Review: Workshare Keeps Documents Confidential - InformationWeek
IoT
IoT
News
News
9/28/2006
01:03 PM
50%
50%

Review: Workshare Keeps Documents Confidential

Workshare Protect 5 aims to remove managers from the investigative requirements and use technology to act on suspicious intent. What's more, the product helps combat accidental leaks as well as intentional data theft.

Most efforts in the security arena go toward keeping the bad guys out of the network. A threat that Workshare Protect 5 is looking to reduce and prevent, however, is the insider threat.

The biggest source of information leaks and corporate espionage comes from trusted employees. Making the situation worse is that today's managers now also have to play the role of the suspicious investigator. Enter Workshare Protect 5, which aims to remove managers from the investigative requirements and use technology to act on suspicious intent. What's more, the product helps to combat accidental leaks, as well as intentional data theft.

Workshare Protect 5 accomplishes these chores by monitoring electronic correspondence to prevent sensitive data from leaving the company. One of the primary tools offered by Workshare is the ability to remove meta-data from documents. Meta-data is the hidden information found in files, such as corrections, document chains, authors and so on. Most businesses do not realize the amount of information that may be hidden in a document's meta-data and inadvertently let the information slip through the cracks. While there are other tools on the market that perform the same task, such as the "remove hidden data" add-on for Microsoft Office, Workshare is automatic and can be customized to remove only certain elements. What's more, the product offers full tracking and reporting when it comes to managing meta-data.

Workshare also adds content filtering, discovery and alerting for further company data protection. Other features include the ability to scan the system for identity information (such as credit-card numbers or passwords), offensive words, financial information, intellectual property and regulatory violations. That capability helps Workshare become a valuable ally in the world of compliance, where fines can far exceed the costs associated with prevention.

How does Workshare Protect 5 accomplish all this? Simply put, the product is a client module that runs on a desktop system. Administrators opting for the enterprise version can create policies that dictate what information is allowed to leave the system The software then scans for confidential information (very handy for notebooks that travel) and the policies offered are granular, in the respect that documents can be controlled as to which user can see the information and to whom it can be forwarded. '

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
2017 State of IT Report
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends for 2018
As we enter a new year of technology planning, find out about the hot technologies organizations are using to advance their businesses and where the experts say IT is heading.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll