Managing Classified Information
Throughout the entire lifecycle of confidential electronic information, Perimetrix delivers the same high level of security as for non–electronic information security management systems, but with the added flexibility, speed, and convenience of digitalization.
Perimetrix solutions prevent unauthorized leaks, corruption, or destruction of confidential and non-confidential electronic information which are of critical importance to the data customer. Perimetrix also delivers the necessary means for accounting and controlling such information by providing the appropriate tools for policy management, inventory control, and auditing.
Our approach is based on a proven track record of many years of experience in managing non–electronic confidential information. We bring proven and effective analog security expertise to the digital world.
Data Centric Security Model
An approach that delivers the most appropriate level of security based on the business value of the data. Perimetrix enables you to unambiguously apply the requirements of data owners in line with security and data handling policies.
This approach of safeguarding confidential information is based on classifying data and understanding the processes that it is associated with. Delivering the utmost value, Perimetrix protects business information and processes, not infrastructure.
Confidentiality in Digital Environment
Perimetrix enforces rules that have already been established for working with confidential data, preventing deviations from existing policies throughout the entire data lifecycle, from cradle to grave. It enables the organized structuring of document handling policies based on the classification of data and as well as any associated business processes.
Data Lifecycle Management provided by Perimetrix ensures the protection of confidential information at every stage of its lifecycle.
Protecting Intellectual Property
For enterprises producing new and unique products in a highly competitive environment, the creation of added value starts the moment a product enters the development lifecycle. If a company is unable to safeguard its intellectual property in such circumstances, then the success of the entire business is put at risk.
Companies need a reliable means of protecting both technical documentation as well as the work produced by highly paid specialists. Using Perimetrix solutions, the distribution of a business’s intellectual property, created by its employees, can be restricted for use exclusively within the enterprise.
Four Reasons for Choosing Perimetrix
Providing the utmost value by protecting business processes, not infrastructure.
Perimetrix continuously protects information through the inheritance of classification attributes. When classified information is copied from one document to another, or the document is saved as a new file, the classification is automatically inherited and applied to the target document.
Classifying data and understanding the processes that it is associated with.
Classification tags are applied to a file deep within a computer’s data filing system and cannot be independently removed by the user. A multidimensional classification model can be implemented, taking into consideration not only the level of data confidentiality, but other factors as well.
Prohibiting activities with confidential information unless authorized.
The principle of permission–based authorization in Perimetrix implies that authorization for users and applications is formulated based on direct, explicit permissions. It means that all non–explicitly authorized actions with classified data are prohibited by default.
Universal transaction–based model for decision
making.
Any interaction with classified information is treated as “moving” data from a “source” to a “destination”. The system verifies the authorizations of the transaction against the object’s classification tags and determines whether or not the operation is allowed.
“Corporations understand the value of security because the leakage of their competitive information could be the end of the corporation“
“In a forest of facts or an ocean of ideas, it is easy to get lost without theories and doctrines“
“In intelligence work, there are limits to the amount of information one can share. Confidentiality is essential“
“Intellectual property has the shelf life of a banana“