logo
September 11, 2025 | Dirk Schrader

Why DSPM Is Essential for Your Modern Security Architecture

Data Security Posture Management (DSPM) delivers a data-first approach to security by discovering, classifying, and continuously monitoring sensitive data across your hybrid IT environment. This blog outlines how DSPM integrates into every layer of your modern security architecture, from IAM and...
September 11, 2025 | Dirk Schrader

Choosing the Right Data Security Platform

Choosing the right data security platform is essential for modern organizations. This blog walks through critical capabilities to look for, including data discovery, real-time risk management, access governance, and integration with IAM, DLP, CSPM, and SIEM tools. With Netwrix, organizations gain...
February 12, 2024 | Craig Riddell

Data Security Explained: Challenges and Solutions

Data is the most valuable asset for any organization, regardless of size or sector. Loss or corruption of financial reports, business plans and intellectual property can bring even a global enterprise to a standstill. Moreover, a wide range of compliance regulations mandate the organization...
January 30, 2024 | Paul Staz

Three Easy Ways to Maintain Data Security and Compliance in NetSuite

Information is an organization's most valuable asset — and with over 94% of US-based organizations using cloud-based systems, one data breach can have serious consequences for a growing business. Maintaining the integrity and security of your data should be high on your priority list...
January 30, 2024 | Paul Staz

Why Data Security Starts with Salesforce

Customers want digital experiences that make their lives easier and wallets lighter. However, they have a complicated relationship with their personal data. They don’t trust most companies, but they also won’t stop sharing information with them.  Salesforce’s 2020 State of the...
January 30, 2024 | Paul Staz

Salesforce Security and Compliance: Best Practices and Automated Tools

Salesforce is an incredibly powerful system that nearly every department in an organization relies on. But as the platform evolves and businesses grow, complexity grows along with it — and without effective controls for managing that complexity, businesses can expose themselves to...
January 16, 2024 | Paul Staz

Safer Data Migration With Salesforce Audit Fields

In the last decade, companies have made a huge switch from legacy, on-premise servers to cloud-based applications. This shift has had lots of benefits — increased flexibility, lower costs to scale, etc. — but it's also required a massive migration of data to the...
December 9, 2022 | Joe Dibley

The Modern Data Repository: Understanding Your Options

Today, organizations have a variety of options for storing the data they generate, collect and use. Options for data repositories include: Relational database Data warehouse Data lake Data mart Operational data store Choosing the best option for a given business situation...
October 21, 2022 | Joe Dibley

How To Secure Default IIS Site & Enable Windows Authentication

By default, when you create a new Internet Information Services (IIS) website, it’s open to everyone with anonymous access enabled — anyone can access and view the data being hosted by that site. Obviously, this is a security concern for most organizations. Indeed, I’m often asked by clients...
April 5, 2022 | Dirk Schrader

CIS Control 9: Email and Web Browser Protections

The Center for Internet Security (CIS) publishes Critical Security Controls that help organization improve cybersecurity. CIS Control 9 covers protections for email and web browsers. Attackers target email and web browsers with several types of attacks. Some of the most popular are social...
Show more articles
...