Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/21/2015
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Watchful Software Showcases New Version of RightsWATCH at RSA

Version 6.6 takes center stage at the RSA Conference at North Hall, booth #3026.

Medford, NJ, 21st April 2015 Watchful Software, a leading provider of data-centric information security solutions, today announced the release of version 6.6 of RightsWATCH, the company’s award winning information security solution. The latest release of RightsWATCH is now available and brings deeper capabilities to address GRC initiatives, enhanced policy management and enterprise collaboration via SharePoint.

RightsWATCH ensures that sensitive information is identified, classified, marked/tagged, and can only be used by those who have express authority to do so. Even if data is leaked or stolen, it is rendered useless to unauthorized parties that may acquire it,” said Charles Foley, Watchful Software Chairman and CEO. “RightsWATCH version 6.6 further enforces an organization’s information security policy with the seamless and dynamic process that RightsWATCH has become known for, thereby protecting data privacy, slashing liability, and ensuring regulatory compliance.”

To better address GRC initiatives, RightsWATCH now delivers the ability to apply policy rules to any file type, based on an expanded set of parameters such as who the author/editor of the file might be, or file characteristics such as file size, path, type, creation/edit date, or existing classifications that the file may already have. “This means that companies can now set up policy rules to apply if a particular user or group of users saves a classified file such as a PDF document into a particular storage location which might include USB drives, web-based drives such as OneDrive, or other locations of potential high risk,” explained Rui Melo Biscaia, Director of Product Management of Watchful Software. “The same thing goes for legacy data that has been building up for years on corporate servers which companies may need to automatically classify. RightsWATCH provides ways to deploy content, context and metadata aware policy rules to any file type, enforcing corporate policy.”

Intelligent Time Access (ITA) is a new feature of RightsWATCH 6.6 that automates compliance in regulated industries and fixed-duration project scenarios. When using RightsWATCH for data classification initiatives, companies can leverage ITA to automatically update the classification of MS Office files after a specified date in the future. “ITA is particularly interesting in situations in which classification levels are related to projects/initiatives that have an expiration date and/or whose sensitivity decreases/increases after a specific day in the future,” explained Biscaia.

For enterprise collaboration initiatives, RightsWATCH 6.6 has extended ability to enhance SharePoint security parameters. Organizations can now automatically classify and RMS protect MS Office and PDF files added to a specific SharePoint library. “Files can be automatically classified and RMS protected as they are uploaded to SharePoint libraries, even if the users don’t have RightsWATCH installed on his/her laptop or desktop.  Further, if the classification and protection are policy-driven, the user isn’t asked to do anything outside of their normal workflow for uploading the files into SharePoint,” explained Biscaia.

From an information management and governance perspective, companies have now the ability to allow an even deeper segregated access to the admin interface of RightsWATCH. Release 6.6 allows project managers or department heads to set up an information classification schema, policies, and access specifically to address the needs of their projects or departments, without having access to anything administrative actions that are not directly related to their project/department.  In this manner, scope-specific management can be offloaded to the department level, while guarding against the potential of administrative breach in other areas.

Further enhancements on version 6.6 of RightsWATCH are the support for Microsoft’s new .PPDF file format in a RightsWATCH environment, together with the ability to support watermarks and policy rules applied in a webmail environment in Office 2013 (via Outlook Web Access). 

Watchful Software is showcasing RightsWATCH 6.6 at the RSA Conference in San Francisco, in North Hall booth #3026. You may use the code X5EWATCH to register for a complimentary “Exhibit Hall Only” pass for RSA at http://bit.ly/RSApassX5EWATCH

About Watchful Software

Watchful Software was formed in 2012 to address the requirement to protect an organization’s most critical asset after its people – its information. The company is staffed by industry executives with decades of systems, software, networking, security, and compliance experience to address the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, Watchful Software has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems or can handle sensitive information, thereby protecting against the massive economic and competitive damage often done by cyberterrorists and information thieves. Learn more at www.watchfulsoftware.com.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...