Universal Controls - Real-Time, Context-Based, Universal Enforcement

Real-Time, Context-Based, Universal Enforcement

Regardless of the different data sources, end points, and applications and systems a company has deployed, universal controls can monitor information activity across an enterprise, and evaluate business conditions against attempted data access and handling in real time. Based on policy evaluation results, universal controls can actively prevent unauthorized or inappropriate data use, educate users in real time about information activities, automate procedures to assist users, and so forth. This real-time enforcement takes account of business context, such as time of day or day of the week, the application used to access data or open a document, a user’s identity or role, the user or device location, and so on.

As an example: A policy may allow a defined class of users to access, copy or print sensitive company data, but only while using an approved spreadsheet application and only during regular business hours; in other situations, activity is automatically denied and/or users are warned. Once deployed, this policy can protect its target data regardless of the end point type or location, the operating system running, or whether the device is attached to the network or not.

Read more about this topic:  Universal Controls

Famous quotes containing the word universal:

    A universal and perpetual peace, it is to be feared, is in the catalogue of events which will never exist but in the imaginations of visionary philosophers, or in the breasts of benevolent enthusiasts.
    James Madison (1751–1836)