Managing Classified Information
Throughout the entire life–cycle of confidential electronic information, Perimetrix delivers the same level of security as non–electronic information security management systems, but with the added flexibility, speed and convenience of digitalization.
Perimetrix solutions prevent unauthorized leaks, corruption, or destruction of confidential and non-confidential electronic information, which are of critical importance to the data customer, and also provide the necessary tools for accounting and control of such information including policies, inventories, and integrity audits.
Our approach has been proven by many years of experience in managing non–electronic confidential information. We bring proven analog security to the digital world.
Data Centric Security Model
An approach that provides the most appropriate level of security based on the business value of the data. Perimetrix allows you to unambiguously apply the requirements of data owners in line with their security and data handling policies.
This approch of safegaurding confidential information assumes classifying data and understanding the processes that it is associated with. Providing utmost value, Perimetrix protects business processes, not infrastructure.
Confidentiality in Digital Environment
Perimetrix enforces rules that have already been established for working with data, preventing deviations from existing policies throughout the entire life-cycle, from cradle to grave. It allows for the organization of document handling based on the category of data and as well as assisiated business process.
Data Lyfe–Cycle Management provided by Perimetrix ensures protecting of confidential information at every stage of its life–cycle.
Protecting Intellectual Property
For enterprises producing new and unique products in a highly competitive environment, the creation of added value starts the moment a product enters the development life-cycle. If a company is unable to safeguard its intellectual property in such circumstances, then the success of the entire business is put at risk.
Companies need a reliable means of protecting both technical documentation as well as the work produced by highly paid specialists. Using Perimetrix solutions, a business’s intellectual property, created by its employees can be restricted for distribution and use exclusively within the enterprise.
Four Reasons for Choosing Perimetrix
Providing utmost value, we protect business processes, not infrustructure.
Perimetrix continuously protecting information through the inheritance of classification attributes. When classified information is copied from one document to another, or the document is saved as a new file, the classification tag is automatically inherited.
Classifying data and understanding the processes that it is associated with.
Classification tags are applied to the file deep within a computer’s data filing system and cannot be independently removed by the user. A multidimensional classification model can be applied, taking into consideration not only the level of data confidentiality, but other factors as well.
Prohibiting activities with confidential information unless authorized.
The principle of permission-based authorization in Perimetrix implies that authorization for users and applications is formulated based on direct, explicit permissions. It means that all non-explicitly authorized actions with classified data are prohibited by default.
Universal transaction based model for decision-
Any interaction with classified information is treated as “moving” data from a “source” to a "destination". The system verifies the authorizations of the transaction against the object’s classification attributes and determines whether or not the operation is allowed.
“Corporations understand the value of security because the leakage of their competitive information could be the end of the corporation“
“In a forest of facts or an ocean of ideas, it is easy to get lost without theories and doctrines“
“In intelligence work, there are limits to the amount of information one can share. Confidentiality is essential“
“Intellectual property has the shelf life of a banana“