Resources

On-Demand Webinar

Accelerating Zero Trust: Data Labeling and Tagging for Microsoft Outlook and Office Applications

In Fortra's joint webcast with Carahsoft, Accelerating Zero Trust: Data Labeling and Tagging Microsoft Outlook and Office Applications , attendees heard from Fortra's very own George Hibler as he dove into Zero Trust architecture and why data labeling and tagging are critical components. Watch the full, recorded webcast to learn more about: Navigating the unique data landscape: classification...
Datasheet

Fortra’s Config for CUI

The Problem The Controlled Unclassified Information (CUI) program standardizes the way all U.S. government agencies and military entities handle unclassified information that requires safeguarding. It clarifies and limits what kinds of information to protect, defines what is meant by “safeguard,” reinforces existing legislation and regulations, and promotes authorized information-sharing. These...
Datasheet

NIST SP 800-171 and CUI

Meet Compliance Requirements To Protect Controlled Unclassified Information Originally imposed in 2017, NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be be compliant with DFARS Part 252.204-7012. Other executive branch agencies may also require...
Video

CUI Compliance with Fortra's Data Classification Suite (DCS) On-Demand Demo

Watch a short demo to see the Fortra CUI configuration in action Navigate CUI complexities with confidence Automatically apply CUI markings Apply the full list of CUI categories and subcategories Manually tailor Banner and Portion markings Endpoint configuration for CUI safeguarding and dissemination controls Template packs to get your organization up and running with CUI compliance quickly and...
Guide

Meeting CUI Requirements with Fortra’s Data Classification Suite Solutions

Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program defines a uniform policy for the treatment of unclassified information that requires safeguarding or dissemination controls. The CUI Executive Order specifically adopts, defines, and institutes CUI as the single designation for all information formerly designated by Sensitive but Unclassified (SBU), For...
Datasheet

Fortra’s Data Classification Suite for Military

Swift action to commands based on operational understanding are hallmarks of a high-performing and responsive military. And the exchange of classified and even unclassified data – often in electronic form – are the lifeblood for any military organization to thrive and achieve mission success. The key is keeping sensitive data out of the hands of the wrong people. “With the military, there is a...
Datasheet

Fortra’s Data Classification Suite Deployment Options

On-premises deployment While many industries are turning to the cloud for digital transformation, some organizations are not yet ready to deploy their highly sensitive data to the cloud and continue to choose on-premises. There are several reasons why an organization might choose on-premises deployment, including: Organizational/regional requirements: Depending on industry or regional regulations...
Datasheet

Fortra’s Data Classification Suite for CUI

How does Fortra’s Data Classification Suite help with CUI? Fortra’s Data Classification Suite was designed to help U.S. Federal agencies comply with the National Archives and Records Administration’s (NARA) Controlled Unclassified Information (CUI) program. With DCS, you can ensure emails and documents are properly marked and identified, and sensitive CUI data is protected. Our solution is easy to...
Datasheet

Managing Controlled Unclassified Information: The Role Of Data Classification In Meeting U.S. Government Requirements

Introduction After years of deliberation, the U.S. government’s National Archives and Records Administration (NARA) has released more details of its regulation for the protection framework of Controlled Unclassified Information (CUI) . The rule is designed to safeguard government data that has not been assigned as confidential or secret, but which should not necessarily be made public, as it is...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied. In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective Markings, what these...
Guide

Data Protection Technical Overview

What’s Inside: The key requirements for successful data protection How we provide the deepest, most unified, visibility of your sensitive data The Fortra Data Protection security architecture and infrastructure This technical overview guide includes our tested and proven requirements for protecting sensitive data, and what makes our technology so unique.
Guide

The 5 Steps To Effective Data Protection

Every day your businesses are creating more and more data. Data gets saved, employees move on, data is forgotten and lost. Valuable information sits on your file servers and document stores, not protected and unrecoverable because no one knows where to find it. Using data classification helps you regain control over your unstructured data. By involving your users in data classification, they will...
Datasheet

Fortra Data Classification Solutions Overview

Secure Your Information, So People Can Work with Confidence Data is everywhere and protecting it is becoming more difficult than ever. Fortra Data Classification enables you to establish a policy driven foundation that helps you identify and classify sensitive data at creation, in motion, or at rest and apply the right security policy to protect it. Data Protection That Works. Put your information...
Blog

Complying With the Export Administration Regulations (EAR): Everything You Need To Know

The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for reasons of national security and foreign policy. Here is a breakdown of the essentials your organization should know for proper compliance. The Export Administration Regulations (EAR) Explained In...
Blog

Data Protection Myths and the Truths Behind Them

To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at various organizational levels as to whether the solution is necessary, or more trouble than it’s worth. This can become especially problematic when misinformed thinking is the reason an organization...
Blog

Key Considerations in The Ever-Evolving Data Privacy Landscape – DLP or Data Classification First?

Enza Iannopollo, principal analyst at Forrester, recently answered some of the pressing questions we’ve received when it comes to data security, and more importantly building the foundations of your data security strategy. Today we’re looking at what Enza had to say when it comes to implementing DLP and data classification, and if one should come before the other. Q: Is there an order in which we...
Blog

Enterprise Data Classification: Why you need best-of-breed data classification

The data protection landscape and its associated compliance environment changed fundamentally with the implementation of the European-wide GDPR in May 2018, with many other privacy regulations following suit around the globe. It is no longer about what organizations think they need to be doing in order to control their data, but that they are being told what they need to do by regulators such as...
Blog

Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity

On Wednesday May 12, the Biden administration took a critical step towards addressing security issues that have come to light after several recent, high profile cyberattacks. The extensive Executive Order (EO) described the government's plan to increase cybersecurity protection across the public and private sectors as well as secure the nation's digital infrastructure against the type of attack...
Blog

Orchestrating data security through effective data identification

As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “ Age of Data ”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater than ever before. Organizations must also handle more and more novel data types, including IoT, clickstream and streaming data...