Lock it down: "Connected workers" means sensitive information is traveling everywhere
So much information is going to PDAs, cell phones, wirelessly connected remote PCs, thumb drives, and dozens more devices—how can the person signing the Sarbanes-Oxley report be certain they know what is out there and where it is? Or where it's going?
When it comes to customer data, patient records, and personal data, security specialist InDorse Technologies offers this advice: Find out where it is, lock it down, and track where it goes.
"Many document security solutions are only partially effective because they rely on getting workers to understand the technical nuances and security processes. InDorse has more intuitively adapted to this reality than many competitive plays," says Scott Crawford of Boulder, Colo.-based Enterprise Management Associates (EMA), which analyzes the IT management market.
While not every piece of information in an organization's IT system would be considered "sensitive" or mission-critical, "There are classes of work product that would be categorized as "not for everyone," says Jeff Hutchings of Contour Data Solutions Group , a leading system integrator. "Volumes of regulatory rules have been published from the medical community to define and defend certain kinds of information from being publicly consumed [e.g., HIPAA, JAHCO, ACCA]. Sarbanes-Oxley has established rules and tests to ensure that financial information is protected from being intentionally modified, and the sources go unchecked."
Hutching says Contour Data Solutions hasn't found any product other than InDorse with the ability to enable Contour's customers to both track and protect all of their sensitive documents and work products.
The InDorse Technologies solution set delivers three capabilities through Web services and an open environment that works seamlessly with Microsoft, Adobe, and other popular document management tools.
Says Rob Marano, CEO, InDorse Technologies "[We] recognize that most organizations don’t know what they're storing, where it is, and who is accessing it. We show them where to find it, classify what it is, lock down who can access it, modify it, print it, and send it. We also provide ongoing protection and audit reporting capability—visibility most organizations never had before."
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.