Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe to the blog

Blog

File sharing – by email or in a data sharing service?

Various files are constantly distributed in electronic format. A surprising number of them contains information that..

file sharing Information security Information sharing secure e-mail Blog

Blog

Internal approval process – electronically and securely

An employee sends a bill for monthly expenses. A manager must accept the invoice, after which it will be paid. The..

Information security Blog approval process

Blog

What is meant by email DLP?

We at Deltagon often talk about how e-mail DLP can help prevent data leaks and follow the fulfillment of information..

Articles email encryption Information security email DLP Blog information security policy data leak

Blog

How to improve business with information security

Companies want to stay ahead of their competitors but to be at the fore front means constant business development, such..

email Articles Information security email DLP confidential data Blog electronic signature digital signature

Blog

Save time and money with digital signature – make life easy

Have you ever thought that the signing process can take days or even weeks in worst cases? Documents are sent between..

Information security Blog electronic signature digital signature

Blog

What should a company take into account when considering investing in security solutions?

Many managers agree that security solutions are necessary and that the protection of electronic communication is..

critical information Information security security Blog investment security solution

Blog

Simplicity improves email security

If e-mail encryption is found to be too difficult users many times look for an easier way to do the task. E-mail security..

email Articles e-mail security email encryption Information security confidential data Blog

Blog

Email encryption enhances communication – without compromising information security

Information security of an unprotected email is as weak as that of a postcard: message is available for anyone to read...

Articles email encryption Information security postcard Security of e-mail Blog

Blog

A secure workspace – increased interest among companies

Recently there has been an increased interest for a secure workspace. Our customers find that they gain value from..

confidential files Data protection file sharing Information security Information sharing secure workspace

Blog

3 steps: How to prepare in advance to the EU Data Protection reform of 2018

The reform gives companies and organizations a good opportunity to check and put their own data security processes into..

GDPR General Data Protection Regulation Articles data protection Data protection Data Protection reform Information security personal data personal data register personal information Blog

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.