- Full visibility: Organizations can understand where and how critical business information is being used, leaked or lost. IT departments can access reports and sophisticated metadata to triangulate more accurately if and when nefarious behavior occurs. The console gives visibility into other files that were shared with the suspected bad actor, and by which employee, reducing the time it takes to uncover potential violations.
- Granular policy controls: Through comprehensive digital rights functionality, IT departments can enact more granular management over their data for better control of how documents are being viewed and even set individual rights for different users viewing the same document. This equips organizations to manage exactly who can read, edit, print or share data, as well as set embargoes and expiry times over when the data are permissible to view. The management console also allows for rights to be revoked, immediately removing the ability of a specified person to open the file.
- Protection of Microsoft Office files: Transparent encryption policies protect data in motion across PCs, smartphones and tablet devices. At the same time, shared data are secure across common collaborative tools such as Box and Dropbox. The solution also ensures all Word, Excel and PowerPoint files are fully encrypted while in motion and in use, providing businesses with continuous security for their most valuable data.
- Easy use across all devices: The solution allows employees to download secure mobile protection from their app store, enhancing manageability for IT departments. Further, office plug-ins run seamlessly with Microsoft Office 2010 and upward, allowing for improved collaboration with colleagues outside an organization.
Additional Resources:Learn more: Dell.com/datasecurityWatch the video: Dell Data Protection | Secure LifecycleRead the infographic: Dell Data Protection | Secure Lifecycle About Dell Inc. Dell Inc., a part of Dell Technologies, provides customers of all sizes - including 98 percent of the Fortune 500 - with a broad, innovative portfolio from edge to core to cloud. Dell Inc. comprises Dell client as well as Dell EMC infrastructure offerings that enable organizations to modernize, automate and transform their data center while providing today's workforce and consumers what they need to securely connect, produce, and collaborate from anywhere at any time. Copyright © 2016 Dell Inc. or its subsidiaries. All Rights Reserved. Dell is a trademark of Dell Inc. Other trademarks may be trademarks of their respective owners. 1 Vendor Vulnerability: How to Prevent the Security Risk of Third-Party Suppliers, Bomgar, 2016