Meta Byte arms enterprises with award winning data protection technology
The company will use RightsWATCH to enable its customers to protect data by automating data classification with ease. Now customers can also protect their data outside of the organization and enhance their DLP initiatives.
- (1888PressRelease) September 04, 2014 - Meta Byte Technologies, the next generation technology consulting company has announced the launch of Watchful Software's RightsWATCH 6.0, an award winning data-centric information security solution in the Middle East. This newest version extends RightsWATCH's leading-edge information protection capabilities to strengthen the dynamic watermarking and automatic classification policies on Mobile devices. Companies can now take dual benefit of Data Classification and Enterprise Rights Management (ERM) enhancing the user experience for enterprise mobile strategy.
RightsWATCH 6.0 also extends support for Arabic language. "This means, if the content in the e-mail, document, Excel sheet, or PowerPoint presentation to be protected, is in Arabic language, automated classification policies can be applied," explains Salil Dighe, the CEO at Meta Byte Technologies. "All these policies can be centrally defined and thus, RightsWATCH 6.0 simplifies the manageability of the rights management server, further enabling organizations to better utilize RMS and increase the ROI on MS RMS investments."
According to Dighe, generally organizations invest in two solutions for data protection - this includes classification and tagging, and enterprise rights management. RightsWATCH is the only solution which allows organizations to seamlessly integrate both these areas and save costs as opposed to investing in two different technologies. "This reduces capital expenditure and operational cost, thus significantly impacting the overall IT security efficiency. At the same time, it also creates awareness on the organizations' data protection strategies within the end-user community," adds Dighe.
RightsWATCH 6.0 makes it even easier to consume RMS protected files, such as those from Microsoft Office and others, on the mobile device regardless of origin (email, internet, file shares, and so on). The enhanced features are currently available for iOS and Android devices, offers integration with key MDM vendors, thus making it easier for companies to get a fast ROI by extending the information security paradigm to the mobile platforms with little additional effort.
Meta Byte Techologies will use RightsWATCH 6.0 to provide its users and customers the very best user experience and convenience, by allowing them to fully handle RMS-protected emails as well as Office and PDF on their smartphones and tablets. "For regulatory, compliance, and audit enhancements, RightsWATCH 6.0 now allows dynamic watermarks to be automatically added to MS Office and PDF files. The location of headers, footers and watermarks is customizable by administrators and can contain not only pre-defined text such as an information classification, but also real-time variables such as the user email and username, IP address, or date/time," explains Joao Esteves, the Regional Sales Director for EMEA at Watchful Software.
Dighe further adds that dynamic watermarking reminds users of the document classification, such as "Company Confidential", and the user-specific information shown on the document acts as a deterrent to unauthorized redistribution of the document. If a printed copy of a sensitive document shows up someplace it shouldn't - the source of unauthorized redistribution can be determined by simply looking at the watermark.
"RightsWATCH is a state-of-the-art data-centric information security solution that ensures that sensitive information can only be used by those that have express authority to do so. Even if sensitive data is leaked, it is rendered useless to unauthorized parties that may acquire it.
Leveraging Data Classification, Information Rights Management and Data Loss Prevention in a single solution, RightsWATCH keeps sensitive data safe and secure regardless of whether it is at rest, in motion, or in use - even if it's totally outside your network perimeter," concludes Dighe.
###
space
space