the finalcode platform - your preferred irm solution.pdf• autodesk autocad 2016-2010 • autodesk...

4
Information Rights Management Aſter they are SENT! Aſter they are SENT! Make files disappear Make files disappear

Upload: others

Post on 18-Mar-2020

30 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The FinalCode Platform - Your Preferred IRM Solution.pdf• Autodesk AutoCAD 2016-2010 • Autodesk AutoCAD LT 2016-2010 • Autodesk DWG TrueView 2016-2013 • Dassault SolidWorks

In fo rmat ion R ights Management• Secure multiple folders and files according to policy• Apply multiple policies per file/folder • Enforce policy online and offline • Ad hoc or template-based policy setting• Designate authorized users • Active Directory-service integration • Access duration: time or period • Authentication of users on opening FCL files • View-only, no edit or save• Edit/save only in encrypted file • Allow / deny copy, paste, screenshot • Allow / deny printing • Printing with custom watermark • Overlay screen watermark on an application window• On-demand dynamic permission change • Automatic email invitation to recipient • Restrict user device type • User template management • Multiple policy server support • Secure files in local or cloud folder • Auto-secure files in network folders • Application whitelisting • File usage audit log (supporting CEF and LEEF) and search• Remote delete, on-demand • Remote delete, unauthorized access • App and OS level file-IRM control

• FIPS 140-2 Level 1-validated • Suite-B compliant • AES 256 file encryption • RSA 2048 PKI - based user authentication • TLS/SSL communication between client and server • AWS KMS integration • Automated, secure on-boarding • Lightweight client install does not require admin privileges • Supports remote deployment tools • Web management console • Policy hierarchy aligned to organization structure • Global user management • Roles-based access control • Define function scope for user types • Custom administrator roles • Template policy management • Enforce template use by role • Restrict user and device type • Network share folder monitoring • Restrict file access by IP address • Restrict file printing by IP printer • User and device authentication • Global file activity, violation logs supporting CEF and LEEF format • Comprehensive SDK available

Gain Granular Entitlement Control

• Microsoft Excel 2016, 2013, 2010, 2007• Microsoft Word 2016, 2013, 2010, 2007 • Microsoft PowerPoint 2016, 2013, 2010, 2007 • Microsoft Access 2016, 2013, 2010, 2007 • Microsoft Visio 2016, 2013, 2010, 2007 • Microsoft Viewer Word, Excel, PowerPoint • Microsoft Windows Media • Microsoft WordPad, Paint, Notepad • Adobe Reader DC XI, X • Adobe Acrobat, Pro/Std. DC XI, X• Adobe Illustrator CS6 / CC (2017)• Adobe Photoshop CS6 / CC (2017)• OpenOffice.org Writer, Cal, Impress 4.1, 4.0 • Libre Writer, Calc, Impress 5,2, 5.1, 5.0, 4.4, 4.3, 4.2, 4.1, 4.0 • Microsoft Windows Picture and FAX Viewer, Photo Gallery, Photo Viewer • Broad Photo, Video and Music format support CAD Option: • Autodesk AutoCAD 2016-2010• Autodesk AutoCAD LT 2016-2010 • Autodesk DWG TrueView 2016-2013 • Dassault SolidWorks 2016-2013• Abbreviated list, subject to change

With FinalCode, your employees can share sensitive files internally and externally with confidence, knowing that unauthorized recipients will not have access. Better yet, your company can rapidly implement strong file protection, entitlement, and auditing capability that preserves the user experience and your investment. FinalCode’s persistent file security platform provides an easy and flexible approach allowing you to use your existing file share, ECM, cloud storage, and collaboration platforms.

Get FinalCode today. Visit the FinalCode website to schedule a demo or get a free trial license.

Extensive File IRM Coverage

Take the Next Step

Powerful Security Management

©2017 FinalCode, Inc. FinalCode, CryptoEase and the FinalCode logo, are trademarks or registered trademarks of FinalCode. Other names mentioned may be trademarks of their respective owners.

