Posts
- 2 Key Benefits of an Identity & Access Management Solution
- 4 Stages of Crypto-Ransomware
- 5 Big Myths about DMARC, Debunked
- 5 Key Use Cases for User & Entity Behaviour Analytics
- 5 Tips for Large File Transfers
- 5 ways the Healthcare Industry is using Managed File Transfer
- 6 Top Next Gen SWG Use Cases
- 60 Second Interview With Danny Maher
- 9 Mistakes You Might Make When Sending Big Files
- 9STAR supports its South East Asian Market growth with the appointment of HANDD Business Solutions
- A Data Security Update: Looking Ahead to 2017
- A Micro-Guide to User-driven Data Classification Solutions
- An Introduction To Identity Access Management
- Badly Managed SSH Keys Pose a Serious Threat to Your Security
- Careers at HANDD
- Celebrating Seven Years at HANDD
- Changing the Security Culture within an organisation
- Choosing the Data Classification Solution That’s Right for Your Enterprise
- Clearmanage Boosts Cloud Security with CryptoAuditor
- Cloud still requires some blue sky thinking
- Control Your Data By Plumbing It Properly
- Cyber Security: Protect What You Have
- Data Classification Solutions: Four Points to Consider When Choosing a Provider
- Data Protection – Put Your Money Where Your Doubt Is
- Data Protection Tips For Small Businesses
- Data Security in Review: What to expect in 2017
- Data Storage: In the Cloud, Or Not?
- Deloitte Data Breach: What Were They Thinking?
- Don’t React to Ransomware, Prevent It!
- Don’t Forget About Managed File Transfer
- Email Encryption in 2023
- Email Security Case Study: United International Pictures
- Five Steps To A Secure Workforce
- Four Key Benefits of Modern Data Classification Tools
- GDPR – One year on
- GDPR: Getting Your House in Order
- Global IT Security consultancy HANDD is Globalscape’s Top United Kingdom Partner in 2018
- Global Trends in Cyber Resilience
- HANDD Business Solutions Announce Partnership With Ava
- HANDD Business Solutions Announce Partnership With Centrify
- HANDD Business Solutions Announces Strategic Secure Islands Partnership
- HANDD Business Solutions Appointed Securonix First UK VAR
- HANDD Business Solutions Congratulate New Partner, iSheriff
- Have you seen the mail I just sent?
- How Security Professionals can Solve the Biological need to Break the Rules
- How to Unlock More Benefits From Your Managed File Transfer Solution
- Identity & Access Management: Better Security, Efficiency, Productivity & Compliance
- Importance of Data Discovery
- Introducing Globalscape EFT Version 8.0.4
- Is Dropbox Secure?
- iSheriff Announces Acceleration of International Business
- iSheriff Establishes Leading Position in Anti-Malware Efficacy
- It’s Time to Get SASE
- Making the case for IT Modernisation
- Manage Your Data From Cradle to Grave
- Managed File Transfer is Going Places
- Managed File Transfer Predictions 2021
- MFT Case Study; Fidelity International
- MFT, SWIFT, and the Fight Against Cyberfraud
- Policing in the Shadows, from home!
- Responding to a Data Breach – A Five-Step Guide
- Secure Your Dropbox Password
- Taming the Cloud: Cloud Data Protection for the Modern Business
- The Benefits of Cloud Managed File Transfer
- The Four Features of Cloud MFT
- The Importance of Identity Access Management Training
- The Insider Threat – Is Your Organisation in Control?
- The outlook is cloudy: The importance of Data Classification and Data Access Governance tools
- The Pros and Cons of Scripting
- The Reason Your Cloud Platform Needs Policing
- Think EU GDPR Doesn’t Apply? Think Again!
- To Secure Banking Data, Map Out Its Journey In Advance
- UEBA: Artificial Intelligence Just Got Intelligent
- What Have We Learned from GDPR?
- Who Can You Really Trust?
- Why are Top Businesses Turning to Data Classification?
- Why Data Classification Should be Central to Every Organisation’s Security Strategy
- Why Do We Want Data Classification?
- Why Improving Cyber Security Awareness Isn’t Enough
- Why Is Data Classification Important?
