AstraZeneca needed to ensure that their information was secure even when collaborating with third party research organisations. We provided the specialist consultancy needed to deploy their cloud based document security solution.

Gala Coral undertook a major security programme to protect sensitive business and client information. Brandon Cross provided assistance in reviewing and simplifying their ISO27001 security policies and demonstrating how to control unstructured information using IRM technology.

The board needed certainty that the information produced and shared was only accessible to the named individuals for whom it was intended. We deployed a solution which just worked, allowing business users to work securely without having to change the way they worked.

Oracle brought us in to work on a number of key accounts to ensure successful deployment of their Information Rights Management solution. With over a decade of real world experience in data centric security no one else comes close.


Featured Product

  • Thursday December 21, 2017Seclore FileSecure enables organizations to control usage of information wherever it goes, both within and outside of the organization’s boundaries. The ability to remotely enforce and audit who can view, edit, copy, and re-distribute files empowers organizations to embrace mobility, cloud and external collaboration with confidence. Seclore was recognized by Gartner as a “Cool Vendor” and by Deloitte as one of the “50 Fastest Growing Technology Companies” due to innovations in agentless receipt of protected documents. The latest version includes the ability to edit documents securely within the browser with no need for a installed desktop component. With over 12 million users across 6000 companies in 29 countries, Seclore is helping organizations achieve their security, privacy and compliance objectives.

Featured Customer

  • Friday October 3, 2014Oracle brought us in to work on key petrochemical and pharmaceutical accounts to ensure successful implementation of their Information Rights Management document security solution. With over a decade of real world experience in data centric security, we helped the businesses better understand how their security requirements should be addressed. This necessarily involves some significant education and insight to help clients envisage how the technology will be used in practice, highlighting the superlative importance of usability, and helping them to understand some of the potential pitfalls which can result in a poor user experience and therefore low levels of adoption.

Featured Post

  • What does 'personal data' mean in the context of GDPR?Monday December 4, 2017GDPR, which comes into force on May 25th 2018, is to regulate the handling of 'personal data'. Article 4 of the regulation states: 'personal data' means any information relating to an identified or identifiable natural person ('data subject'); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.
Guide To Secure Cloud Based Web Applications