Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Lenovo GoChannelFirst The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

Review: Covertix's Remarkable 'Agentless' Security Locks Data Tight

The latest version of Covertix's file security tool supports SharePoint and smartphones and grants broader access to security policies.

Back 1   2   3   ... 6 Next


Living up to its name, SmartCipher also permits the creation of rules for operations permitted on data within protected files. For example, users might be granted the ability to view a list of names and addresses but prevented from copying, deleting or printing the list, copying, renaming or forwarding the file, or saving it with a new name. The software can even prevent printing or capturing the screen while a protected file is visible. Files also can be protected based on their network or domain of origin, device or MAC address on which they reside, and other factors. Rules also can apply if certain content is added to a file at any time during its lifetime. "Regardless of the location of the file, if I created a policy that [kicks in] if the words 'top secret' appear [in the file], that file is automatically protected," said Kasan.

Back 1   2   3   ... 6 Next

sponsored resources