Covata is an innovator of data security solutions for global organisations. Covata uses a patented approach to ensure that data stays protected whether inside the network, beyond the domain, to mobile devices or the cloud. Businesses can harness digital workplace trends while complying with data privacy rules. The world’s largest telco companies have partnered with Covata to deliver enterprise security to their customers. Covata is a publicly traded company on the Australian Securities Exchange, ASX:CVT.
Compliance
Applying risk-based approach when it comes to protecting your sensitive datin SharePoint is one of the best practices. You should make sure that you have sufficient SharePoint datprotection level to mitigate possible security and compliance risks of any kind: losses and corruptions, insider threats, privileged user violations, unrestricted user accesses and more.
Data Security
cp.Discover installs quickly and is pre-configured to find credit card numbers, patient information, and personally identifiable information (PII) used in several countries. Users can also create custom sensitive data types, a feature useful for locating intellectual property and other sensitive data types specific to your business. A single installation of cp.Discover is able to search and classify information in local and remote file shares, Microsoft SharePoint, and Office 365 without any additional software. cp.Discover uses keywords, regular expressions (patterns), and post-processing (for example, the Luhn Algorithm) to identify sensitive and regulated information.
Encryption Security
Cipherpoint provides data discovery, transparent file encryption, centralised permissions management, and activity logging for sensitive and regulated information on file servers and NAS.
Managed Security Services Provider
Managing every bit of your security by yourself is hard and tedious at the best of times. That’s where Cipherpoint comes in. cp.Protect is created with the idea of maximizing your SharePoint protection via file and list-level encryption both in transfer and at rest, combined with segregated activity logging and centralized permission management capabilities.