Fortinet Acquires Next DLP
Strengthens its Top-Tier Unified SASE Solution
Read the release
Close
Toggle menu 2
Platform
Main menu
Platform
The Reveal Plaform
Solutions
Data Loss Prevention
Insider Risk Management
UEBA
Security Education
Cloud Data Security
Use Cases
Main menu
Our Customers
Customer Stories
By Challenge
Compliance
Remote Workforce
Secure Operational Technology
Protect Intellectual Property
By Feature
Email Security
Messaging Security
Browser Security
Removable Storage Security
Print Security
Resources
Main menu
Resources
Definitive Guide to IRM & DLP
Analyst Reports
DLP Checklist
DLP Test Tool
Technical Overview
DLP Glossary
CISO Nick
Blog
Featured posts
How to extend Zero Trust security to the endpoint
What is Zero Trust for the cloud?
Company
Main menu
Company
Newsroom
Everything Next DLP from our press room, and around the Web.
Events
Meet our team virtually or in-person.
Careers
Change the cybersecurity industry with Next DLP.
Internal Security
Reporting & support for a suspected security vulnerability.
Partners
Partner Program
Secure businesses & accelerate sales.
Find a Partner
Find your Next DLP Partner.
Partner Portal
Further questions?
Contact our team
Book a demo
Support Portal
Sign in
Reveal
MSSP
Support
Partner Portal
Demo
Next DLP Blog | Data Protection (2)
Data protection and insider risk commentary and insights from the Next team.
All posts
Category:
Data Protection
2023 Recap: Connie Stack on Next DLP's Growth
Lauren Koppelman
Category:
Insider Risk
Questions for generative AI vendor security review
Chris Denbigh-White
Category:
Data Loss Prevention
An in-depth guide to the MITRE ATT&CK framework
Chris Denbigh-White
Category:
Data Protection
Celebrating Cybersecurity Industry Analysts
Georgina Stockley
Category:
Data Protection
What’s New in the NIST Cybersecurity Framework
Alan Brown
Category:
Data Protection
Go Ahead, deploy Sonoma on your Macs; Next has Day 1 coverage
Category:
Data Protection
Harnessing the Power of Cybersecurity Frameworks
Alan Brown
Category:
Data Protection
How to Stay Ahead of Cyber Threats with Dynamic Security Solutions
Category:
Data Protection
Ten Up and Coming Security Leaders
Category:
Data Protection
Why traditional classification is outdated
Lauren Koppelman
Category:
Data Protection
Prepping for Black Hat 2023 - Making the Most of the Event
Category:
Compliance
What Is NIST 800-53? A Comprehensive Guide
Category:
Data Protection
Despite Delays, The SEC is Taking Cybersecurity More Seriously – You Should Too
Category:
Data Protection
Data Protection for the Mid-Market
Category:
Insider Risk
5 Takeaways from Infosecurity Europe 2023
Fergal Glynn
Category:
Data Protection
Why Organizations Choose the Reveal Platform by Next
Category:
Data Protection
Next Announces ‘Scoped Investigations’ to Protect Employee Privacy
Fergal Glynn
Category:
Data Protection
How to Improve Microsoft Purview Data Governance with Reveal
Category:
Insider Risk
3 Takeaways from the 2023 Gartner Security & Risk Management Summit
Fergal Glynn
Category:
Data Protection
Next Announces SIEM Streaming Service and Enterprise Class Scalability
Fergal Glynn
Category:
Insider Risk
What is insider risk, and what are some examples?
Fergal Glynn
Category:
Data Protection
Can you protect your business from data breaches before setting up security policies?
Lauren Koppelman
Category:
Compliance
FINMA Operational Risk Enforcement is Coming. Are You Ready?
Fergal Glynn
Category:
Data Protection
5 key elements of a successful data protection strategy
Lauren Koppelman
Category:
Data Protection
An expert's guide to data protection for your business
Fergal Glynn
Category:
Data Protection
What is data protection, and why is it important?
Fergal Glynn
1
2
3
4
See how Next protects your employees and prevents data loss
Book a demo
Contact us