Oct 16, 2020 l Tokenization, Data-Centric Security, Cloud Security

16 Reasons to use Third Party Cloud Security and not Salesforce Shield

tl;dr: Salesforce Shield has a hefty price tag on top of the SFDC license, despite offering limited protection within Salesforce and zero protection to other applications.

Read more

Oct 16, 2020 l Tokenization, Data-Centric Security, Cloud Security

16 Reasons to use Third Party Cloud Security and not Salesforce Shield

tl;dr: Salesforce Shield has a hefty price tag on top of the SFDC license, despite offering limited protection within Salesforce and zero...

read more

Oct 9, 2020 l Tokenization, Data-Centric Security, Cloud Security, Cloud Native

Mass Move to the Cloud – 3 Essential Tips for Cloud Migration

Cloud technology has become indispensable for many organizations, however there are common mistakes and misconceptions that you should be aware of...

read more

Aug 20, 2020 l Tokenization, Data Security, Data Protection, Data-Centric Security

How to Get your Data-Centric Security Project off the Ground

Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes,...

read more

Jul 14, 2020 l Tokenization, Data Protection, Data-Centric Security

How Secret Isolation Affects Your Data Security Mechanisms

When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to...

read more

Apr 14, 2020 l GDPR, Data Security, Data-Centric Security, CCPA

The Problem of Data Handling for Financial Services Firms

According to a recent report by Accenture, one in three financial services organisations lack either clear plans or resources to address customer ...

read more

Jan 7, 2020 l Tokenization, Data-Centric Security, Big Data, Data Analytics

6 Things Every Big Data Security Solution Needs

As data-centric security gains mainstream recognition for its ability to protect sensitive data from theft and malicious use, enterprises are...

read more

Nov 20, 2019 l HIPAA, Compliance, Data-Centric Security, PII, Artificial Intelligence

How Artificial Intelligence will Affect Patient Data Protection

Following the successful introduction of Alexa’s healthcare services earlier this year, Amazon has announced that its AI, Textract, is now HIPAA...

read more

Nov 15, 2019 l Tokenization, Data-Centric Security, Big Data, Data Analytics

Big Data Security Series Part 3: How to Run Analytics on Protected Data

In the past two posts we discussed how data is everywhere, but security isn’t and we explored the reasons why it’s so tough to protect BDA...

read more

Nov 1, 2019 l Compliance, Data-Centric Security, Big Data, Data Analytics, Cloud Computing, challenges, IoT

Big Data Security Series Part 2: How Hard is it to Secure Big Data?

Survey says: exceedingly difficult.

But why?

Years ago, on traditional databases you had complete control over how to implement and protect your...

read more
1 2 3

Subscribe to the comforte Blog

Get comforte's latest articles delivered straight to your inbox. Always stay up to date!

Simply fill out the form below and hit Subscribe.