- Why your MFT Solution matters?
Pages
- ABOUT GDPR
- About HANDD
- Book Online Demo
- Contact HANDD
- DATA CLASSIFICATION & GDPR
- DATA DISCOVERY & GDPR
- Full Width template
- GDPR Data Security Services
- Home 2024
- IDENTITY ACCESS MANAGEMENT & GDPR
- Linoma User Forum Registration
- MONITORING & CONTROL FOR GDPR
- Our Services
- Privacy Policy
- Sectors & Clients
- Sitemap
- Start a Free Trial
Products
- 3-STEP SECURITY STRATEGY
- Ava Reveal
- Centrify – Identity Service
- Centrify – Privilege Service
- Centrify – Server Suite
- Cleo Clarify
- Cleo Harmony
- Cloud Protector
- Concentric AI
- Cybereason Deep Detect & Respond
- Cybereason Deep Prevent (NGAV)
- Cybersecurity For Malaysian Banks
- CyGlass
- Elastic SSO Enterprise
- Enterprise Recon
- Flexera – Corporate Software Inspector
- Flexera – Vulnerability Intelligence Manager
- Fortra’s Clearswift Data Loss Prevention
- Fortra’s Clearswift Secure Email Gateway
- Fortra’s Clearswift Secure ICAP Gateway
- Fortra’s FileCatalyst
- Fortra’s Globalscape EFT Platform
- Fortra’s Globalscape Mail Express
- Fortra’s Globalscape WAFS
- Fortra’s GoAnywhere MFT
- GoDrive
- Integration Cloud
- iSheriff – Email Security
- iSheriff – Web Security
- iSheriff – End-Point Security
- Lightbeam
- MFT Managed Services
- Netwrix – Auditor
- PKWARE – SecureZip
- PKWARE – Smartcrypt
- Radware – Attack Mitigation Service
- Resilient – Incident Response Platform
- Risk Management in Technology (RMiT)
- Secure Document Sharing and Signing
- Securonix
- SEEBURGER Business Integration Suite
- Spirion Sensitive Data Manager
- SSH – SSH Tectia MobileID
- SSH – CryptoAuditor
- SSH – Tectia MobileID
- SSH – Tectia SSH
- SSH – Universal Key Manager
- Support
- Terranova Security
- Watchful – RightsWATCH Platform
Resources
- 2015 – Already the New Year of the Breach?
- Boldon James Allianz Customer Case Study
- Boldon James Classification Big Data Presentation
- Boldon James Classifier 360 Whitepaper
- Boldon James Classifier Administration Datasheet
- Boldon James Data Classification Brochure
- Boldon James Data Protection Presentation
- Boldon James Email Classifier Datasheet
- Boldon James Exchange Classifier Datasheet
- Boldon James File Classifier Datasheet
- Boldon James ITAR Fact Sheet
- Boldon James Mobile Classifier Datasheet
- Boldon James Mobile Classifier Sales Flyer
- Boldon James Mobile Filter Datasheet
- Boldon James Notes Classifier Datasheet
- Boldon James Office Classifier Datasheet
- Boldon James Oil and Gas Classifier Customer Case Study
- Boldon James OWA Classifier Datasheet
- Boldon James Power Classifier Datasheet
- Boldon James SharePoint Classifier Datasheet
- Boldon James SharePoint Presentation
- Boldon James South West Fire and Rescue Customer Case Study
- Boldon James User Driven Classification Datasheet
- Boldon James User Driven Classification Whitepaper
- Boldon James Video: Data Classification Overview
- Business Intelligence Dashboards for File Transfer
- Centrify ELC Case Study
- Centrify Essendon Volkswagen Case Study
- Centrify HIPAA Case Study
- Centrify Identity Management Case Study
- Centrify Identity Service Datasheet
- Centrify Identity Service, Enterprise Mobility Management Datasheet
- Centrify Identity Service, Mac Edition Datasheet
- Centrify Identity Service, Mac Smart Card Edition Datasheet
- Centrify Interval International Case Study
- Centrify Morehouse College Case Study
- Centrify Morris Communications Case Study
- Centrify National Weather Service Case Study
- Centrify Ouachita School District Case Study
- Centrify Privilege Serivce Datasheet
- Centrify SBA Communications Case Study
- Centrify Server Suite Datasheet
- Centrify Server Suite, Standard Edition Datasheet
- Centrify Video: Are Corporations More Vulnerable Than They Admit?
