Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


05:11 PM
Dark Reading
Dark Reading
Products and Releases

Dataguise Announces Enterprise Security Intelligence For Data Privacy

Dataguise will introduce DgSuite 3.5 featuring DgDashboardT for actionable intelligence

Fremont, CA, June 20, 2011 - Dataguise (http://www.dataguise.com), a leading innovator of enterprise data privacy solutions, today introduced its latest generation of database security solutions for sensitive data discovery, masking and sensitive data risk management at the Gartner Security & Risk Management Summit in Washington D.C., June 20-23, 2011. At the Summit, Dataguise unveiled DgSuiteT 3.5, proactive risk-based enterprise security intelligence and solutions for transparently securing personally identifiable information (PII), payment card industry (PCI) data, information covered by HIPAA regulations and other similar sensitive data located in structured database repositories across distributed enterprise environments.

"The Gartner Summit presents an important industry opportunity across security disciplines, bringing together experts to exchange ideas and best practices that address the industry's biggest data privacy challenges," said Allan Thompson, EVP, Operations, Dataguise. "At this year's event, we are pleased to showcase the latest technology for identifying enterprise data at risk and providing solutions to find and protect the data from both insider and external threats."

At this year's Summit, Dataguise will introduce DgSuite 3.5 featuring DgDashboardT for actionable intelligence that enables executives, information security professionals, compliance and infrastructure managers to better understand shared responsibilities for protecting data. The new solution also includes DgDiscoverT, automating the identification, categorization and periodic review of sensitive data holdings. High performance Masking on-DemandT with DgMaskerT transparently protects data in non-production and business analysis environments. Dataguise customers range from mid-tier healthcare providers to large banking and financial services organizations, federal agencies and institutions of higher education.

Please join Dataguise at booth #34 for a chance to: . Discover how Dataguise solutions support regulatory and corporate security compliance, improve operational efficiency and minimize business risk. . Learn how to better manage and streamline security processes in non-production environments. . Discover how Dataguise solutions provide actionable intelligence in heterogeneous IT environments, enabling the enterprise-wide identification and protection of sensitive data.

The Gartner Security & Risk Management Summit 2011 is a leading conference and meeting place for IT and business executives responsible for creating, implementing, and managing a proactive and comprehensive IT strategy for information security, risk management, compliance, business continuity management, IT disaster recovery, and business resiliency. This summit brings together all the issues related to infrastructure protection, governance, risk management, compliance, business continuity, disaster preparedness, response and recovery to discuss the challenges and solutions in these areas. The Summit includes more than 150 drill-down sessions presented by 47 Gartner analysts as well as analyst-moderated user roundtables, workshops, user case studies and workshops.

Tweet this: @Dataguise Announces #EnterpriseSecurityIntelligence for #DataPrivacy at #GartnerSecurity & Risk Management Summit 2011 in Washington D.C.

Follow Dataguise on Twitter at: http://twitter.com/dataguise

About Dataguise Dataguise helps organizations safely leverage their enterprise data with a comprehensive risk-based data protection solution. By automatically locating sensitive data, transparently protecting it with high performance Masking on-DemandT, and providing actionable intelligence to managers, Dataguise improves data risk management, operational efficiencies and regulatory compliance costs. For more information, call 510-824-1036 or visit www.dataguise.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.