Workshare Secure

METADATA CLEANING HAS EVOLVED
NOW YOU CAN DETECT RISK AND PREVENT DATA LOSS

Workshare Secure enables firms to prevent data loss by monitoring and protecting its entire mail flow. It detects potential risks in terms of sensitive data held in files and flags unusual sharing behaviour. Depending on the rules that are set, appropriate action is automatically taken to ensure data is never sent to the wrong people.

Security that won’t hold you up

Cleaning documents of metadata is instantaneous with Workshare Protect. The solution is ultrafast and cleans files shared via email or a DMS in less than a second - that’s from the desktop or on a mobile. Now it’s also possible to guard against accidental or malicious sharing of matter files. Workshare Secure can identify which matter a file belongs to and ensure the appropriate outside counsel distribution guidelines are enforced before sharing takes place. This is pre-set and invisible to users, so it doesn’t slow them down.

Security everywhere

Workshare Secure operates when your files are at their most vulnerable i.e. before they are shared with a third party. Files are protected when they are attached to email or uploaded to cloud file sharing sites, on the desktop or via a mobile device.

Identify risk and manage exposure

Now, it’s easier to demonstrate control for outside counsel guidelines. In addition to applying policy, you can monitor sharing activity to identify anomalous user behaviour. We provide user reports to flag unintentional and unauthorized sharing on any channel. The reporting and analytics can be combined into any BI or Risk Reporting tool alongside your other threat management and risk reporting solutions.

Centralized threat protection

Workshare’s intelligent rules engine looks for security markers and other information added to files by existing control solutions, like your Document Management System. There’s no need to change user behavior or manage policy in multiple places. Get immediate insight and protection for the files and the data that is leaving your business.

Metadata cleaning has evolved – now you can detect risk and prevent data loss

Technical Specs: Protect Server

Hardware:

Minimum requirements:

Server with 2 virtual processing cores, 4 GB RAM and 60 GB HDD storage

Recommended requirements: Server with 4 virtual processing cores, 8 GB RAM and 120 GB HDD storage

Software:

Windows Server 2012 R2

Certified to work with:

Microsoft Exchange 2016, 2013, and 2010 Microsoft SQL Server 2016, 2014, and 2012

Technical Specs: Protect Desktop

Operating System:

MS Windows 7 SP1, 8.1 and 10 (32-bit and 64-bit)

MS Office: 

2016 (32-bit and 64-bit); 2013 (32-bit); 2013 SP1 (32-bit); 2010 SP2 (32-bit)

Email:

MS Outlook 2016 (32-bit and 64-bit) MS Outlook 2013 (32-bit) and 2013 SP1 (32-bit) MS Outlook 2010 SP2 (32-bit) IBM Lotus Notes 9.0 and 9.0.1

Browsers:

MS Edge, MS Internet Explorer 11, Chrome, Firefox

 

Citrix:

XenApp and XenDesktop with Microsoft Windows Server

DMS Integrations:

NetDocuments, iManage, OpenText, Worldox, Microsoft SharePoint

Technical Specs: Risk Analytics

Hardware:

Minimum requirements: Server with 2 virtual processing cores, 4 GB RAM and 60 GB HDD storage

Recommended requirements:

Server with 4 virtual processing cores, 8 GB RAM and 120 GB HDD storage

Software:

Windows Server 2012 R2 .Net 4.5.2 preinstalled Internet Explorer 11+, Google Chrome, or Mozilla Firefox

Ports:

80, 443 opened on the local machine firewall for admin access Microsoft SQL Server 2014