PKWARE eliminates security gaps by finding, classifying, and protecting sensitive data across the entire enterprise. PKWARE provides capabilities no other product can match, allowing each organization to create a tailored data protection solution.
Our Smartcrypt demo videos provide a look at each step in the data-centric security workflow:
- Policy management
- Data discovery
- Data classification
- Protections and remediation
- Audit and reporting
The PKWARE Enterprise Manager is the central component of the PKWARE platform, allowing organizations to maintain control over sensitive data across the enterprise.
Here, you can get a look at PKWARE's administration console and see how security administrators can use it to create policies that govern how the system will identify and protect sensitive data on laptops, desktops, and servers.
PKWARE's data discovery technology uses a software agent to continuously monitor storage locations for sensitive information. Discovery patterns can be used to find all types of sensitive information within files, such as credit card numbers or social security numbers.
In this video, PKWARE identifies an Excel file that contains sensitive data (using the example of credit card numbers that require protection under PCI DSS), and then initiates the next steps in the workflow: classification and protection.
PKWARE's data classification capabilities allow organizations to find sensitive data, classify files, and apply remediation—including strong encryption—in one automated workflow.
In this video, PKWARE's automated technology identifies a PDF containing patient information that requires encryption under HIPAA. The PKWARE agent initiates metatagging, and then not only encrypts the file, but removes it from an inappropriate location and saves it in a quarantine folder.
Protection and Remediation
PKWARE provides a wide range of options for dealing with sensitive information once it has been detected. vailable actions include persistent encryption, quarantine, masking, and deletion.
Using personally identifiable information (PII) as an example, this video demonstrates PKWARE's ability to detect sensitive information and protect it using persistent encryption. You'll also see that the end user experience is unchanged—as long as a user is authorized to access a protected file, PKWARE's Smartcrypt decrypts and opens the file automatically.
Audit and Reporting
Organizations can take advantage of PKWARE's capabilities to meet their audit and compliance obligations. Classification tags greatly simplify the audit process, while PKWARE's Data Security Intelligence feature provides insight into data protection activity across the organization, making it easy to demonstrate compliance with internal policies, customer requirements, and government mandates.
This video provides a closer look at the tags that PKWARE can apply to files containing sensitive data, followed by a demonstration of PKWARE's ability to generate reports on the presence of sensitive information on user devices. The video also provides a look at another of PKWARE's remediation options—deleting unneeded files and creating audit trails to confirm deletion.