Data Classification That Works
- Watchful The Five Key Trends for Insider Threats
- Watchful The X-Factor in Data-Centric Security Webinar
- Watchful True Information Security Only a Click Away… For Anyone Webinar
- Watchful You Can’t Teach an Old Dog New Tricks Webinar
Pages
- ABOUT GDPR
- About HANDD
- Book Online Demo
- Contact HANDD
- DATA CLASSIFICATION & GDPR
- DATA DISCOVERY & GDPR
- Data Security and Data Protection in 2024
- Data Services
- Digital Operational Resilience Act (DORA)
- DORA – Are you Ready?
- GDPR Data Security Services
- Home 2024
- IDENTITY ACCESS MANAGEMENT & GDPR
- Linoma User Forum Registration
- MONITORING & CONTROL FOR GDPR
- Our Services
- Privacy Policy
- Professional Services
- Regulation Services
- Sectors & Clients
- Sitemap
- Start a Free Trial
- Watch Video: Data Security & Data Protection in 2024
- Watch Video: DORA – July RTS and how it affects compliance
- Watch Video: NIS 2 and the Countdown to DORA – Essential steps for compliance
- What We Do
Vendors
- BigID
- Centrify
- Concentric AI
- Confidencial
- CyGlass
- Flexera
- Fortra’s Digital Guardian
- Fortra’s Terranova
- Fortra’s Vera
- Fortra’s Agari
- Fortra’s Classifier Suite
- Fortra’s Clearswift
- Fortra’s Data Classification Suite
- Fortra’s Globalscape
- Fortra’s GoAnywhere
- Ground Labs
- Immersive Labs
- iSheriff
- LightBeam
- Lookout
- No Vendor
- Progress
- Radware
- Resilient Systems
- Seclore
- Spirion
- SSH
- Watchful
Events
- On demand webinar: Automating your file transfers
- On demand webinar: Counting down to DORA – one year to go
- On demand webinar: Cyber Essentials – More than just legislation
- On demand webinar: Demystifying DMARC
- On demand webinar: Exploring Data Security Posture Management (DSPM)
- On demand webinar: How to maximise your EFT investment
- On demand webinar: How to maximise your MOVEit investment
- On demand webinar: How to remove data security risk from file transfers
- On demand webinar: MOVEit Crisis Simulation
- On demand webinar: NIS 2 and the Countdown to DORA
- On-demand Webinar: Data Security & Data Protection in 2024
- On-Demand Webinar: DORA – July RTS and How it Affects Compliance
- Webinar: The Modern Kill Chain: How Attacks Have Gone From Months to Minutes