Blog - SearchInform


Not all the DLP Solutions are Equally Useful: How to Choose the System and not be Disappointed


In this article we will examine, DLP class systems reproaches are fair and which ones are unfair and will reveal, which limitations are typical for all DLP systems and which are in fact disadvantages of some specific products.

DLP Risk management Risk assessment

The SearchInform DLP detects phishing and why would you need this functionality in the DLP class tool?


Learn how the atypical DLP functionalty enhances your corporate protection.

DLP Email

Recent Cyber Incidents


Rise in ransomware attacks and global threats

DLP Fraud ransomware

Cyber Attacks on Critical Infrastructure


Critical infrastructure: current situation and best cybersecurity practices

DLP Risk assessment Employee monitoring

What kind of DLP system do you need in 2022?


David Balaban reflects on the DLP vendors' race for attention, adding of new features, sometimes going beyond the boundaries.

DLP Investigation Human factor

How to configure DLP and not to overlook a leak


How efficient are DLP systems with preset configurations? Can a system be configured once and for good? Learn how to adjust the settings here.

DLP Employee monitoring Risk management

Not all DLP systems are equally helpful


How to choose a system and not to get disappointed

DLP Risk management Internal audit

Legal monitoring, smartphones control and your employee personal portrait


These and other ticklish issues regarding the launch of information security solution within your system.

DLP Employee monitoring Devices

10 questions about the DLP system: why do I need it, what can I do, and what can't I do?


Today DLP system’s purpose is not just monitoring data leaks as it was in the beginning - now DLP systems are commonly used to solve a much broader list of problems.

DLP Employee monitoring Risk management

What is a DLP system? How do active DLP systems work in 2019?


Although everyone is aware of risks that their data could be stolen, this is only the beginning of the IT risks companies must safeguard themselves from.

DLP Personal data Cloud

Configuring DLP system


The installation of a DLP system can be managed even by a novice system administrator. However, its fine-tuning requires some skills and experience.

DLP Risk assessment Investigation

Protection Against Information Leaks | Organization the protection of information from leakage through technical channels


We reviewed the results of the study related to the leakage of financial and other corporate confidential information.

DLP Confidential documents Devices

How to Choose a DLP System


The global market of information security tools offers a wide range of DLP systems (Data Leak Prevention). And the demand for them is only growing.

DLP Investigation

DLP systems | What is a DLP system, and how does it work?


As of today, the market of DLP systems is one of the fastest growing among all markets of information security tools.

DLP Employee monitoring

Concept of DLP Systems | What is a DLP system?


DLP software is used to protect confidential data from internal threats. However, even if information security specialists adopted protection tools and use them against external violators, struggle with internal violators is more challenging.


Integration of DLP Systems | Integration of DLP Systems in the company


DLP (Data Leak Prevention) is a comprehensive software product to prevent theft, modification and dissemination of confidential information. DLP-system monitor all the traffic within a protected corporate network.

DLP Risk assessment Internal threat

Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.

هل ترغب بالانتقال الى الصفحة الرئيسية,
او التعرف على المزيد عن الخدمات لمنطقة الشرق
الاوسط و شمال افريقيا؟
Do you want to visit main website
or learn more about MSS for MENA market?