Solution Examples
Control how you monitor and manage the authorized USE of your Assets not just the access.
Every day, sensitive information is leaked without your knowledge. Organizations realize that while they won't necessarily make the headlines each time a document leaks sensitive data, they could lose a key partner, customer or lawsuit--or worse, their public image.
Stop Data Leakage.
Data Leakage is the release of confidential information from authorized users. Softection prevents data leakage by controlling the use of confidential information. For example, a user may be able to view and edit a document, but are stopped from copying the document to a USB thumb drive.
"The majority of breaches occurring in 2005 stemmed from inside the organization."
Mitigate the Risk of Lost Laptops.
Softection secures confidential information on laptops, even when not connected to the network. Confidential data is encrypted and the security policy is enforced. Digital Assets can be automatically deleted if the laptop is not connected to the network within a centrally specified timeout period. If required the data on the laptop can be scrubbed to the United States Department of Defense specifications, completely eliminating any trace of the confidential information.
Protects All Types of Digital Data and Data Repositories.
- Files of any type: example MS Word, Acrobat PDF, Excel spreadsheets, images, videos, sounds, etc.)
- TCP/IP hosts, ports and any combination (e.g. 192.168.0.*:21-25).
|
Softection secures the use of data retrieved from a data repository.
- Relational Databases.
- Mainframes.
- Document Management Systems.
|
Softection works on entire repositories of data.
Using a security setting on a "repository", all data retrieved from the repository inherits the security setting. Your enterprise can protect personal information databases, student records, human resources systems, personnel data, CRM, health records, and other sensitive information.
All techniques to circumvent Softection-DAP are automatically managed.
For example, print-screen will operate as usual, but the output will either be created as a Digital Asset and inherit the security settings of the grabbed document, or the digital asset content will appear as blank.
What users can and can't do with digital assets is configurable via a simple administration console.
A standard configuration would stop digital assets from being emailed, or sent to the internet. Softection-DAP will enforce this policy, regardless of the application being used. Therefore, hotmail, outlook, e-fax or any other application will be unable to send any digital asset to the internet or any third party.
Softection enables legal firms to lock down all sensitive information during a discovery.
The platform has the unique capability to search through a network of information and not only find confidential information, but identify who has it, where and what has been done to it. |