Search Google Appliance

Identity Finder: Software Security vs. Data Security (courtesy of Identity Finder, LLC)
March 25, 2012

Application security is important, but it's not enough. No software can protect information once it's been exported. Identity Finder searches for unauthorized copies of sensitive data and gives you the tools to delete them.

2 Comments

|Login to Comment on this story

ssussman@mit.edu | Mar 31, 2012 | 5:55 PM

Not clear if this software is available via IS&T or we are advised to purchase it directly from the vendor?

fizz@mit.edu | Apr 11, 2012 | 4:28 PM

MIT community members can get Identity Finder free of charge through IS&T's Software site. Here's the link:

http://ist.mit.edu/identity-finder

More Videos

December 16, 2013

Year Up provides urban young adults with the skills, experience, and support that empower them...

October 23, 2013

Spam – unwanted, unsolicited email – can infect your computer with viruses, put your personal...

April 30, 2013

You can keep track of lynda.com videos that interest you by creating playlists. Watch this video...

March 28, 2013

MIT's free mobile app includes a campus map, shuttle schedules, tours, current events, and more...

January 30, 2013

Does your computer contain sensitive data, such as Social Security numbers, credit card numbers...

December 21, 2012

This video steps you through the process of installing the lynda.com app, configuring the...

October 22, 2012

Malware is short for "malicious software." It includes viruses and spyware that get installed on...

May 30, 2012

Clifford Lynch is the Executive Director for the Coalition for Networked Information (CNI).

April 30, 2012

IS&T has redesigned its web site.

March 23, 2012

Learn how to better secure your computer.

December 22, 2011

IS&T offers lynda.com’s online training free of charge to MIT students, faculty, and staff...

October 31, 2011

Use your MITvoip phone's online console to customize settings when you're not at MIT.

August 26, 2011

This demo shows how to configure the MIT SECURE wireless network.

June 20, 2011

This demo shows how to configure the MIT SECURE wireless network.