FinalCode Gives End Users Ultimate Control Over Files

Mike Vizard
Slide Show

Six E-Signature Security Requirements for Digital Transactions

Looking to give both end users and IT organizations control over files no matter where they are sent, FinalCode today announced the general availability of software that allows organizations to not only attach permissions to a file, but also delete them whenever necessary regardless of where they are or who has possession of them.

FinalCode CEO Gord Boyce says the company’s namesake software can be deployed using a virtual appliance that runs on top of an existing file system running on-premises, or it can be invoked as a cloud service. In either case, FinalCode allows end users to encrypt a document, and it enables them to delete all copies of the file no matter how many have been made or distributed, says Boyce.

Making use of agent software that is deployed on each endpoint, Boyd says end users then drag and drop a file onto a graphical representation of the agent software to attach the level of security they deem appropriate for that document. Once embedded in the file, the agent software continuously communicates back to the central FinalCode management platform.

FinalCode-Screenshot-EncryptionBoyce says rather than having to manage the encryption processes that still leave copies of files behind, FinalCode is designed to permanently delete a file whenever an organization chooses. Included in that capability is the ability to delete files not just on users’ desktops, but also files that are stored in cloud services such as Box, says Boyce.

Though IT pros push the importance of encryption, one fundamental problem is that typically, encrypted files are never actually removed. This means that any entity with the wherewithal to crack an encryption scheme may still have the opportunity to breach the file.

If organizations want to hold end users more accountable for security, they need to provide a way to enable them to apply and enforce security policies that doesn’t require constant supervision of every file by the already overtaxed IT organization.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.



Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.