- Chaos to Control Creating a Secure Mature File Transfer Process or System or Solution
- Digital Guardian A Day in the Life of Your Sensitive Data Infographic
- Digital Guardian Add-On Modules Datasheet
- Digital Guardian Advanced Threat Protection Datasheet
- Digital Guardian Data Loss Prevention Datasheet
- Digital Guardian Data Protection for Citrix ShareFile Datasheet
- Digital Guardian Data Protection for Law Firms Datasheet
- Digital Guardian Data Protection Integration with FireEye Datasheet
- Digital Guardian Data Protection Integration With HP ArcSight Datasheet
- Digital Guardian Energy Division Case Study
- Digital Guardian For Windows Datasheet
- Digital Guardian Fortune 100 Manufacturer Case Study
- Digital Guardian Fortune 1000 Manufacturer Case Study
- Digital Guardian Global 100 Technology Conglomerate Case Study
- Digital Guardian Global Pharmaceutical Company Case Study
- Digital Guardian ITAR Case Study
- Digital Guardian Jabil Manufacturing MSP Case Study
- Digital Guardian Large Managed Healthcare Provider Case Study
- Digital Guardian Luxury Sports Car Manufacturer Case Study
- Digital Guardian Managed Security Program (MSP) Datasheet
- Digital Guardian Management Console Datasheet
- Digital Guardian Multi-National Banking Company Case Study
- Digital Guardian Multibilion-Dollar Global Financial Services Firm Case Study
- Digital Guardian Savant Protection Application Whitelisting Datasheet
- Digital Guardian USDHS Continuous Diagnostics & Mitigation Datasheet
- Digital Guardian Visibility Study Datasheet
- Digital Guardian: Security’s Change Agent Video
- Do Your Data Transfers, Policies and Practices Meet Your Regulatory Obligations?
- File Transfer Automation On Demand Webinar
- Globalscape RBFCU Enhanced File Transfer Case Study
- Globalscape Active-Active High Availability with EFT Datasheet
- Globalscape AON EFT Case Study
- Globalscape Content Integrity Control (CIC) Module Datasheet
- Globalscape Dangerous File-Sharing Whitepaper
- Globalscape Enhanced File Transfer (EFT) SMB and Enterprise Datasheet
- Globalscape Enhanced File Transfer (EFT) SMB Datasheet
- Globalscape Enhanced File Transfer Datasheet
- Globalscape Enterprise Mobility Management 101 Whitepaper
- Globalscape Facilitating Enterprise Compliance Whitepaper
- Globalscape Facilitating Enterprise Compliance Whitepaper
- Globalscape High Availability Clustering Whitepaper
- Globalscape Mail Express Datasheet
- Globalscape Managed File Transfer Buyers Guide Whitepaper
- Globalscape Managed File Transfer: Can your business thrive without it? Whitepaper
- Globalscape Managed Information Xchange (MIX) Datasheet
- Globalscape Mobile is the New Normal for Conducting Business Whitepaper
- Globalscape Mobile Transfer Client Datasheet
- Globalscape Multifactor Authentication Whitepaper
- Globalscape OpenPGP Module FAQ Datasheet
- Globalscape Protecting Digitalized Assets in Healthcare Whitepaper
- Globalscape Protecting Payment Information with PCI DSS Version 3 Compliance Whitepaper
- Globalscape Reducing the Costs and Risks of Email Attachments Whitepaper
- Globalscape scConnect Datasheet
- Globalscape scConnect Security Datasheet
- Globalscape Security Solutions Datasheet
- Globalscape Three Ways System Downtime Affects Companies and Four Methods to Minimize It Whitepaper
- Globalscape WAFS Whitepaper
- Globalscape Web Transfer Client Datasheet
- Globalscape Wide Area File Services (WAFS) Datasheet
- Globalscape: Maximize Uptime with EFT™ High Availability
- Insider Threats and Inside Out Security
