The Future of Password Security | The Cybrary Podcast Ep. 54

by SecureCircle
 | 
February 28, 2021
 | 
Blog

Joining the Cybrary Podcast this week is Jeff Capone, CEO & Co-founder of SecureCircle. In this episode, Jeff, Mike, and Jonathan discuss zero-trust policies, why people use encryption, and what it would mean for data access, privacy, and security if we could make the need for passwords obsolete.

Move Beyond DLP's Failures

by SecureCircle
 | 
February 2, 2021
 | 
Blog

DLP (Data Loss Prevention) solutions haven’t stopped data breach growth. IBM reports the average total cost of a data breach reached $3.86 million USD in 2020. DLP solutions only block or encrypt data that tries to leave the endpoint.

Cybersecurity 2021 Conferences

by SecureCircle
 | 
January 19, 2021
 | 
Blog

Regular attendees are expecting to join the main Cybersecurity Conferences to be held this year even though they will mostly be in a virtual mode. SecureCircle lists here the top 10 conferences that you cannot miss.

Zero Trust Data Security Webcast

by SecureCircle
 | 
December 4, 2020
 | 
Blog

Security Weekly hosts and SecureCircle's CEO, Jeff Capone, discuss Zero Trust Data Security. SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. Ensure all your data is secure, without impacting the business.

Where's Your Data? Who Cares!

by SecureCircle
 | 
November 30, 2020
 | 
Blog

App, User, and Data, but it's all about the data! Discovering and classifying data to protect it is tough. What if you can protect all of your data? Jeff Capone, CEO and Co-founder at SecureCircle, joins Security Weekly to discuss how to protect all of your data and stop asking "Where's your data?". If we can protect

Zero Trust DLP Webcast

by SecureCircle
 | 
November 17, 2020
 | 
Blog

Security Weekly hosts and SecureCircle dive into Zero Trust DLP. Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. A zero-trust solution requires the owner of the data to always be in control at all times.

Quanta Storage Inc. Secures Customer Intellectual Property

by SecureCircle
 | 
November 30, 2020
 | 
Blog

QSI obtains customer intellectual property (IP) such as designs, roadmaps, costs, legal documents, and schedules. Customers are concerned about the safety of their IP. The IP includes traditional Office files, source code, mechanical design files, photos, videos, and more.

Securing Source Code on Endpoints

by SecureCircle
 | 
December 13, 2020
 | 
Blog

When deployed in a best practice configuration, SecureCircle can secure source code on endpoints without development teams needing to change how they operate or interact with code, IDEs, and development tools. This whitepaper focuses on SecureCircle best practices for securing source code in development environments.

Conditional Data Access for Endpoints

by SecureCircle
 | 
October 29, 2020
 | 
Blog

Security Weekly hosts and the CEO of SecureCircle, Jeff Capone, dive into how we can have conditional data access for endpoints. "Most folks think about using Conditional access for SaaS applications or access to specific data sources. However, once that data is accessed how do you continuously enforce conditional acce

Jeff Capone of SecureCircle: 5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity

by SecureCircle
 | 
October 15, 2020
 | 
Blog

As part of Authority Magazine's series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, the CEO of SecureCircle, Jeff Capone, is interviewed by Jason Remillard. Capone shares his own experiences and tips that many organizations can use to enhance their own data pr

The Real Enterprise Data Protection Problem: CAD files and Other Legacy Apps Data

by SecureCircle
 | 
October 15, 2020
 | 
Blog

CISOs who have already invested in DLP but still have a laundry list of unprotected data use cases need not worry. This is the sad norm. DASB is a specialized solution that can immediately solve a specialized data protection use case such as CAD manufacturing designs, media files, images, and legacy data formats.

Need Zero Trust for a Remote Workforce? There's a Missing Link.

by SecureCircle
 | 
October 24, 2020
 | 
Blog

In today's work-from-anywhere world, there is a missing link. Controlling data once it is exported out of your perimeter and out of your SaaS apps. This is a rampant source of data leaks because no technology exists that can solve the problem at scale - until now. Welcome to DASB.

Zero Trust: SecureCircle plus Endpoint Detection and Response

by SecureCircle
 | 
December 31, 2020
 | 
Case Study

The combination of SecureCircle with an advanced Endpoint Detection and Remediation solution provides the capability to affordably implement a Zero Trust security architecture that completely captures and controls all user’s interactions with our information no matter what.

