In short: Salesforce Shield has a hefty price tag on top of the SFDC license, despite offering limited protection within Salesforce and zero...
Oct 16, 2020 l Tokenization, Data-Centric Security, Cloud Security
16 Reasons to use Third Party Cloud Security and not Salesforce Shield
Oct 9, 2020 l Tokenization, Data-Centric Security, Cloud Security, Cloud Native
Mass Move to the Cloud – 3 Essential Tips for Cloud Migration
Cloud technology has become indispensable for many organizations, however there are common mistakes and misconceptions that you should be aware of...
Sep 10, 2020 l Tokenization, PCI DSS, Data Protection, Compliance, Cloud Native
PCI DSS 4.0 and the Changing Approach to Compliance
In the past, the focus of PCI compliance was to store as little sensitive data as possible and keep it secured. In today's data driven world, that...
Aug 20, 2020 l Tokenization, Data Security, Data Protection, Data-Centric Security
How to Get your Data-Centric Security Project off the Ground
Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes,...
Aug 14, 2020 l Tokenization, Data Security, Data Privacy
Cisco Survey Demonstrates Financial Benefit of Enterprise Data Security
"Privacy has become an attractive investment even beyond any compliance requirements. Organizations that get privacy right improve their customer...
Jul 21, 2020 l Tokenization, Data Protection, Coronavirus, Pandemic, Covid-19
Pandemics Create New Attack Opportunities in Travel and Hospitality
Hospitality and travel data breaches in a pandemic create new risks and threats to citizens on a global basis. Data breaches from airline, travel,...
Jul 14, 2020 l Tokenization, Data Protection, Data-Centric Security
How Secret Isolation Affects Your Data Security Mechanisms
When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to...
Protecting national security is paramount for any government agency, and the first step is securing all public-sector information. If any such...
Companies are investing more and more in data protection. Compliance rules and regulations require organizations to develop sound security...