SharePoint Security Audit

Collaboration tools like SharePoint are excellent for facilitating exchange of information and enabling remote teams to work more effectively.  Over the years they have evolved to become much more than a file repository and enable linking of information across all aspects of a user’s desktop.  There are a couple of things to bear in mind […]

Read More

Microsoft SharePoint Security Best Practices

In today’s world, it’s very common to see a weekly security incident or breach arising in the news. Due to this, data protection is an issue that should be monitored by all staff, and not just by traditional IT administrators. Business owners are increasingly held accountable as the data owners of information. There are content […]

Read More

How we work at Cipherpoint!

This is how we like to engage with our potential customers at Cipherpoint. You have identified a need, be it GDPR compliance, a vulnerability or have a concern about a specific risk like insider threats and you are searching for a solution! We have a variety of product materials, white papers and blogs on our […]

Read More

Why all data needs an owner!

There is an almost universal consensus in the market, that data is a corporate asset and that business units cannot effectively function without ‘good’ or ‘key’ data inputs. CIOs, CISOs and CDOs are saying we can help you cleanse, verify, preserve and protect your data, but you as the line of business need to ‘own’ […]

Read More

What should enterprises spend on IT security in 2020?

At Cipherpoint our market review suggests that corporate spend on IT security will continue to grow significantly as digital transformation continues across most industries. As a percentage of that spend, we see budgets allocated to data protection solutions increasing significantly, largely driven by insider-threats, compliance and increased regulation adoption. In terms of actual dollars or […]

Read More

SharePoint security hardening and controls. How to protect against insider threats?

Enterprises using ECM and content service platforms such as SharePoint are increasingly concerned about unauthorised internal access (including by persons with IT administrator privileges) to confidential documents like finance or HR. Enterprises often have inadequate intranet security and the platforms do not natively provide encryption or privileged access controls for SharePoint security hardening. The business […]

Read More

A European approach to Cloud Migration and Data Protection

It is generally accepted that European enterprises and governments lag behind the US in deploying workloads and data to the cloud. The reasons are not just centred upon privacy and security they also extend to competition risk and sovereignty. These are good reasons to be cautious. Whether European enterprises look at cloud adoption and data […]

Read More

Great Data Governance Starts with Data Discovery And Classification

Good data governance requires knowing what data you have and creating workable and effective rules around access and usage. The first step in implementing a data governance and protection solution is knowing the content and context of a file and then treating it accordingly. A strong discovery and classification (‘D&C’) solutionenables organizations to truly understand […]

Read More

Putting Enterprises Back in Control of Their Data

In the modern digital workplace environment, software vendors have provided users with a great deal of autonomy and flexibility for data access and collaboration. However, this has often been at the expenses of enterprise-wide data security. Putting enterprises back in control of their data is a critical component of sound data governance. The basic tools […]

Read More