METADATA CLEANING HAS EVOLVED
NOW YOU CAN DETECT RISK AND PREVENT DATA LOSS
Workshare Secure enables firms to prevent data loss by monitoring and protecting its entire mail flow. It detects potential risks in terms of sensitive data held in files and flags unusual sharing behaviour. Depending on the rules that are set, appropriate action is automatically taken to ensure data is never sent to the wrong people.
Security that won’t hold you up
Cleaning documents of metadata is instantaneous with Workshare Protect. The solution is ultrafast and cleans files shared via email or a DMS in less than a second - that’s from the desktop or on a mobile. Now it’s also possible to guard against accidental or malicious sharing of matter files. Workshare Secure can identify which matter a file belongs to and ensure the appropriate outside counsel distribution guidelines are enforced before sharing takes place. This is pre-set and invisible to users, so it doesn’t slow them down.
Workshare Secure operates when your files are at their most vulnerable i.e. before they are shared with a third party. Files are protected when they are attached to email or uploaded to cloud file sharing sites, on the desktop or via a mobile device.
Identify risk and manage exposure
Now, it’s easier to demonstrate control for outside counsel guidelines. In addition to applying policy, you can monitor sharing activity to identify anomalous user behaviour. We provide user reports to flag unintentional and unauthorized sharing on any channel. The reporting and analytics can be combined into any BI or Risk Reporting tool alongside your other threat management and risk reporting solutions.
Centralized threat protection
Workshare’s intelligent rules engine looks for security markers and other information added to files by existing control solutions, like your Document Management System. There’s no need to change user behavior or manage policy in multiple places. Get immediate insight and protection for the files and the data that is leaving your business.
Metadata cleaning has evolved – now you can detect risk and prevent data loss
Technical Specs: Protect Server
Server with 2 virtual processing cores, 4 GB RAM and 60 GB HDD storage
Recommended requirements: Server with 4 virtual processing cores, 8 GB RAM and 120 GB HDD storage
Windows Server 2012 R2
Certified to work with:
Microsoft Exchange 2016, 2013, and 2010 Microsoft SQL Server 2016, 2014, and 2012
Technical Specs: Protect Desktop
MS Windows 7 SP1, 8.1 and 10 (32-bit and 64-bit)
2016 (32-bit and 64-bit); 2013 (32-bit); 2013 SP1 (32-bit); 2010 SP2 (32-bit)
MS Outlook 2016 (32-bit and 64-bit) MS Outlook 2013 (32-bit) and 2013 SP1 (32-bit) MS Outlook 2010 SP2 (32-bit) IBM Lotus Notes 9.0 and 9.0.1
MS Edge, MS Internet Explorer 11, Chrome, Firefox
XenApp and XenDesktop with Microsoft Windows Server
NetDocuments, iManage, OpenText, Worldox, Microsoft SharePoint
Technical Specs: Risk Analytics
Minimum requirements: Server with 2 virtual processing cores, 4 GB RAM and 60 GB HDD storage
Server with 4 virtual processing cores, 8 GB RAM and 120 GB HDD storage
Windows Server 2012 R2 .Net 4.5.2 preinstalled Internet Explorer 11+, Google Chrome, or Mozilla Firefox
80, 443 opened on the local machine firewall for admin access Microsoft SQL Server 2014