Contact Us: T: +65 6549 7000 | E: [email protected] | W: www.finalcode.com

Client for Windows OS• Windows 7 Ultimate/Professional SP1 32bit/64bit • Windows 8.1 Pro/Enterprise 32bit/64bit • Windows 10 Home/Pro/Education/ Enterprise 32bit/64bit • Windows Server 2012 R2• Windows Storage Server 2012 R2• Windows Server 2016

Client for Mac• Mac OS 10.12 Sierra

FinalCode ClientSaaS and Virtual Appliance server options are available SaaS for Cloud • Running on Amazon Web Services (AWS) Virtual Appliance (VA) for On-Premise• Hypervisor: VMware vSphere 5, 6 Windows Server 2012, 2012 R2 Hyper-V• Database: Microsoft SQL Server 2014 MySQL 5.6,5.7 Oracle Database 12c PostgreSQL 9.3,9.6

FinalCode ServerPDF Reader App for iOS• iOS 9.3 – 10.2

PDF Reader App for Android• Android 4.0, 4.1, 4.23.3, 4.4, 5.0, 5.1, 6.0, 7.0, 7.1

Network Folder Security• Windows Server 2008 R2 SP1 64bit • Windows Storage Server 2012 R2• Windows Server 2012 R2• Windows Server 2016

FIPS140-2 Level 1 CertifiedFinalCode has achieved Federal Information Processing Standards (FIPS) 140-2 Level 1 certification by the National Institute of Standards and Technology (NIST) for FinalCode Crypto Module and FinalCode Crypto Module for Mobile, which are AES256 crypto modules used in FinalCode.

After they are SENT!After they are SENT!Make files disappear Make files disappear

The FinalCode Platform

Page 2: The FinalCode Platform - Your Preferred IRM Solution.pdf• Autodesk AutoCAD 2016-2010 • Autodesk AutoCAD LT 2016-2010 • Autodesk DWG TrueView 2016-2013 • Dassault SolidWorks

Everyday we create and share data that are modifled and then sent to others.

Files are exchanged continuously beyond corporate and national borders, especially in the modern era of international specialization.

How can we ensure that files are handled safely in this global age?

FinalCode’s goal is to persistently secure files in your day-to-day business and protect them anywhere they go, within or beyond the corporate borders.

Use FinalCode to grant file access to authorized recipients, audit activity throughout the lifecycle; and modify security policies on demand.

SecureRestrict file access

Dynamic policy modification

TrackPersistently track file

activity throughout file lifecycle

Remote DeleteMake files disappearAFTER they are sent

No password Designate recipients Limit access count/duration Control print/edit Automatic file deletion on unauthorized access Print/screen watermark

Access logUnauthorized access detectionSystem operation log

Remote file deletionRemote policy modification

Advance Technologyfor strong Encryption

Confidently share files with RSA-2048 bit secure data transmission and

strong256-bit AES encryption.* FIPS 140-2 Level 1 certified

Security Policy SettingsExtensive and granular file entitlement

(open, edit, print, etc.)based on file use and confidentiality.

User OperabilityAdvanced password-less encryption

technology allows users to simply double-click to open and work with

the secure file in the users’ existing applications.

Centralized File ActivityHistory

Track and log details on who, when and where shared files are opened, modified,

printed, and remotely deleted even after files have been sent.

Visible Security Policy HistoryAll file usage is logged and availableto the file owner. No more oversight

of inappropriate security policies.

Status NotificationFile owner receives notification upon

unzuthorized access attempt.Instant alert of any unsanctioned

file usage.

Persistent Control of FilesWherever They Go

File ownership remains with the filecreator even after files have been sent.

Users can modify security policies tochange file access and permissions

at anytime.Security policy updates are instantly

reflected to the file.

Remote Delete Anytime,Anywhere

Trigger remotely delete on recipient’sdevice on demand or on access attempt

violation, even after files have beenshared. Sensitive data remains intact

even if the files were stolen or exfiltrated.

Use FinalCode to make files disappear After they are sent. It’s magic. Case 01 Protect files from negligence, internal fraud, and employee turnover

Companies and organizations lose sensitive �les regularly and sustain signi�cant damages through malicious acts, including former employee stealing �les and trading information for pecuniary motives. Auto/Remote Delete and Noti�cation option allows users to delete �les wherever they are.

Protect data leakage from negligenceSensitive information is often exposed by inadvertent emails, lost portable devices, undocumented transfers of �les, and unattended documents on printer output trays. FinalCode o�ers assurance with its patented technology to persistently secure �les with granular permissions and trigger remote deletion upon unsanctioned use.

Protect files shared with external customers and business partners

Case 03

Create “time-bomb” files

Case 02

Data loss, theft, and exploitation are pressing issues that must be resolved for industries and enterprises that collaborate mainly through sharing key sensitive information such as personal information, �nancial data or design related documents. FinalCode lets organizations easily set �le access and usage policy, track �le activity, and remotely delete any �le, anywhere.

Case 04Some documents require a time limit to be accessed, such as RFP, e-catalogues, and disclosed data based on NDA. FinalCode allows organizations to set a window of time to access the �le. The system automatically revokes access when time is up, delete the �le on demand, and send �le owner noti�cation on unauthorized access attempts.