- Ipswitch Analytics Datasheet
- Ipswitch Enterasys Case Study
- Ipswitch Failover Datasheet
- Ipswitch File Transfer Datasheet
- Ipswitch File Transfer Products Overview Datasheet
- Ipswitch Hermes Case Study
- Ipswitch MOVEit Central Datasheet
- Ipswitch MOVEit Cloud Datasheet
- Ipswitch MOVEit DMZ Video
- Ipswitch MOVEit File Transfer (DMZ) High Availability and Scalability Datasheet
- Ipswitch MOVEit File Transfer (DMZ) Secure File Transfer Server Datasheet
- Ipswitch MOVEit Mobile Datasheet
- Ipswitch Pharmaceutical Case Study
- Ipswitch The City of Guelph Case Study
- iSheriff AAA Ambulance Case Study
- iSheriff advert Video
- iSheriff Cloud Security Datasheet
- iSheriff Disrupting The Cybercrime Exploration Life-Cycle
- iSheriff Email Security Datasheet
- iSheriff Endpoint Security Datasheet
- iSheriff Integrated Business Technology Case Study
- iSheriff ITEX Case Study
- iSheriff Management Console Designed For Managed Service Providers Datasheet
- iSheriff RHWL LLP Case Study
- iSheriff Safesite Inc. Case Study
- iSheriff Web Security Datasheet
- Linoma Crypto Complete Brochure
- Linoma Dayton Parts Case Study
- Linoma Field-Level Encryption Case Study
- Linoma Go Anywhere Brochure
- Linoma Go Anywhere Managed File Transfer Brochure
- Linoma Go Anywhere Secure Mail Brochure
- Linoma Go Drive Brochure
- Linoma GoAnywhere MFT Video
- Linoma GoDrive by GoAnywhere Video
- Linoma IDB Swiss Bank Case Study
- Linoma Integra Bank Case Study
- Linoma Release Webinar
- Linoma State of Maryland DLLR Case Study
- Nlyte Alarms Datasheet
- Nlyte Alarms Datasheet
- Nlyte Banking Industry Case Study
- Nlyte BMC ADDM Connector Datasheet
- Nlyte Canon Case Study
- Nlyte Computacenter Case Study
- Nlyte Configuration Management Datasheet
- Nlyte DCIM Datasheet
- Nlyte Defines Data Center Infrastructure Management (DCIM) – Excitement Video
- Nlyte for BMC ITSM Datasheet
- Nlyte for HP ITSM Datasheet
- Nlyte for ServiceNow ITSM Datasheet
- Nlyte Global Technology Company Case Study
- Nlyte On-Demand Product Brief
- Nlyte PNC Case Study
- Nlyte Retail Big Box Case Study
- Nlyte SSE Case Study
- Office 365 Single Sign-On Whitepaper
- PKWARE CMS Case Study
- PKWARE Data Center Performance Guide
- PKWARE Data Security, Compression and Encryption at a Glance Video
- PKWARE Desktop Security Guide
- PKWARE Food and Beverage Company Case Study
- PKWARE Global Bank Case Study
- PKWARE Healthcare Customer Case Study
- PKWARE Healthcare Services Provider Case Study
- PKWARE Institute for Social and Economic Research Case Study
- PKWARE Mainframe Security Guide
- PKWARE Major U.S. Bank Case Study
- PKWARE Open Systems Security Guide
- PKWARE Persistant Data Protection Overview
- PKWARE Pkzip and Securezip V15 Datasheet
- PKWARE SecureZip DLP Deployment Kit Overview
- PKWARE Tip Sheet
- PKWARE Top Ranked Financial Services Institution Case Study
- Planning An Effective DLP (3.0) Strategy: From Immediate Results to Long Term Goals
- Secure File Transfer and Today’s Regulatory Compliance
- Secure Islands Data Interceptor for Opentext
- Secure Islands Data Security for the Financial Sector
- Secure Islands IQProtector Bridge
- Secure Islands IQProtector Custom Data Interceptor
- Secure Islands IQProtector Data Interceptor for Application Servers
- Secure Islands IQProtector Data Interceptor for MS Exchange
- Secure Islands IQProtector Data Interceptor for SharePoint
- Secure Islands IQProtector Enterprise
- Secure Islands IQProtector Express
- Secure Islands IQProtector for ISO 27001 Compliance
