Resource Center

Filtered by:

Featured

Blog

Data Governance: Best Practices F...

Data is at the core of decision-making and strategic planning for many digital-based organizations. Implementing r...
Blog

What is Data Access Governance?

If you want to keep your data safe and secure and make sure your information doesn’t get into the wrong hands, you’ll...
News

Qohash Announces Major Update to ...

Qohash is pleased to announce a significant update to the Qostodian Recon scan engine, designed to enhance speed, acc...
Blog

Top 6 Data Migration Challenges (...

With every instance of moving data around, there are at least a dozen things that could go wrong. While data migra...
Blog

Data Security Posture Management ...

As cyber threats continue to evolve, it’s important that businesses prioritize both data security posture management ...

Case studies

CASE STUDY COVER PICTURES (2)
Case study
CASE STUDY Desjardins Industry: Financial services  Region: QC, Canada ...
CASE STUDY COVER PICTURES (3)
Case study
CASE STUDY CAA Club Group Industry: Insurance Region: ON, Canada ...
CASE STUDY COVER PICTURES (1)
Case study
CASE STUDY Énergir Industry: Energy Region: QC, Canada ...

Blogs

Data governance best practices
Blog
Data is at the core of decision-making and strategic planning for many digital-based organizations. Implementing robust data governance best practices ensures that data is ac...
Data access governance
Blog
If you want to keep your data safe and secure and make sure your information doesn’t get into the wrong hands, you’ll want to make sure you know about data access governance. ...
data migration challenges (1)
Blog
With every instance of moving data around, there are at least a dozen things that could go wrong. While data migration is essential for your organization, data migration chal...

Videos

Qohash x KPMG (9)
Videos
Deep expertise meets novel data security technology to offer the fastest path to sensitive data compliance for understaffed teams. Driven by the cybersecurity talent sho...
LinkedIn Live: Microsoft 365 + Qostodian
Videos
Learn how to leverage granular data element technology to stay ahead of risk, speed investigations and simplify compliance reporting. Qohash hosts Dennis Chen, Lead Produ...
LinkedIn Live – A compliance journey banner
Videos
A step-by-step guide to navigating from risk assessment to breach identification This year alone, VA, CO, PA, CT, and UT have new privacy laws coming into effect. These s...

Podcasts

Qohash podcast category visionaries
Podcasts
Our co-founder and CEO, Jean Le Bouthillier, takes the mic with host Brett Stapper, delving deep into the thrilling world of data security in Canada. From military officer to te...

News

qohash qostodian recon logo
News
Qohash is pleased to announce a significant update to the Qostodian Recon scan engine, designed to enhance speed, accuracy, and explainability in data discovery. This latest ver...
Sans titre (3)
News
The AI-powered platform provides visibility and control over files in high-risk data sources, helping enterprises proactively identify risks associated with sensitive data. ...
ISO27001 Certification
News
Qohash, a leading data security posture management company, is pleased to announce that it has recently obtained the prestigious ISO 27001:2022 certification. This certification...

Product

Qostodian Product video banner
Product
In today’s digital age, the protection of sensitive information has become more important than ever. With cyber threats constantly on the rise, individuals and organizatio...
Remediation (1)
Product
In today’s digital landscape, organizations face an ever-increasing need to protect their sensitive information from potential security threats. To address these concerns,...
Qostodian Product video banner
Product
In this instructional video, the Qostodian Recon tool is shown to help find specific information within a file server using the custom sensitive information feature. This featur...
Logo Qohash
By initiative
Regulatory compliance:
Find, classify and inventory all sensitive data, across every data source
Data breach prevention:
Monitor sensitive data 24/7, track data lineage, and enforce policies at endpoints
Microsoft 365
One easy-to-use platform to secure sensitive data on Windows workstations and M365
By regulation
GDPR
CCPA
GLBA
VCDPA
NYCRR
UCPA
PCI-DSS
CPA
Law 25
Why Qohash
Defy legacy limitations
What our customers say about us

Contact us​