Enterprise Security Weekly | Zero Trust Data Security

by SecureCircle
 | 
September 28, 2020
 | 
News

Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. In this webcast, Paul Asadoorian of Security Weekly and SecureCircle walk through how SecureCircle implements a zero-trust solution. A zero-trust solution requires the owner of the data to always be in control

Traditional Data Security Fails to Be Zero Trust

by SecureCircle
 | 
September 28, 2020
 | 
Blog

Data security tools are not providing enough value for their customers. The average total cost of a data breach in the United States is nearly $9million per the 2020 IBM Cost of Data Breach Report. That is a five % increase from 2019. 31% of data breaches in North America can be attributed to internal actors.

Why Traditional Data Security Can't Be Zero Trust

by SecureCircle
 | 
September 21, 2020
 | 
News

The challenge in securing data has increased in complexity as businesses move aggressively to cloud and modernize IT through the use of SaaS applications. In this virtual training, Paul Asadoorian and SecureCircle will walk through how both legacy approaches struggle to plug the real world security holes.

Forrester features SecureCircle in Forrester Zero Trust eXtended Ecosystem

by SecureCircle
 | 
January 21, 2021
 | 
News

Forrester Research has named SecureCircle a 'Data Security Startup to Watch' in the August 2020 report - The Zero Trust eXtended Ecosystem: Data, Secure Data Independently and in each Pillar of the Zero Trust Framework

Remote Workforce? Protect Your Data Wherever It Leaks

by SecureCircle
 | 
August 27, 2020
 | 
Blog

Companies need to enable their teams to work remotely across the world, including work from home. Remote distributed workforces have grown 44% over the last five years.

Distributed-Workforce | Case Study

by SecureCircle
 | 
June 19, 2020
 | 
Case Study

SecureCircle enables DMF to secure data with a distributed workforce without requiring employees to change their workflow. DMF maintains complete protection and control over their sensitive customer IP.

DASB Replaces DLP

by SecureCircle
 | 
June 19, 2020
 | 
Blog

FSC has been mandated to protect sensitive financial and personal information for mandatory compliance requirements. In particular, FSC wants to protect and track sensitive data as soon as it is accessed from their SQL databases and transformed into flat files stored on their file servers.

Why Isn't DLP Preventing Data Breaches and Data Leakage?

by SecureCircle
 | 
January 17, 2020
February 28, 2021
 | 
Blog

Data loss prevention (DLP), the antiquated data protection model, takes a ‘manage by rule’ approach where all data flows freely unless the security team has written a rule to specifically protect the data.

Third Party Vendors

by SecureCircle
 | 
February 17, 2020
February 28, 2021
 | 
Blog

Health Share of Oregon, the state's largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth, Social Security numbers, and Medicaid ID numbers.

The Rise Of DASB, Sunset Your DLP

by SecureCircle
 | 
February 17, 2020
June 19, 2020
 | 
Blog

5 reasons why organizations are switching

How to Prevent Source Code Modification & Leaks

by SecureCircle
 | 
February 4, 2020
December 22, 2020
 | 
Blog

Source code breaches are occurring daily with damaging consequences. Uber and Google made headlines when a former Google engineer easily exfiltrated 9 GB of source code and hundreds of Waymo trade secrets. Tesla source code was breached by an employee, exfiltrating over 300,000 files for personal gain. Apple and Samsun

End Source Code Theft

by SecureCircle
 | 
January 28, 2020
January 6, 2021
 | 
Blog

CSC needed to ensure that their source code was not stolen or lost. A costly virtual desktop infrastructure (VDI) solution, was implemented to prevent misuse and add accountability for developers working with source code.

SecureCircle Data Access Security Broker (DASB) Selected By Quanta Storage To Eliminate Insider Threats

by SecureCircle
 | 
January 14, 2020
September 16, 2020
 | 
Press Releases

SecureCircle, the world's first Data Access Security Broker (DASB),today announced an agreement to eliminate insider threats such as accidental sharing and malicious users to Quanta Storage Inc. (QSI). QSI, a worldwide leader in OEM and ODM services to the world's leading consumer electronics brands is based in Taiwan.