Blog

FinalCode keeps files safe wherever they go

Posted by:

Startup FinalCode secures files so permissions that protect them follow them around even when they are accessed outside secured networks.

The company’s FinalCode platform encrypts files and imposes restrictions on who can access them, when, for how long and with what privileges. So a person could be allowed to read a document but not copy and paste it, be allowed to open it only twice and only for 24 hours.

The company offers its platform as software entirely under control of the customer or as a service in which FinalCode handles the server side.

That is a big advantage for businesses that want this type of protection but don’t want to deal with the key management and infrastructure, says Eric Ogren, principal analyst for the Ogren Group. “They don’t even see the keys,” he says. “They can if they really want to, but why would they want to.” So the problems of scaling the number of files that are encrypted are handled by the service, not corporate staff.

To read this article in full or to leave a comment, please click here

0


About the Author

We offers a proactive approach to IT support, Managed IT Services, Hosted Cloud Services, and IT Project Management. We are focused on anticipating and mitigating any IT infrastructure problems you might incur. We offer the most unique blend IT project consulting, complete cloud-based services, and network/server management techniques to provide a customized solution for any size business. We are the premier provider of Managed IT Services, IT Support Services, Hosted Cloud Servers, Hosted Microsoft Exchange Email, Hosted VoIP PBX and Outsourced IT solutions. We service Texas from our main offices in Austin, Dallas, Houston and San Antonio. Our unique blend of computer networking services, cloud-based offerings, and professional IT services are provided by certified IT consulting professionals. We strive to be your one source for all technology guidance, support, hardware, software, and telephony. Using cutting edge network management tools and expertise, We will monitor your company’s network activity 24x7x365 in an effort to correct emerging issues well before they escalate to a level that forces business as usual to cease.

# #