AstraZeneca needed to ensure that their information was secure even when collaborating with third party research organisations. We provided the specialist consultancy needed to deploy their cloud based document security solution.

Gala Coral undertook a major security programme to protect sensitive business and client information. Brandon Cross provided assistance in reviewing and simplifying their ISO27001 security policies and demonstrating how to control unstructured information using IRM technology.

The board needed certainty that the information produced and shared was only accessible to the named individuals for whom it was intended. We deployed a solution which just worked, allowing business users to work securely without having to change the way they worked.

Oracle brought us in to work on a number of key accounts to ensure successful deployment of their Information Rights Management solution. With over a decade of real world experience in data centric security no one else comes close.

 

Featured Product

  • seclore-logoFriday October 3, 2014FileSecure, from Seclore, enables organizations to control usage of information wherever it goes, both within and outside of the organization’s boundaries. The ability to remotely enforce and audit who can view, edit, copy, and re-distribute files empowers organizations to embrace mobility, Cloud and external collaboration with confidence. Easy to deploy and use, Seclore extends the security of DLP, ECM, ERP and Mail/Messaging solutions to information that move beyond the perimeter. Seclore was recently recognized by Gartner as a “Cool Vendor” and by Deloitte as one of the “50 Fastest Growing Technology Companies” due to innovations in agentless receipt of protected documents. With nearly 4 million users across 350 companies in 22 countries, Seclore is helping organizations achieve their security, privacy and compliance objectives.

Featured Customer

  • Oracle_logoFriday October 3, 2014Oracle brought us in to work on key petrochemical and pharmaceutical accounts to ensure successful implementation of their Information Rights Management document security solution. With over a decade of real world experience in data centric security, we helped the businesses better understand how their security requirements should be addressed. This necessarily involves some significant education and insight to help clients envisage how the technology will be used in practice, highlighting the superlative importance of usability, and helping them to understand some of the potential pitfalls which can result in a poor user experience and therefore low levels of adoption.

Featured Post

  • Edward SnowdenEdward Snowden - How much do you like sharing?Wednesday October 1, 2014Edward Snowden showed the world what can happen if information is not adequately protected. As an insider to the NSA (National Security Agency) he had access to very sensitive information, and while he was in the organisation that access was necessary. No doubt there would have been solid authentication and access controls in place, but if your trust is misplaced they are no security at all!