Protect Crypto to be bundled with the firm's Protect Premium client
Content protection firm Workshare has unveiled its new range of tools which it claims will make it easier for organisations to deploy encryption protection.
The Workshare Protect Crypto module will be bundled with the vendor's Workshare Protect Premium data loss prevention client, as part of the latest version of its Unified Content Protection suite.
It includes full disk encryption with further options to encrypt local volume or specific network drives, files and folders.
Enterprises can also choose whether to encrypt data dragged onto removable media, and there are integration capabilities with Workshare partners' email products including Secure Computing, PGP and Cisco/IronPort.
"It gives our customers immediate coverage on their most visible vectors of attack," argued general manager of Workshare's content protection group, Brian Spector. "Visionaries in the market recognise that encryption in itself won't solve all your problems, you still need content analysis to decide what sort of encryption to employ – these need to be content-based decisions."
Content protection firm Workshare has unveiled its new range of tools which it claims will make it easier for organisations to deploy encryption protection.
The Workshare Protect Crypto module will be bundled with the vendor's Workshare Protect Premium data loss prevention client, as part of the latest version of its Unified Content Protection suite.
It includes full disk encryption with further options to encrypt local volume or specific network drives, files and folders.
Enterprises can also choose whether to encrypt data dragged onto removable media, and there are integration capabilities with Workshare partners' email products including Secure Computing, PGP and Cisco/IronPort.
"It gives our customers immediate coverage on their most visible vectors of attack," argued general manager of Workshare's content protection group, Brian Spector. "Visionaries in the market recognise that encryption in itself won't solve all your problems, you still need content analysis to decide what sort of encryption to employ – these need to be content-based decisions."
0 comments:
Post a Comment Subscribe to Post Comments (Atom)