2015 Emerging Vendors Details


Printer-friendly version Email this CRN article

FinalCode

HeadquartersSan Jose, CA
Founded2014
SectorSecurity
Phone855-201-8822
URLhttp://www.finalcode.com
Number of U.S. Partners6
Number of Worldwide Partners10
Recruitment Goal50 partners or less
Geographic ReachLimited international recruitment
Ideal PartnerEnterprise and Midmarket focused security solution provider
Top ExecutiveGord Boyce, CEO
Second Top ExecutiveScott Gordon, COO
Channel ExecutiveScott Gordon, COO
ProductsFinalCode delivers the ultimate file security solution that provides organizations with an easy, comprehensive and persistent means to protect sensitive files within and outside the corporate network. Available as SaaS or virtual appliance, FinalCode works with existing application, file storage, device, cloud and content management systems, and across all communication channels: trusted, untrusted, private or public. The solution allows for user-defined and corporate policy-enforced file security with strong encryption and an extensive array of granular access and usage controls, including rich auditing and the ability to remotely wipe files even after they are distributed. The company's patented CryptoEase technology streamlines files security and encryption processes without requiring the user to remember passwords and by practically eliminating key management overhead -- making implementation rapid, flexible and scalable. More so, the approach preserves user experience by integrating within existing file sharing workflow and allowing the user to work in the application they are accustomed to. As a result, organizations can confidently share files containing sensitive and regulated information while dramatically lowering data leakage, compliance and reputation risks. Since the solution is interoperable with an organization's existing enterprise content management, cloud-based file storage and collaboration systems, FinalCode affords channel partners the opportunity to benefit from data security purchase trends and re-engage with customers to examine data leakage programs and extend file access and entitlement controls.

Unedited content provided by vendors. Complete profiles not available for some companies.


Printer-friendly version Email this CRN article