A Guest Blog Post by Watchful Software.
May 27, New York Times:
Jawbone Accuses Fitbit of Stealing Information by Hiring Workers Away
June 1, Credit Union Times:
Email Data Breach Costs $1.3 Million
September 23, Becker’s Health IT &CIO Review:
Insider data breach: Former CVS employee compromises data on nearly 55k individuals
The headlines say it all! CISO’s and CSO’s are constantly telling us this is what keeps them awake at night!
Watchful Software created RightsWATCH to address all of these issues. Hacking the perimeter, data breaches, whether malicious or non-malicious, whether from an insider or from an external source, all are addressed by RightsWATCH keeping your unstructured data protected at all times.
RightsWATCH takes a data-centric approach to protecting your unstructured data (such as emails, documents, spreadsheets, engineering drawings, etc.) and in protecting against Data Leakage, enforcing compliance through an automated data classification process without interrupting the user’s normal work flow.
RightsWATCH follows a 5 step approach to protecting your company’s sensitive data as follows:
RightsWATCH protects unstructured sensitive data from being accessed by those who are not authorized to have it. RightsWATCH is the solution which both addresses the insider threat and the external data breach. In the event of either a malicious or non-malicious breach, your sensitive unstructured data is secured from access by those who should not have access to it. RightsWATCH is currently installed in leading world banking operations; is being used by leading semiconductor manufacturers; is installed in the Oil and Gas industry; has extensive exposure in Healthcare, Telecommunications, Transportation and Defense. RIghtsWATCH is the CISO’s and CSO’s real answer allowing them a restful night’s sleep!
About Watchful Software
Watchful Software was formed in 2012 to address the requirement to protect an organization’s most critical asset after its people – it’s information. The company is staffed by industry executives with decades of systems, software, networking, security, and compliance experience to address the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, Watchful Software has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems or can handle sensitive information, thereby protecting against the massive economic and competitive damage often done by cyber terrorists and information thieves. Learn more at www.watchfulsoftware.com