Protect Vital Data
Control how you monitor and manage the authorized USE of your data and not just the access.

Looking Inside-Out.
IT security has combated outside attacks using antivirus software for PCs and networks and anti-spam and anti-spyware software for e-mail. Your security emphasis must now look inside-out. Traditional 'access controls' provide little ability to monitor, check or stop internal data theft and leakage of sensitive information. Your data security is highly vulnerable as these do little to protect your organization from blocking unauthorized use/access, inappropriate changes and outright theft of data.

The real security culprits underscore the common theme that laptops, pc's, electronic documents and their file formats are not secure. This insecurity comes in many forms: lack of restrictions on e-mail or printing; exposing attributes, such as track changes or server names; revealing privacy data, such as identities or financial records; converting formats between PDF and Office.

Softection DAP is the final link in IT Control and Enterprise Security.
Managing the behavior of the User and the data object. Softection's patented process keeps your digital assets safe and secure. It ensures that your users are doing the right thing and under the right conditions. Softection steps up and controls the use of information and eliminates unauthorized copying, printing, screen-grabbing or sharing of company assets. DAP is transparent to the user, as long as they are not breaking the security policy, they never know DAP exists. Softection also provides a detailed audit trail when they are not.

Traditional 'access controls' provide little ability to monitor, check or stop internal data theft and leakage of sensitive information. Your data security is highly vulnerable as these do little to protect your organization from internal attacks on IT systems and outright theft of data.

Exceptional Audit Trail and Proof of Data Integrity.
  • Eliminates 'Change Management' problems as objects are monitored in addition to Users
  • Identifies confidential information and protects it
  • Sets security levels on individual files or entire databases
  • Activates your custom security level at an individual asset level
  • Logs all actions on data in a tamper proof forensic log
  • Alerts unauthorized employees of unusual activity
  • Works when unplugged from the network in real time - application independent

Softection DAP Dual Stage Operation.
Organizations have found out the hard (and expensive way) that a file format doesn't remove risky information leaks. It only masks them. File formats lull users and IT managers into a false sense of security. The only true way to stop digital asset, data and document leaks is to protect the objects use independent of file format and user access.

Stage 1: Identify & Encrypt.
Continuous Monitoring With No Noticeable Impact on System Performance. Critical information is identified and then the information is encrypted as a first basic step to securing it. From that point on, DAP operating alongside the operating system, and underneath applications, traps and logs all access and use of the data. By all access, we mean all. Copies, prints, screen shots, emails - they are all trapped in real time. At its simplest level, encryption and logging provide an organization with a level of control of its critical information unavailable except from the most sophisticated of access systems.
  • Encrypted to RSA & Blowfish industry standard.
  • Sanitization to US D.O.D. standards.
  • All client server communication uses SSL.
  • Integrated with LDAP and Active Directory.

Stage 2: Set the Rules.
Administrators can enforce particular allowable actions to information and Users. For example, a CEO's Personal Assistant may be able to print a Board paper, but only on the specific printer in his office.
  • Intercepts ALL attempts to view, modify, move or copy information, including screen grabbing.
  • Protection works beneath the application layer, protecting any type of digital asset.
  • DAP works on all file types and data repositories and accommodates Global and specific Business usage rules.

Protect all of your Digital and Data Assets.

Softection DAP is not application dependent so it works will ALL of your digital/data objects. Every thing digital is protected. It monitors and protects digital items such as Word documents or pictures, films, PDF files, Excel databases, and the list goes on! If it's digital, it's protected!

 

Privacy Policy | Acceptable Use Policy | Site Map
Copyright © 2008 MosaicCRM. All rights reserved.