Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to

Remediation Requests within RIsk Assessments Demo with Senior Product Manager, Chris Schubert

Hear from UpGuard's Senior Product Manager, Chris Schubert, as he introduces you to UpGuard's new Remediation Requests within Risk Assessments feature. You can now also send remediation requests from within risk assessments, enabling you to track the progress of each item under remediation and have a record of the remediation request embedded directly into the point-in-time risk assessment.

What is HIPAA compliance?

You are subject to HIPAA compliance if your business deals with Personal Health Information (PHI) of customers. It can be a daunting process to meet the standards of HIPAA regulations. Thankfully, Kintent is here to help! In our videos, we answer what HIPAA compliance is, who needs to comply, how to get compliant, and more. Would you like to become audit ready in 12 weeks, rather than 12 months? Learn more about Kintent.

Maximize Data Privacy & Regulatory Compliance with Egnyte

In this video, you’ll learn how Egnyte helps you to identify and manage regulated content across all of your company’s data repositories. You’ll also find out how to classify data with single-click policy creation and rapidly respond to Subject Access Requests (SARs) and legal holds.

How to Choose Your SOC 2 Auditor and Go Through the Audit Smoothly

After preparing fervently to meet SOC 2 standards, one decision companies face is which auditor to choose to get certified. You need to keep in mind your choice can influence your SOC 2 certification process. Kintent is here to tell you what you should be looking for when choosing an auditor. Would you like to become audit ready in 12 weeks, rather than 12 months? Learn more about Kintent.

Advanced Settings For Backup Plan - GitProtect.io Tutorial - Git Repository Backup

In this video, we would like to show you how you can create your own custom backup plan for your git (GitHub, Gitlab, BitBucket) organization to fit your needs. Set up encryption, compression, set up when you want the backup to be performed, and many many more in this GitProtect.io tutorial.