News Coverage

  • FinalCode extends file security services to IBM customers

    ChannelLife AustraliaSara Barker|Aug 12, 2016

    “FinalCode… provides opportunity for IBM partners and customers to choose file security greater than what most cloud-based enterprise content management security settings can govern… allowing the company to service IBM clients and collaborators through its digital rights management (DRM) and file security platform.”

  • FinalCode extends file security services to IBM customers

    TechseenSharmistha Mukherjee|Aug 10, 2016

    “FinalCode…has joined the IBM PartnerWorld program and has received IBM Business Partner designation today…According to the company, it provides cost-effective services that can be deployed according to project, department and business application needs and includes file-based information rights management (IRM) for external users at no additional cost… claims that its scalable approach can readily integrate with a company’s IBM ECM infrastructure.”

  • 5 Channel Partner Updates: 10 August 2016

    Channele2eJoe Panettieri|Aug 10, 2016

    “FinalCode,?which offers?persistent file security, has joined the IBM PartnerWorld program and has received IBM Business Partner designation. FinalCode also works with IBM’s?enterprise content management (ECM) portfolio.”

  • Hackers Have Designs On Your IP: Here’s How You Stop Them Anywhere, Anytime

    Manufacturing Business TechnologyScott Gordon|Aug 9, 2016

    “As recent events show, manufacturers’ design secrets and money have not been immune from the onslaught of high profile data breaches. Collaboration across the global supply chain represents a big risk to U.S. firms. Theft of intellectual property by hackers associated with foreign governments totaled hundreds of billions of dollars in 2015, according to the FBI. One in five manufacturing firms reported a loss of intellectual property in a cyberattack in the past year.”

  • Central Ohio Urology Group Hacked; 223GB of Crucial Data Leaked

    HackreadWaqas Amir|Aug 3, 2016

    “A group of Ukrainian hackers going by the handle of Pravyy Sector has contacted HackRead with a data breach?and it’s shockingly massive… invoking available encryption and usage control on files such as the more than 100,000 exposed Microsoft and Adobe documents in the Ohio breach, would have secured this regulated data and enabled breach disclosure safe harbors.”

  • Hacker Steals 100,000 Docs from Ohio Heath System

    InfosecurityMichael Hill|Aug 3, 2016

    “A Ukrainian hacker has claimed responsibility for pinching more than 100,000 internal documents from an Ohio-based health system… second-largest healthcare system in the state… The breach illustrates how healthcare system file collaboration has become the new data leakage frontier.”

  • In the Breach War, File Protection Is Just as Important as Data

    PaymentsSourceScott Gordon|Jul 18, 2016

    “How can financial services firms ensure only authorized users access shared files, and at the same time, take advantage of data breach notification safe harbor by ensuring the encryption and controlled access to these files? Emerging file security solutions aimed at reducing file mishandling and collaboration data leakage risks address this gap with strong file encryption and usage controls that, once applied, persist for the life of the file, including after it traverses to various networks, recipients and devices.”

  • Retailers’ Data Under Siege … Again

    DealerscopeScott Gordon|Jul 14, 2016

    “Emerging file security solutions aimed at reducing data leakage risks caused by mistakes ? e.g., the W-2 document phishing scams ? or through collaboration apply strong encryption and usage controls that persist as files traverse to various external users, networks and devices. Past information rights management (IRM) solutions were costly, often tied to specific applications or infrastructure and cumbersome for IT and departmental users alike.”

  • Take control of healthcare identity protection and information sharing

    Becker’s Health IT & CIO ReviewScott Gordon|Jun 29, 2016

    “Like their peers in other industries, healthcare and life sciences organizations find collaboration is risky but necessary. Much of the collaboration problem lies in inadequate controls after files cross the firewall where internal content management, DLP and other point solutions no longer apply… many healthcare and pharmaceutical organizations have taken advantage of emerging file security solutions to reduce these data leakage risks by addressing this gap with strong file encryption and usage controls that, once applied, persist for the life of the file.”

  • Google suffers minor breach when third-party vendor accidentally exposes employee information

    Security Brief AUSara Barker|May 16, 2016

    “Although the email contained private information including social security numbers, this mistake was not intended to damage Google or its employees… Such a slipup highlights the importance of company security, file encryption and data protection, even in the case of mistaken activity.”

Archive

Ensure File Security with FinalCode