Author Archives: Jen Bonney

Lessons Learned from CIA WikiLeaks Fiasco: Breach Prevention Starts with Content Protection

Oh, No—Not again! No one should be surprised. And yet, we are. We know that hackers have the tools to breach. The real surprise is that organizations are being lax and not moving fast enough to take the right preventative steps by implementing in-use content protection. We can’t stop the bad guys from trying—but we can stop them from getting their hands on our stuff, and sharing it without permission. Government organization or company—this must stop. We need content protection. Latest...
Read More

Your Security Checklist Isn’t Complete Without This

Secure endpoint document protection in the cloud is a must-have for IT leaders who take cybersecurity seriously You have a strong firewall and you’ve put painstaking efforts into securing your servers: now what? If you think securing your business information stops there, think again. While many security professionals understand their work is never finished, many also believe that focusing on firewall protection will effectively safeguard them from looming threats. Though the importance of firewalls is well understood in the industry,...
Read More

GigaTrust™ Launches Anyone-to-Anyone Content Security Cloud Services

GigaCloud™ SaaS offering delivers in-use encryption, protection and consumption of emails and documents on Android, iOS and Windows endpoint devices Herndon, Virginia – March 8, 2017 – GigaTrust™, a leading provider of endpoint security and document in-use protection, today announced the availability of GigaCloud™, a fully-managed Software as a Service (SaaS) offering for secure endpoint document protection. GigaCloud delivers secure email and document collaboration services anytime, anywhere, on virtually any device and any platform with real-time data analytics, reporting and...
Read More