Logo Qohash

Resource Center

Filtered by:

Featured

Blog

What is Proactive Incident Manage...

Proactive incident management is a lot like having an umbrella ready at your door just in case it rains. It’s all abo...
Blog

The Dos and Don'ts of Machine Lea...

Machine learning might sound a little like a concept from a science fiction movie, but it’s actually quite similar to...
Blog

Insider Threat Indicators in Your...

Contrary to what you might think, insider threats are often more challenging to detect and manage than external threa...
Blog

What Are Data Classification Tools?

Handling vast amounts of data can be complex. Categorizing according to its sensitivity and importance alone can take...
News

Qohash Secures $17.4 Million in S...

The AI-powered platform provides visibility and control over files in high-risk data sources, helping enterprises pro...

Case studies

CASE STUDY COVER PICTURES (2)
Case study
CASE STUDY Desjardins Industry: Financial services  Region: QC, Canada ...
CASE STUDY COVER PICTURES (3)
Case study
CASE STUDY CAA Club Group Industry: Insurance Region: ON, Canada ...
CASE STUDY COVER PICTURES (1)
Case study
CASE STUDY Énergir Industry: Energy Region: QC, Canada ...

Blogs

proactive incident management
Blog
Proactive incident management is a lot like having an umbrella ready at your door just in case it rains. It’s all about being prepared before problems happen, so you can hypothe...
machine learning for computer security
Blog
Machine learning might sound a little like a concept from a science fiction movie, but it’s actually quite similar to how humans learn and improve daily. Machine learning, or ML...
which scenario might indicate a reportable insider threat
Blog
Contrary to what you might think, insider threats are often more challenging to detect and manage than external threats because of their source within the organization itself. ...

Videos

Qohash x KPMG (9)
Videos
Deep expertise meets novel data security technology to offer the fastest path to sensitive data compliance for understaffed teams. Driven by the cybersecurity talent sho...
LinkedIn Live: Microsoft 365 + Qostodian
Videos
Learn how to leverage granular data element technology to stay ahead of risk, speed investigations and simplify compliance reporting. Qohash hosts Dennis Chen, Lead Produ...
LinkedIn Live – A compliance journey banner
Videos
A step-by-step guide to navigating from risk assessment to breach identification This year alone, VA, CO, PA, CT, and UT have new privacy laws coming into effect. These s...

Podcasts

Qohash podcast category visionaries
Podcasts
Our co-founder and CEO, Jean Le Bouthillier, takes the mic with host Brett Stapper, delving deep into the thrilling world of data security in Canada. From military officer to te...

News

Sans titre (3)
News
The AI-powered platform provides visibility and control over files in high-risk data sources, helping enterprises proactively identify risks associated with sensitive data. ...
ISO27001 Certification
News
Qohash, a leading data security posture management company, is pleased to announce that it has recently obtained the prestigious ISO 27001:2022 certification. This certification...
Qohash - top100wfa
News
Qohash, a leading innovator in data security posture management, has been selected as one of the Top 100 Next-Generation Companies by the esteemed World Future Awards. This pres...

Product

Qostodian Product video banner
Product
In today’s digital age, the protection of sensitive information has become more important than ever. With cyber threats constantly on the rise, individuals and organizatio...
Remediation (1)
Product
In today’s digital landscape, organizations face an ever-increasing need to protect their sensitive information from potential security threats. To address these concerns,...
Qostodian Product video banner
Product
In this instructional video, the Qostodian Recon tool is shown to help find specific information within a file server using the custom sensitive information feature. This featur...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
GDPR
CCPA
GLBA
VCDPA
NYCRR
UCPA
PCI-DSS
CPA
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​