SHARE
Facebook X Pinterest WhatsApp

FinalCode Gives End Users Ultimate Control Over Files

Six E-Signature Security Requirements for Digital Transactions Looking to give both end users and IT organizations control over files no matter where they are sent, FinalCode today announced the general availability of software that allows organizations to not only attach permissions to a file, but also delete them whenever necessary regardless of where they are […]

Written By
MV
Mike Vizard
Apr 14, 2015
Slide Show

Six E-Signature Security Requirements for Digital Transactions

Looking to give both end users and IT organizations control over files no matter where they are sent, FinalCode today announced the general availability of software that allows organizations to not only attach permissions to a file, but also delete them whenever necessary regardless of where they are or who has possession of them.

FinalCode CEO Gord Boyce says the company’s namesake software can be deployed using a virtual appliance that runs on top of an existing file system running on-premises, or it can be invoked as a cloud service. In either case, FinalCode allows end users to encrypt a document, and it enables them to delete all copies of the file no matter how many have been made or distributed, says Boyce.

Making use of agent software that is deployed on each endpoint, Boyd says end users then drag and drop a file onto a graphical representation of the agent software to attach the level of security they deem appropriate for that document. Once embedded in the file, the agent software continuously communicates back to the central FinalCode management platform.

FinalCode-Screenshot-EncryptionBoyce says rather than having to manage the encryption processes that still leave copies of files behind, FinalCode is designed to permanently delete a file whenever an organization chooses. Included in that capability is the ability to delete files not just on users’ desktops, but also files that are stored in cloud services such as Box, says Boyce.

Though IT pros push the importance of encryption, one fundamental problem is that typically, encrypted files are never actually removed. This means that any entity with the wherewithal to crack an encryption scheme may still have the opportunity to breach the file.

If organizations want to hold end users more accountable for security, they need to provide a way to enable them to apply and enforce security policies that doesn’t require constant supervision of every file by the already overtaxed IT organization.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.