Page 3: The FinalCode Platform - Your Preferred IRM Solution.pdf• Autodesk AutoCAD 2016-2010 • Autodesk AutoCAD LT 2016-2010 • Autodesk DWG TrueView 2016-2013 • Dassault SolidWorks

Everyday we create and share data that are modifled and then sent to others.

Files are exchanged continuously beyond corporate and national borders, especially in the modern era of international specialization.

How can we ensure that files are handled safely in this global age?

FinalCode’s goal is to persistently secure files in your day-to-day business and protect them anywhere they go, within or beyond the corporate borders.

Use FinalCode to grant file access to authorized recipients, audit activity throughout the lifecycle; and modify security policies on demand.

SecureRestrict file access

Dynamic policy modification

TrackPersistently track file

activity throughout file lifecycle

Remote DeleteMake files disappearAFTER they are sent

No password Designate recipients Limit access count/duration Control print/edit Automatic file deletion on unauthorized access Print/screen watermark

Access logUnauthorized access detectionSystem operation log

Remote file deletionRemote policy modification

Advance Technologyfor strong Encryption

Confidently share files with RSA-2048 bit secure data transmission and

strong256-bit AES encryption.* FIPS 140-2 Level 1 certified

Security Policy SettingsExtensive and granular file entitlement

(open, edit, print, etc.)based on file use and confidentiality.

User OperabilityAdvanced password-less encryption

technology allows users to simply double-click to open and work with

the secure file in the users’ existing applications.

Centralized File ActivityHistory

Track and log details on who, when and where shared files are opened, modified,

printed, and remotely deleted even after files have been sent.

Visible Security Policy HistoryAll file usage is logged and availableto the file owner. No more oversight

of inappropriate security policies.

Status NotificationFile owner receives notification upon

unzuthorized access attempt.Instant alert of any unsanctioned

file usage.

Persistent Control of FilesWherever They Go

File ownership remains with the filecreator even after files have been sent.

Users can modify security policies tochange file access and permissions

at anytime.Security policy updates are instantly

reflected to the file.

Remote Delete Anytime,Anywhere

Trigger remotely delete on recipient’sdevice on demand or on access attempt

violation, even after files have beenshared. Sensitive data remains intact

even if the files were stolen or exfiltrated.

Use FinalCode to make files disappear After they are sent. It’s magic. Case 01 Protect files from negligence, internal fraud, and employee turnover

Companies and organizations lose sensitive �les regularly and sustain signi�cant damages through malicious acts, including former employee stealing �les and trading information for pecuniary motives. Auto/Remote Delete and Noti�cation option allows users to delete �les wherever they are.

Protect data leakage from negligenceSensitive information is often exposed by inadvertent emails, lost portable devices, undocumented transfers of �les, and unattended documents on printer output trays. FinalCode o�ers assurance with its patented technology to persistently secure �les with granular permissions and trigger remote deletion upon unsanctioned use.

Protect files shared with external customers and business partners

Case 03

Create “time-bomb” files

Case 02

Data loss, theft, and exploitation are pressing issues that must be resolved for industries and enterprises that collaborate mainly through sharing key sensitive information such as personal information, �nancial data or design related documents. FinalCode lets organizations easily set �le access and usage policy, track �le activity, and remotely delete any �le, anywhere.

Case 04Some documents require a time limit to be accessed, such as RFP, e-catalogues, and disclosed data based on NDA. FinalCode allows organizations to set a window of time to access the �le. The system automatically revokes access when time is up, delete the �le on demand, and send �le owner noti�cation on unauthorized access attempts.

Page 4: The FinalCode Platform - Your Preferred IRM Solution.pdf• Autodesk AutoCAD 2016-2010 • Autodesk AutoCAD LT 2016-2010 • Autodesk DWG TrueView 2016-2013 • Dassault SolidWorks

In fo rmat ion R ights Management• Secure multiple folders and files according to policy• Apply multiple policies per file/folder • Enforce policy online and offline • Ad hoc or template-based policy setting• Designate authorized users • Active Directory-service integration • Access duration: time or period • Authentication of users on opening FCL files • View-only, no edit or save• Edit/save only in encrypted file • Allow / deny copy, paste, screenshot • Allow / deny printing • Printing with custom watermark • Overlay screen watermark on an application window• On-demand dynamic permission change • Automatic email invitation to recipient • Restrict user device type • User template management • Multiple policy server support • Secure files in local or cloud folder • Auto-secure files in network folders • Application whitelisting • File usage audit log (supporting CEF and LEEF) and search• Remote delete, on-demand • Remote delete, unauthorized access • App and OS level file-IRM control

