- Sep. 12, 2012 - SAN FRANCISCO BAY AREA, Calif. --
Encryption is an excellent security safeguard, but it is not the answer. Encryption is one component of providing a “safe harbor” for a company’s data. The other component is assuring that your data is managed on a “need to know” basis. Access management is critical to effectively protecting data. We believe the most effective product on the market today is N2K by InfoAssure, Inc. Need2Know®(
N2K) protects information (data objects) based on content and user access policy at the point of origin/creation. N2K uses patented cryptographic techniques to create and bind N2K labels (asymmetric key pairs) to the information object and subsequently allows sharing of the protected information by securely distributing N2K labels to enrolled end-users (or devices) based on the individual user's role/duty and authorizations. The information encryption is persistent and protects the information object as it is stored (data at rest) and as it transits networks/devices (data in transit/mobile data). Contact us Today.