Lock it down: "Connected workers" means sensitive information is traveling everywhere

07/02/2008


So much information is going to PDAs, cell phones, wirelessly connected remote PCs, thumb drives, and dozens more devices—how can the person signing the Sarbanes-Oxley report be certain they know what is out there and where it is? Or where it's going?
When it comes to customer data, patient records, and personal data, security specialist InDorse Technologies offers this advice: Find out where it is, lock it down, and track where it goes.
"Many document security solutions are only partially effective because they rely on getting workers to understand the technical nuances and security processes. InDorse has more intuitively adapted to this reality than many competitive plays," says Scott Crawford of Boulder, Colo.-based Enterprise Management Associates (EMA), which analyzes the IT management market.
While not every piece of information in an organization's IT system would be considered "sensitive" or mission-critical, "There are classes of work product that would be categorized as "not for everyone," says Jeff Hutchings of Contour Data Solutions Group , a leading system integrator. "Volumes of regulatory rules have been published from the medical community to define and defend certain kinds of information from being publicly consumed [e.g., HIPAA, JAHCO, ACCA]. Sarbanes-Oxley has established rules and tests to ensure that financial information is protected from being intentionally modified, and the sources go unchecked."
Hutching says Contour Data Solutions hasn't found any product other than InDorse with the ability to enable Contour's customers to both track and protect all of their sensitive documents and work products.
The InDorse Technologies solution set delivers three capabilities through Web services and an open environment that works seamlessly with Microsoft, Adobe, and other popular document management tools.
Says Rob Marano, CEO, InDorse Technologies "[We] recognize that most organizations don’t know what they're storing, where it is, and who is accessing it. We show them where to find it, classify what it is, lock down who can access it, modify it, print it, and send it. We also provide ongoing protection and audit reporting capability—visibility most organizations never had before."





No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Intelligent, efficient PLC programming: Cost-saving programming languages are available now; Automation system upgrades; Help from the cloud; Improving flow control; System integration tips
Smarter machines require smarter systems; Fixing PID, part 3; Process safety; Hardware and software integration; Legalities: Integrated lean project delivery
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
PLCs, robots, and the quest for a single controller; how OEE is key to automation solutions.
This article collection contains several articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Special report: U.S. natural gas; LNG transport technologies evolve to meet market demand; Understanding new methane regulations; Predictive maintenance for gas pipeline compressors
Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again