ElevenPaths Metashield Protector
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

Shortage of inhouse IT engineers

High costs of IT personnel

Values

Reduce Costs

Enhance Staff Productivity

ElevenPaths Metashield Protector

Preventative Solutions Against Leaking Sensitive Information

Description

Metashield Protector protects documentary environments using analysis, filters and metadata processing, providing organizations with the highest level of control over their information. Features: Innovation Centralized management of metadata integrated in corporate security policies. Versatility A large number of supported formats including the processing of iWorks extensions. Made to measure Individualized installation station by station or in bulk using the Active Directory. Quality Compliance with the regulations for personal information protection, PCI DSS, HIPAA, etc. Continuity Active prevention to run a constant cleaning service. Benefits:
  • Prevention and detection of leaks of sensitive information resulting from metadata hidden in documents.
  • Application of corporate homogeneous prevention policies.
  • Control and maximum protection of sensitive information that an organization could leak.
  • Reduced economic and reputational impact resulting from the malicious use of metadata.
  • Management of hidden information associated with the documents: control of the processing and application profi les on the required extensions.
Stand-Alone Ideal for professionals and SMEs Perform an individual and customized management on the type of treatment that you want to apply to the metadata. Set your own rules for any document and multimedia fi les that you choose, and put them into practice to easily protect your information. Corporative + Console Added value for large organizations. Administer, centralize and control the application of corporate security policies. Get real time information on statistical results by incorporating the Metashield Protector Administration Console and control hidden information that could by leaked by your organization’s network.