Home
About us
Products
Partners
Knowledge Base
Press Office

This text is replaced by the Flash movie.

White Papers

Perimetrix SafeSpace™
Full-spectrum confidentiality protection and data integrity
[pdf]

Secret Documents Lifecycle™
The New Generation of Corporate Secrets Protection Technology
[pdf]

 
 
Getting Started

Read our brochure
[pdf]

Understand Perimetrix SafeSpace™
[pdf]

Understand Secret Documents Lifecycle™
[pdf]

Contact us

 
 
In a nutshell

Three things you need to know about Perimetrix:

  • Even a lost or stolen laptop does not compromise you: the data has enforced encryption
  • You will always know who did what to which document and when - from creation through to final deletion thanks to Perimetrix Secret Documents Lifecycle™
  • The system learns from what you choose to mark secret and automatically rates incoming and outgoing documents
Learn More
 
 
Why Perimetrix
  • Corporate Information Security Platform
  • Protection against all types of internal IT-threats
  • Full control over confidential data usage
  • Integration with storage and processing environment
  • Tight integration with current business processes
  • Legal requirements and industrial standards compliance
  • Full-scale comprehensive data monitoring
Learn More
 
 
Next Step

Email or phone us right now for a free consultation to find out more about how Perimetrix can keep your company secrets where they should be.

Email: This e-mail address is being protected from spam bots, you need JavaScript enabled to view it
Phone: +7 495 737 88 66
Fax: +7 495 932 98 53

 
 
Data Leaks: Fact & Figures!

80% of efforts by companies to protect confidential data are spent in the form of technological protection from external threats: while 80% of attacks, presenting a serious threat to the business, were performed from within.
US Secret Service // Insider Threat Study

87% of incidents are the fault of non-technical personnel - people who do not have specific computer skills. Only in 9% of the cases, those responsible for the incident were IT specialists.
CSI/FBI // Computer Crime Report