Zero Trust DLP Webcast

by SecureCircle
 | 
November 17, 2020
 | 
Blog

Security Weekly hosts and SecureCircle dive into Zero Trust DLP. Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. A zero-trust solution requires the owner of the data to always be in control at all times.

Quanta Storage Inc. Secures Customer Intellectual Property

by SecureCircle
 | 
November 17, 2020
 | 
Blog

QSI obtains customer intellectual property (IP) such as designs, roadmaps, costs, legal documents, and schedules. Customers are concerned about the safety of their IP. The IP includes traditional Office files, source code, mechanical design files, photos, videos, and more.

Securing Source Code on Endpoints - White paper

by SecureCircle
 | 
November 1, 2020
 | 
Blog

When deployed in a best practice configuration, SecureCircle can secure source code on endpoints without development teams needing to change how they operate or interact with code, IDEs, and development tools. This whitepaper focuses on SecureCircle best practices for securing source code in development environments.

Conditional Data Access for Endpoints

by SecureCircle
 | 
October 29, 2020
 | 
Blog

Security Weekly hosts and the CEO of SecureCircle, Jeff Capone, dive into how we can have conditional data access for endpoints. "Most folks think about using Conditional access for SaaS applications or access to specific data sources. However, once that data is accessed how do you continuously enforce conditional acce

Jeff Capone of SecureCircle: 5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity

by SecureCircle
 | 
October 15, 2020
 | 
Blog

As part of Authority Magazine's series about “5 Things You Need To Know To Optimize Your Company’s Approach to Data Privacy and Cybersecurity”, the CEO of SecureCircle, Jeff Capone, is interviewed by Jason Remillard. Capone shares his own experiences and tips that many organizations can use to enhance their own data pr

The Real Enterprise Data Protection Problem: CAD files and Other Legacy Apps Data

by SecureCircle
 | 
October 15, 2020
 | 
Blog

CISOs who have already invested in DLP but still have a laundry list of unprotected data use cases need not worry. This is the sad norm. DASB is a specialized solution that can immediately solve a specialized data protection use case such as CAD manufacturing designs, media files, images, and legacy data formats.

Need Zero Trust for a Remote Workforce? There's a Missing Link.

by SecureCircle
 | 
October 24, 2020
 | 
Blog

In today's work-from-anywhere world, there is a missing link. Controlling data once it is exported out of your perimeter and out of your SaaS apps. This is a rampant source of data leaks because no technology exists that can solve the problem at scale - until now. Welcome to DASB.

Zero Trust: SecureCircle plus Endpoint Detection and Response

by SecureCircle
 | 
October 5, 2020
 | 
Case Study

ISCS obtains confidential information from their customers as part of the normal operations. The data could include business plans, detailed cost information, and intellectual property such as source code. ISCS wants to deploy a Zero Trust data security solution to demonstrate to customers’ their data is safe.

Enterprise Security Weekly | Zero Trust Data Security

by SecureCircle
 | 
September 28, 2020
 | 
News

Zero Trust Data Security is a very popular security architecture that is being adopted by many organizations. In this webcast, Paul Asadoorian of Security Weekly and SecureCircle walk through how SecureCircle implements a zero-trust solution. A zero-trust solution requires the owner of the data to always be in control

Traditional Data Security Fails to Be Zero Trust

by SecureCircle
 | 
September 28, 2020
 | 
Blog

Data security tools are not providing enough value for their customers. The average total cost of a data breach in the United States is nearly $9million per the 2020 IBM Cost of Data Breach Report. That is a five % increase from 2019. 31% of data breaches in North America can be attributed to internal actors.

Why Traditional Data Security Can't Be Zero Trust

by SecureCircle
 | 
September 21, 2020
 | 
News

The challenge in securing data has increased in complexity as businesses move aggressively to cloud and modernize IT through the use of SaaS applications. In this virtual training, Paul Asadoorian and SecureCircle will walk through how both legacy approaches struggle to plug the real world security holes.

Data Security Startup to Watch

by SecureCircle
 | 
August 19, 2020
 | 
News

Forrester Research has named SecureCircle a 'Data Security Startup to Watch' in the August 2020 report - The Zero Trust eXtended Ecosystem: Data, Secure Data Independently and in each Pillar of the Zero Trust Framework

Remote Workforce? Protect Your Data Wherever It Leaks

by SecureCircle
 | 
August 27, 2020
 | 
Blog

Companies need to enable their teams to work remotely across the world, including work from home. Remote distributed workforces have grown 44% over the last five years.

Distributed-Workforce | Case Study

by SecureCircle
 | 
June 19, 2020
 | 
Case Study

SecureCircle enables DMF to secure data with a distributed workforce without requiring employees to change their workflow. DMF maintains complete protection and control over their sensitive customer IP.

DASB Replaces DLP

by SecureCircle
 | 
June 19, 2020
 | 
Blog

FSC has been mandated to protect sensitive financial and personal information for mandatory compliance requirements. In particular, FSC wants to protect and track sensitive data as soon as it is accessed from their SQL databases and transformed into flat files stored on their file servers.

Why Isn’t DLP Preventing Data Breaches?

by SecureCircle
 | 
January 17, 2020
June 19, 2020
 | 
Blog

Data loss prevention (DLP), the antiquated data protection model, takes a ‘manage by rule’ approach where all data flows freely unless the security team has written a rule to specifically protect the data.

Third Party Vendors

by SecureCircle
 | 
February 17, 2020
June 19, 2020
 | 
Blog

Health Share of Oregon, the state's largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth, Social Security numbers, and Medicaid ID numbers.

The Rise Of DASB, Sunset Your DLP

by SecureCircle
 | 
February 17, 2020
June 19, 2020
 | 
Blog

5 reasons why organizations are switching

AWS Source Code Leak

by SecureCircle
 | 
February 4, 2020
June 19, 2020
 | 
Blog

Source code breaches are occurring daily with damaging consequences. Uber and Google made headlines when a former Google engineer easily exfiltrated 9 GB of source code and hundreds of Waymo trade secrets. Tesla source code was breached by an employee, exfiltrating over 300,000 files for personal gain. Apple and Samsun

End Source Code Theft

by SecureCircle
 | 
January 28, 2020
August 19, 2020
 | 
Blog

CSC needed to ensure that their source code was not stolen or lost. A costly virtual desktop infrastructure (VDI) solution, was implemented to prevent misuse and add accountability for developers working with source code.

SecureCircle Data Access Security Broker (DASB) Selected By Quanta Storage To Eliminate Insider Threats

by SecureCircle
 | 
January 14, 2020
September 16, 2020
 | 
Press Releases

SecureCircle, the world's first Data Access Security Broker (DASB),today announced an agreement to eliminate insider threats such as accidental sharing and malicious users to Quanta Storage Inc. (QSI). QSI, a worldwide leader in OEM and ODM services to the world's leading consumer electronics brands is based in Taiwan.