How we work at Cipherpoint!

This is how we like to engage with our potential customers at Cipherpoint. You have identified a need, be it GDPR compliance, a vulnerability or have a concern about a specific risk like insider threats and you are searching for a solution! We have a variety of product materials, white papers and blogs on our […]

Read More

What should enterprises spend on IT security in 2020?

At Cipherpoint our market review suggests that corporate spend on IT security will continue to grow significantly as digital transformation continues across most industries. As a percentage of that spend, we see budgets allocated to data protection solutions increasing significantly, largely driven by insider-threats, compliance and increased regulation adoption. In terms of actual dollars or […]

Read More

Great Data Governance Starts with Data Discovery And Classification

Good data governance requires knowing what data you have and creating workable and effective rules around access and usage. The first step in implementing a data governance and protection solution is knowing the content and context of a file and then treating it accordingly. A strong discovery and classification (‘D&C’) solutionenables organizations to truly understand […]

Read More

Putting Enterprises Back in Control of Their Data

In the modern digital workplace environment, software vendors have provided users with a great deal of autonomy and flexibility for data access and collaboration. However, this has often been at the expenses of enterprise-wide data security. Putting enterprises back in control of their data is a critical component of sound data governance. The basic tools […]

Read More

Is Azure Information Protection (AIP) secure enough?

Let’s face it, these days Microsoft does a reasonable job with data security on O365. Microsoft’s Azure Information Protection (AIP) is using strong encryption (usually AES with a 256-bit key) to encrypt your data, and Microsoft is starting to group all their document level security technologies under the AIP umbrella. This means that the number of control panels needed to configure and manage a cohesive security strategy that […]

Read More