Products and Services
Why utilize ESX?
Case Study: stolen data
Although the court ordered that the employee pay $11,500 in fees, the company has
not been able to collect this money and is currently pursuing citations to discover
assets against the thief. Moreover, there is no way to prove whether the database
was destroyed other than the employee's affidavit stating that he had done so. .
ESX - Enforced Security Extender
Protect data in Microsoft ASP.NET and Microsoft SharePoint applications
Converting line of business applications to .NET is an excellent start towards regulatory compliance and enhanced security. After your applications are converted using ReGen, utilize the Enhanced Security Extender to apply content security to data. ESX utilizes Windows Rights Management technology to prevent unauthorized users from accidentally or maliciously reading confidential or sensitive content.
ESX works by encrypting data as it is delivered via web services. The rules and permissions are transmitted with the data so that the security policies you attach to the data, follow it no matter where it goes. Authorized users are allowed to open the content using a secured browser application that enforces read, print, and save permissions. Unauthorized users who receive the content will not be able to open it.
The process is seamless to end users. Authorized users see a small header on the top of protected web pages and documents that are protected. This header notifies them that the documents are protected and informs the users who to contact if they need help opening the file.
ESX allows enterprises to track where data goes as well as who has opened it. The enhanced reporting and auditing is essential to the enforcement of business policies in a world where data has become more accessible and more mobile.
Visit ProtoGroup's partner, GigaTrust at www.gigatrust.com.