Comforte AG Announces New Partnership with ITKaa

Wiesbaden, Germany – 22 July 2021 – ITKaa and comforte are teaming up to help clients secure their business from the inside out by leveraging comforte’s leading edge technology for systematically discovering, classifying, and protecting sensitive … Continue reading Comforte AG Announces New Partnership with ITKaa

Balancing Agility with Data Security

Agile development is known for well-paced development cadences with short, quick sprints. These fast bursts are typically focused on ensuring something of value (functioning code) gets done in a short amount of time, allowing for new features and … Continue reading Balancing Agility with Data Security

Comforte AG Announces Partnership with Encryption Consulting LLC

Wiesbaden, Germany – 9 March 2021 – Enterprise data security experts comforte AG have announced a new partnership with Texas-based cyber-security firm Encryption Consulting LLC to deliver cloud native data discovery, classification, and protection… Continue reading Comforte AG Announces Partnership with Encryption Consulting LLC

Comforte AG and bizcon AG Join Forces to Deliver Data-centric Security

Wiesbaden, Germany – 25 February 2021 – comforte AG, a global leader in enterprise data security, has announced a new partnership with the Munich based IT consultancy firm, bizcon AG.
The post Comforte AG and bizcon AG Join Forces to Deliver Data-… Continue reading Comforte AG and bizcon AG Join Forces to Deliver Data-centric Security

What Will be the Primary Drivers of Cybersecurity Investment in 2021?

When looking back to the beginning of 2020, we can agree that the world is now in a very different place. The COVID-19 pandemic has swept across the world, bringing about changes that have impacted the way we live currently and will for years to c… Continue reading What Will be the Primary Drivers of Cybersecurity Investment in 2021?

How Data-Centric Security Enables Cross-Regulatory Compliance

GDPR. CCPA. HIPAA. PCI DSS. The number of acronyms within the data security and privacy sphere is forever mounting as governments and industry regulators try to keep pace with modern enterprise’s demands for data. Data has arguably become one of, … Continue reading How Data-Centric Security Enables Cross-Regulatory Compliance

16 Reasons to use Third Party Cloud Security and not Salesforce Shield

tl;dr: Salesforce Shield has a hefty price tag on top of the SFDC license, despite offering limited protection within Salesforce and zero protection to other applications.
The post 16 Reasons to use Third Party Cloud Security and not Salesforce Sh… Continue reading 16 Reasons to use Third Party Cloud Security and not Salesforce Shield

Mass Move to the Cloud – 3 Essential Tips for Cloud Migration

Cloud technology has become indispensable for many organizations, however there are common mistakes and misconceptions that you should be aware of in order to keep your data secure, even as it travels off premises.
The post Mass Move to the Cloud … Continue reading Mass Move to the Cloud – 3 Essential Tips for Cloud Migration

How to Get your Data-Centric Security Project off the Ground

Data security is no longer a tick-box exercise that can be nonchalantly looked at. It has become a requirement for enterprises of all sizes, especially concerning the many demands of modern regulations and rising customer expectations. The no… Continue reading How to Get your Data-Centric Security Project off the Ground

How Secret Isolation Affects Your Data Security Mechanisms?

When it comes to processing sensitive data, enterprises must make sure that they have comprehensive security parameters in place in order to protect personal information from unauthorized access. Encryption is a highly touted means of securit… Continue reading How Secret Isolation Affects Your Data Security Mechanisms?