Featured
Blog
A Comprehensive Guide to Sensitiv...
Introduction to Sensitive Data Discovery
Sensitive data discovery is a critical process for organizations aiming t...
Blog
Data Security: Harnessing the Pow...
As technology continues to advance at an unprecedented pace, the importance of data security has become increasingly ...
Blog
Data Security Posture Management ...
Data security has always been a top priority for organizations, but as we enter the year 2024, the industry is witnes...
News
Qohash obtains ISO/IEC 27001:2022...
Qohash, a leading data security posture management company, is pleased to announce that it has recently obtained the ...
News
Qohash Named as Top 100 Next-Gene...
Qohash, a leading innovator in data security posture management, has been selected as one of the Top 100 Next-Generat...
Case studies
Case study
CASE STUDY
Desjardins
Industry: Financial servicesÂ
Region: QC, Canada
...
Case study
CASE STUDY
CAA Club Group
Industry: Insurance
Region: ON, Canada
...
Case study
CASE STUDY
Énergir
Industry: Energy
Region: QC, Canada
...
Blogs
Blog
Introduction to Sensitive Data Discovery
Sensitive data discovery is a critical process for organizations aiming to safeguard their information assets. It involves identifyin...
Blog
As technology continues to advance at an unprecedented pace, the importance of data security has become increasingly critical. With the rise of cyber threats and the potential f...
Blog
Data security has always been a top priority for organizations, but as we enter the year 2024, the industry is witnessing a significant shift in how data is protected. With the ...
Videos
Videos
Deep expertise meets novel data security technology to offer the fastest path to sensitive data compliance for understaffed teams.
Driven by the cybersecurity talent sho...
Videos
Learn how to leverage granular data element technology to stay ahead of risk, speed investigations and simplify compliance reporting.
Qohash hosts Dennis Chen, Lead Produ...
Videos
A step-by-step guide to navigating from risk assessment to breach identification
This year alone, VA, CO, PA, CT, and UT have new privacy laws coming into effect. These s...
Podcasts
Podcasts
Our co-founder and CEO, Jean Le Bouthillier, takes the mic with host Brett Stapper, delving deep into the thrilling world of data security in Canada. From military officer to te...
News
News
Qohash, a leading data security posture management company, is pleased to announce that it has recently obtained the prestigious ISO 27001:2022 certification. This certification...
News
Qohash, a leading innovator in data security posture management, has been selected as one of the Top 100 Next-Generation Companies by the esteemed World Future Awards. This pres...
News
Leading data security posture management (DSPM) provider, Qohash, introduces data remediation features to bolster organizations’ security and risk management.
MONTR...
Product
Product
In today’s digital age, the protection of sensitive information has become more important than ever. With cyber threats constantly on the rise, individuals and organizatio...
Product
In today’s digital landscape, organizations face an ever-increasing need to protect their sensitive information from potential security threats. To address these concerns,...
Product
In this instructional video, the Qostodian Recon tool is shown to help find specific information within a file server using the custom sensitive information feature. This featur...