• FIPS 140-2 Level 1-validated • Suite-B compliant • AES 256 file encryption • RSA 2048 PKI - based user authentication • TLS/SSL communication between client and server • AWS KMS integration • Automated, secure on-boarding • Lightweight client install does not require admin privileges • Supports remote deployment tools • Web management console • Policy hierarchy aligned to organization structure • Global user management • Roles-based access control • Define function scope for user types • Custom administrator roles • Template policy management • Enforce template use by role • Restrict user and device type • Network share folder monitoring • Restrict file access by IP address • Restrict file printing by IP printer • User and device authentication • Global file activity, violation logs supporting CEF and LEEF format • Comprehensive SDK available

Gain Granular Entitlement Control

• Microsoft Excel 2016, 2013, 2010, 2007• Microsoft Word 2016, 2013, 2010, 2007 • Microsoft PowerPoint 2016, 2013, 2010, 2007 • Microsoft Access 2016, 2013, 2010, 2007 • Microsoft Visio 2016, 2013, 2010, 2007 • Microsoft Viewer Word, Excel, PowerPoint • Microsoft Windows Media • Microsoft WordPad, Paint, Notepad • Adobe Reader DC XI, X • Adobe Acrobat, Pro/Std. DC XI, X• Adobe Illustrator CS6 / CC (2017)• Adobe Photoshop CS6 / CC (2017)• OpenOffice.org Writer, Cal, Impress 4.1, 4.0 • Libre Writer, Calc, Impress 5,2, 5.1, 5.0, 4.4, 4.3, 4.2, 4.1, 4.0 • Microsoft Windows Picture and FAX Viewer, Photo Gallery, Photo Viewer • Broad Photo, Video and Music format support CAD Option: • Autodesk AutoCAD 2016-2010• Autodesk AutoCAD LT 2016-2010 • Autodesk DWG TrueView 2016-2013 • Dassault SolidWorks 2016-2013• Abbreviated list, subject to change

With FinalCode, your employees can share sensitive files internally and externally with confidence, knowing that unauthorized recipients will not have access. Better yet, your company can rapidly implement strong file protection, entitlement, and auditing capability that preserves the user experience and your investment. FinalCode’s persistent file security platform provides an easy and flexible approach allowing you to use your existing file share, ECM, cloud storage, and collaboration platforms.

Get FinalCode today. Visit the FinalCode website to schedule a demo or get a free trial license.

Extensive File IRM Coverage

Take the Next Step

Powerful Security Management

©2017 FinalCode, Inc. FinalCode, CryptoEase and the FinalCode logo, are trademarks or registered trademarks of FinalCode. Other names mentioned may be trademarks of their respective owners.

Contact Us: T: +65 6549 7000 | E: [email protected] | W: www.finalcode.com

Client for Windows OS• Windows 7 Ultimate/Professional SP1 32bit/64bit • Windows 8.1 Pro/Enterprise 32bit/64bit • Windows 10 Home/Pro/Education/ Enterprise 32bit/64bit • Windows Server 2012 R2• Windows Storage Server 2012 R2• Windows Server 2016

Client for Mac• Mac OS 10.12 Sierra

FinalCode ClientSaaS and Virtual Appliance server options are available SaaS for Cloud • Running on Amazon Web Services (AWS) Virtual Appliance (VA) for On-Premise• Hypervisor: VMware vSphere 5, 6 Windows Server 2012, 2012 R2 Hyper-V• Database: Microsoft SQL Server 2014 MySQL 5.6,5.7 Oracle Database 12c PostgreSQL 9.3,9.6

FinalCode ServerPDF Reader App for iOS• iOS 9.3 – 10.2

PDF Reader App for Android• Android 4.0, 4.1, 4.23.3, 4.4, 5.0, 5.1, 6.0, 7.0, 7.1

Network Folder Security• Windows Server 2008 R2 SP1 64bit • Windows Storage Server 2012 R2• Windows Server 2012 R2• Windows Server 2016

FIPS140-2 Level 1 CertifiedFinalCode has achieved Federal Information Processing Standards (FIPS) 140-2 Level 1 certification by the National Institute of Standards and Technology (NIST) for FinalCode Crypto Module and FinalCode Crypto Module for Mobile, which are AES256 crypto modules used in FinalCode.

After they are SENT!After they are SENT!Make files disappear Make files disappear

The FinalCode Platform