Granular, Item-level Security Ensures Secure Collaboration

NC Protect augments authentication using the unique identity a file builds over time. It starts the moment a file is first saved, with its content, name, authorship and date stamps. Throughout its life cycle it gains additional transient context such as the file location or information repository and classification levels.

Access and usage rights are applied by blending traditional user permissions with granular business information such as security level or project team. Additionally, NC Protect leverages attributes such as IP address, device, browser or time of day.

NC Protect takes your data security policies and enforces them completely and transparently for each and every user and device.


  • Classify content based on the sensitivity of its contents
  • Adjust protection based on file and user context – including email recipients
  • Apply business policies to files as they move between people and locations
  • Encrypt individual files only when the situation requires
  • Change file protection when the usage context changes
  • Limit details of files and properties so users can’t discover security policies
  • Add a custom watermark to Word, PowerPoint, Excel and PDF documents