TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentral TechCentral
    NEWSLETTER
    • News

      The great crypto crash: the fallout, and what happens next

      22 June 2022

      Winter 1, Eskom 0

      22 June 2022

      What it will take to bring the Guptas to justice

      22 June 2022

      Inflation in South Africa spikes higher

      22 June 2022

      Eskom announces massive escalation in load shedding

      22 June 2022
    • World

      Tether to launch a stablecoin tied to the British pound

      22 June 2022

      Tech giants form metaverse standards body, without Apple

      22 June 2022

      There are still unresolved matters in Twitter deal, Musk says

      21 June 2022

      5G subscriptions to top one billion in 2022: Ericsson

      21 June 2022

      Crypto lenders face a DeFi drubbing

      21 June 2022
    • In-depth

      Goodbye, Internet Explorer – you really won’t be missed

      19 June 2022

      Oracle’s database dominance threatened by rise of cloud-first rivals

      13 June 2022

      Everything Apple announced at WWDC – in less than 500 words

      7 June 2022

      Sheryl Sandberg’s ad empire leaves a complicated legacy

      2 June 2022

      Tulipmania meets the real economy at WhatsApp speed

      30 May 2022
    • Podcasts

      How your organisation can triage its information security risk

      22 June 2022

      Everything PC S01E06 – ‘Apple Silicon’

      15 June 2022

      The youth might just save us

      15 June 2022

      Everything PC S01E05 – ‘Nvidia: The Green Goblin’

      8 June 2022

      Everything PC S01E04 – ‘The story of Intel – part 2’

      1 June 2022
    • Opinion

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022

      A proposed solution to crypto’s stablecoin problem

      19 May 2022

      From spectrum to roads, why fixing SA’s problems is an uphill battle

      19 April 2022

      How AI is being deployed in the fight against cybercriminals

      8 April 2022
    • Company Hubs
      • 1-grid
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»Sections»Information security»Simplifying the CISO’s role with ITsMine

    Simplifying the CISO’s role with ITsMine

    Information security By Maxtec17 March 2022
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Data has grown exponentially across organisations, increasing the likelihood of them falling victim to cybercriminals whose actions end up impacting shareholder value and business performance. Since the pandemic hit, companies have quickly adapted their technology and approach, with many seamlessly moving their workforce to the home office.

    Over the years the role of the chief information security officer (CISO) has undergone significant change. The CISO wears a lot of hats, and the role now goes beyond simply ensuring that the company adheres to security legislation and upskills employees with security protocols to ensuring profitability through safeguarding the organisation’s data.

    Just like anyone would ensure the safety of their own home, organisations also need to be treated with care and mindfulness to avoid company turnover values, business registration, credit and financial information landing in the wrong hands.

    ITsMine’s agentless DLP solution for Maxtec partners is built to protect data from the inside out

    The latest survey* on CISOs found that in South Africa, 98% of organisations experienced at least one cloud data breach in the past 18 months, while another recent survey± discovered that the average cost of a data breach in South Africa grew to R46-million in 2021. Added to that is the loss to a business’s standing and shareholder confidence.

    There are many third parties accessing critical data. Fortunately, CISOs have various options to easily mitigate this risk by creating data-security “safe zones”.

    A robust agentless data loss prevention (DLP) solution is a requirement since a lot of data sharing happens between guests, employees and any third parties accessing an organisation’s internal systems. ITsMine’s agentless DLP solution for Maxtec partners is built to protect data from the inside out, differentiating between two attack vectors and managing them automatically. The solution also allows users to safely share data across different devices and locations.

    Peace of mind

    ITsMine provides CISOs with the peace of mind that comes with knowing no harm can befall the business. Its features alert administrators to improper file use, while also reinforcing the correct behaviours for employees. This powerful agentless DLP solution is an invaluable tool to protect against external and internal threats automatically.

    The solution features unique SoftwareMines, acting as the last line of defence. These are dedicated made-up files, planted in sensitive locations adjacent to files that need protection. “Stepping” on a SoftwareMine, including opening, or even tampering the file’s permissions, will immediately send an alert to an organisation’s security team for them to take the necessary steps. The unique, agentless Beyond DLP offering then secures and protects all three phases of digital data, using artificial intelligence, behaviour analysis and deception techniques.

    CISOs know the importance of executing data security in an effective way, but also know well how tedious and draining setting policies and classifications can be. ITsMine does this seamlessly on behalf of the team with:

    • Continuous discovery of data usage patterns;
    • SoftwareMines: decoys deployed in the data sharing safe zones to monitor and control usage of data in these zones;
    • Integrated data security training campaigns, increasing awareness of data security within the data security safe zones;
    • File GPS: virtual data tagging and tracking of data’s location leaving the safe zone to prevent misuse of a company’s data; and
    • File Timebomb: Time-configured voiding of data shared beyond the safe zone.

    Unlike many data security solutions, ITsMine’s technology works across Microsoft 365 and Google Workspace cloud environments, and automatically constructs data security safe zones for sharing and collaborating.

    The remote workforce is growing daily, and not only owing to the pandemic, as businesses have come to realise that a brick-and-mortar establishment is not always required. However, with this benefit comes the complexity of having to move sensitive data across less controlled environments, making it more vulnerable to a data breach. The need to safeguard sensitive data is a reality that should be planned for by all types of businesses.

    Maxtec is proud to offer ITsMine as a powerful agentless DLP solution to all of our resellers. Contact us for more information or to set up a demo. Visit maxtec.co.za/itsmine for more.

    Watch: Protecting unstructured data doesn’t have to be a nightmare

    *IBM Security, surveyed organisations on the average cost of a data breach in South Africa. ±IDC survey on organisations’ experience with cloud data breach in the past 18 months.

    About Maxtec
    Maxtec distributes market-leading data security technologies that are trusted around the globe. We empower South African and SADC IT partners with advanced Security Fabric from Fortinet, Intelligent Broadband from Allot, SSL/TLS certification from Sectigo, Network Defence as a Service from Cyglass, Scattered Data Protection from ITsMine, Secure Cloud Backup from Acronis and Vulnerability Remediation from BigFix.

    • This promoted content was paid for by the party concerned
    DLP ITsMine Maxtec
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleRead: Icasa’s full statement on the outcome of the spectrum auction
    Next Article What an 18-year old’s initiation taught me about failure

    Related Posts

    The great crypto crash: the fallout, and what happens next

    22 June 2022

    Winter 1, Eskom 0

    22 June 2022

    What it will take to bring the Guptas to justice

    22 June 2022
    Add A Comment

    Comments are closed.

    Promoted

    More than card machines – iKhokha diversifies to reach more SMEs

    22 June 2022

    What does it cost to be a student in 2022?

    22 June 2022

    Rugged PCs bring AI to the edge in industrial settings

    21 June 2022
    Opinion

    Has South Africa’s advertising industry lost its way?

    21 June 2022

    Rob Lith: What Icasa’s spectrum auction means for SA companies

    13 June 2022

    A proposed solution to crypto’s stablecoin problem

    19 May 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.