Workshare Protect 5 aims to remove managers from the investigative requirements and use technology to act on suspicious intent. What's more, the product helps combat accidental leaks as well as intentional data theft.
Most efforts in the security arena go toward keeping the bad guys out of the network. A threat that Workshare Protect 5 is looking to reduce and prevent, however, is the insider threat.
The biggest source of information leaks and corporate espionage comes from trusted employees. Making the situation worse is that today's managers now also have to play the role of the suspicious investigator. Enter Workshare Protect 5, which aims to remove managers from the investigative requirements and use technology to act on suspicious intent. What's more, the product helps to combat accidental leaks, as well as intentional data theft.
Workshare Protect 5 accomplishes these chores by monitoring electronic correspondence to prevent sensitive data from leaving the company. One of the primary tools offered by Workshare is the ability to remove meta-data from documents. Meta-data is the hidden information found in files, such as corrections, document chains, authors and so on. Most businesses do not realize the amount of information that may be hidden in a document's meta-data and inadvertently let the information slip through the cracks. While there are other tools on the market that perform the same task, such as the "remove hidden data" add-on for Microsoft Office, Workshare is automatic and can be customized to remove only certain elements. What's more, the product offers full tracking and reporting when it comes to managing meta-data.
Workshare also adds content filtering, discovery and alerting for further company data protection. Other features include the ability to scan the system for identity information (such as credit-card numbers or passwords), offensive words, financial information, intellectual property and regulatory violations. That capability helps Workshare become a valuable ally in the world of compliance, where fines can far exceed the costs associated with prevention.
How does Workshare Protect 5 accomplish all this? Simply put, the product is a client module that runs on a desktop system. Administrators opting for the enterprise version can create policies that dictate what information is allowed to leave the system The software then scans for confidential information (very handy for notebooks that travel) and the policies offered are granular, in the respect that documents can be controlled as to which user can see the information and to whom it can be forwarded. '
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.