TINTON FALLS, N.J. and WASHINGTON, Nov. 7, 2017 /PRNewswire/ -- Commvault (NASDAQ: CVLT), a global leader in enterprise backup, recovery, archive and the cloud, today at Commvault GO 2017, launched ...
FT. MYERS, Fla. -- Cigent Technology, Inc. today announced the Cigent Endpoint Data Protection Platform that protects data from ransomware, data exfiltration, and data loss. The Endpoint Data ...
FT. MYERS, Fla.--(BUSINESS WIRE)--Cigent® Technology, Inc., the leader in cybersecurity for endpoints and storage devices, today announced the Cigent Endpoint Data Protection Platform that protects ...
Overview Leading endpoint security companies now rely heavily on AI and automation for faster threat detection.Cloud-based ...
In the third podcast in our Digital Transformation series, Brett Hansen, VP of data security at Dell, explores the federal government’s unique challenges in balancing endpoint security with openness ...
SEATTLE, Oct. 21, 2025 /PRNewswire/ -- MIND, the first-ever data security platform to enable stress-free Data Loss Prevention (DLP) and Insider Risk Management (IRM) programs, today announced new ...
Cibecs provides a value-proven data protection solution developed to make data management and risk reduction for enterprises simple, reliable and cost effective. Thousands of business users around the ...
The results of a global endpoint data protection survey demonstrates the need to incorporate endpoint data protection -- including encryption -- into every organization's endpoint security strategy.
BOSTON & LAS VEGAS--(BUSINESS WIRE)--Today at Microsoft Inspire, Carbonite, Inc. (NASDAQ: CARB), a leading data protection provider for businesses, strengthens its Data Protection Platform with new ...
ENDPOINT DATA. It is often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops, and mobile devices is among a company’s most valuable data ...
As the most immediate and active touchpoint for sensitive data, the endpoint plays a pivotal role in the data security lifecycle. Endpoint DLP has historically been one of the most challenging areas ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results