Seclore, a browser-based data-centric security solution, announced this month the launch of a complete agent-less Enterprise Digital Rights Management (EDRM) solution, giving companies the ability to leverage the full power of data-centric security without requiring downloads or agent installs.
The need to share information across and outside of the organization is fundamental to doing business. Current collaboration tools such as e-mail and file-sharing services typically focus on securing the tool, rather than attaching security policies to the data itself.
Seclore’s enterprise-grade data-centric security solution enables organizations to seamlessly secure and audit the usage of any type of information wherever and however it travels. The ability to control who can access a file, what they can do with that file (view, edit, screen share, cut/paste), from which device/location, and for how long, goes well beyond traditional encryption to ensure files remain secure and monitored throughout the collaboration process.
The new release from Seclore takes data-centric even one step further. Organizations are now able to protect, utilize, audit and manage rights from a browser, eliminating the need for the recipient to jump through hoops to utilize rights management.
With this release, Seclore is also adding a host of powerful new features and integrations, including:
Automated permission requests: Permission requests are automatically created when an e-mail is forwarded.
Enhanced file dashboard and activity search: Single unified dashboard with robust search capabilities for viewing and managing data.
Integration with Microsoft SharePoint 2016: Users can seamlessly create, transfer and protect documents across the entire Office 365 environment.
New support for Outlook Web Access: Enterprises using the Office 365 cloud can protect their email attachments on any device using their Office 365 account through their web browser, allowing users to define granular permissions on the protected attachments and new users get on-boarded automatically.
Users can define granular permissions on protected attachments and new users get on-boarded automatically.
One time authentication: Both internal and external users authenticate only once after installation.