- Secure Islands IQProtector Scanner for File Stores
- Secure Islands Making Data Classifiction Work for You
- Secure Islands Making IRM Work for You
- SSH Andritz Group Case Study
- SSH Cloud Security Case Study
- SSH CryptoAuditor Datasheet
- SSH CryptoAuditor: An SSH, SFTP and RDP Firewall Datasheet
- SSH Financial Services Company Gains Visibility & Control Over External Contractors Case Study
- SSH HD Video
- SSH Key Management Infographic
- SSH Key Manager Case Study
- SSH Key Mobile ID Case Study
- SSH Missing Identities Datasheet
- SSH Monitor, Audit & Control Privileged Users in the Cloud Case Study
- SSH Secure File Transfers and Data-In-Transit Datasheet
- SSH Solution Case Study
- SSH Support Services Datasheet
- SSH Tectia ConnectSecure Datasheet
- SSH Tectia Mainframe Case Study
- SSH Tectia MobileID Datasheet
- SSH Tectia SSH Client Tectia SSH Server Datasheet
- SSH Tectia SSH Server for IBM z/OS Datasheet
- SSH Universal SSH Key Manager Datasheet
- The Next Generation in Data Security from Verdasys
- The Secure Dropbox Alternative from Globalscape
- UEBA for Compliance Whitepaper
- Varonis – What We Do Video
- Varonis Enterprise Search: Unlocking Hidden Knowledge in Unstructured Data Whitepaper
- Varonis Express Risk Assessment Datasheet
- Varonis How to Detect and Clean Cryptolocker Whitepaper
- Varonis Insider Threats Infographic
- Varonis Insider Threats: Malice, Mistakes, and Mountain Lions Whitepaper
- Varonis Partner Battlecard
- Varonis Point of View: Varonis and User Behavior Analytics Whitepaper
- Varonis Security Solutions
- Watchful RightsWATCH Data-centric Security for Individuals
- Watchful RightsWATCH Data-centric Security Overview
- Watchful RightsWATCH Enhancing and Extending Microsoft’s RMS
- Watchful TypeWATCH e-Biometrics Security
- Watchful Dynamic Data Classification with RightsWATCH
- Watchful Extending RightsWATCH to Exchange Online and Office 365
- Watchful GE Money Customer Case Study
- Watchful Keeping Unstructured Data Secure Whitepaper
- Watchful RightsWATCH and the RMS Sharing App in an Azure Environment
- Watchful RightsWATCH building on RMS for data-centric data security
- Watchful Secure Collaboration with RightsWATCH and Azure RMS
- Watchful Software Video
- Watchful Software; Data Classification That Works
- Watchful The Five Key Trends for Insider Threats
- Watchful The X-Factor in Data-Centric Security Webinar
- Watchful True Information Security Only a Click Away… For Anyone Webinar
- Watchful You Can’t Teach an Old Dog New Tricks Webinar
Vendors
Events
- Data Risk Management in Financial Services Summit
- Data Risk Management in Financial Services Summit – DRMFS 2017
- e-Crime & Information Security – Mid Year
- Globalscape Customer User Forum 2020
- GoAnywhere User Forum 2019
- Hunt, Analyse & Destroy:<br>A Multi-Stage Live Cyber-Attack
- IDM – Identity Management
- Infosecurity Europe
- IT Security Professionals Rooftop Summer Party
- Live Webinar: Demystifying DMARC
- Live Webinar: Globalscape Customer User Forum 2021
- Live Webinar: GoAnywhere MFT in 2020 and Beyond
- Live Webinar: Managed File Transfer with GoAnywhere
- MFT Lunch & Learn 2024
- Understanding Insider Threats
- Using Artificial Intelligence to Detect Threats in Your Network Traffic
- Webinar: Automating Your File Transfers
- Webinar: How To Maximise Your EFT Investment
- Webinar: How To Maximise Your MOVEit Investment
- Webinar: How to Remove Data Security Risk from File Transfers
- WEBINAR: Solving Critical Security Problems with Securonix User & Entity Behaviour Analytics