PortAuthority Intros 5.0
PortAuthority Technologies has redefined what the industry has considered as total protection of confidential information
PALO ALTO, Calif. -- PortAuthority Technologies, Inc.,™ the Authority in Information Leak Prevention (ILP), today announced it has redefined what the industry has considered as total protection of confidential information with the release of PortAuthority v5.0, the next-generation of its leading ILP solutions. With this release, PortAuthority 5.0 is the only solution to provide comprehensive protection for data-in-motion, data-at-rest and data-in-use.
Loss of private information by internal users, whether malicious or unintended, continues to plague organizations worldwide. According to the latest research, the top reasons organizations cannot enforce policies designed to prevent data breaches is lack of resources, and the complexity and expense of current offerings1. With unmatched simplicity, flexibility and scalability offered in an ILP and Content Monitoring and Filtering product, PortAuthority 5.0 addresses complexity concerns while adding the industry’s broadest coverage for protection, enabling organizations to more totally secure their confidential information.
“We have had excellent service from PortAuthority as one of many tools we use to control and protect our confidential information,” said Rob Mims, Vice President of Security and Network Engineering at MedAvant Healthcare Solutions. “The system detects and blocks confidential information that is not encrypted from being distributed electronically outside our company. With the latest version of PortAuthority, we look forward to improved reporting functions that will help us better manage the rare incidents of policy violations.”
Read more about:
2006About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024