NC Protect augments authentication using the unique identity a file builds over time. It starts the moment a file is first saved, with its content, name, authorship and date stamps. Throughout its life cycle it gains additional transient context such as the file location or information repository and classification levels.
Access and usage rights are applied by blending traditional user permissions with granular business information such as security level or project team. Additionally, NC Protect leverages attributes such as IP address, device, browser or time of day.
NC Protect takes your data security policies and enforces them completely and transparently for each and every user and device.
DISCOVER, AUDIT & SECURE SENSITIVE INFORMATION
Locate and classify all sensitive and confidential data (PII, IP, HR / Board docs, Contracts, etc.) using one set of rules for one to multiple on-premises and cloud environments. Encrypt or quarantine docs when required. Track access to data.
Utilize dynamic file security that adjusts based on real-time comparison of user context and file content to enforce regulations and policies with configurable usage rights, custom watermarks and sharing rules/controls.
Automatically adjust access rights and control how business-critical information in chats, messages and files can be used and shared based on both user and data attributes (e.g. Is the user on the corporate network or in a public location? With whom and what is being shared?).