Easy To Implement & Administrate
Control how you monitor and manage the authorized USE of your Assets not just the access.

Affordable For Any Size of Organization. According to an international study by research company Vanson Bourne, up to 75 percent of all corporate documents may contain legally sensitive information. However, less than 10 percent of the users are aware of the potential risks and liabilities of inadvertent disclosure of information through documents containing rogue information hidden in document metadata.

Implementing Softection DAP is as simple as identifying known intellectual property (digital assets) then reviewing and refining the use and access of these digital assets. The Softection DAP Client supports Windows NT4, 2000, XP and 2003. The Softection DAP Server supports Windows 2000 Server and Windows 2003 Server.

Phased or Big Bang Approach.
Totally flexible to meet your time lines and compliance culture. Easy-to-follow four-step process:
  • Step 1 - Collection
    Determine your highly sensitive files (digital assets) and let DAP log the way these digital assets are accessed and used in the organization.
  • Step 2 - Analysis
    Reviewing the DAP logs will allow the business management to determine the most appropriate way for digital assets to be used, making them more or less accessible.
  • Step 3 - Setting Rules
    By defining business rules using DAP's simple admin interface, control is gained over who should be permitted to do what with your organization's Digital Assets, and allow further fine-tuning to the business rules already in place.
  • Step 4 - Implementation
    By implementing the business rules that have been set, DAP will enforce these rules in a proactive manner, and create tracking logs to document their effectiveness.

Administration - No IT Management required.
Security settings for confidential information can be completed by individual department. Softection DAP can be rolled out to a division, department or throughout the organization. If an organization has an immediate need to secure a particular set of information, they can start there. For instance, DAP can be rolled out to protect just Personnel data, then, as more security concerns arise throughout the enterprise, DAP can be expanded to implement further security policies.

 

Privacy Policy | Acceptable Use Policy | Site Map
Copyright © 2008 MosaicCRM. All rights reserved.