Torsion’s automated information access technology

Torsion’s automated information access technology allows you to control severe security risks, while maximising profitability

control of sensitive information

The problem of sensitive customer data for professional services firms

Many firms are structured both around vertical teams by specialization, and horizontal teams by client account or project.

But most information access control systems approached don’t mirror the matrix structure of the firm. So information access management becomes inaccurate, and liable to breakdown.

Insider Risks

Torsion is the solution

Torsion allows you to control access to information using the same matrix structure as you use to manage your clients.

So you can have the perfect balance between protecting sensitive customer data and sharing reusable firm IP.

Torsion’s product features

Torsion’s product features

Torsion makes clear who has access to what information and why they have it.
Torsion makes clear who has access to what information and why they have it.

Whether your firm stores information using SharePoint, Office 365, File Shares, Dropbox, Google Drive, or a combination of several at once, Torsion makes clear who has access to what information and why they have it.

Your information owners in the business can quickly designate every piece of information as client sensitive, or a reusable information asset
Your information owners in the business can quickly designate every piece of information as client sensitive, or a reusable information asset

Using clear classification labels, your information owners in the business can quickly designate every piece of information as client sensitive, or a reusable information asset. Then Torsion drives access permissions consistently and automatically based on those labels.

Insider Security Risks

Then, using simple rules based on your people’s specialisations, roles, seniority and client assignments, Torsion ensures that everyone has access to only the information they should have.

Across all of the systems and containers where your information is stored.

Enabling everyone to profitably leverage the firm’s IP, while keeping sensitive client information secured and available to only those who need it.

Controlling insider risk, automatically

Follow us on TwitterFollow us on Twitter See our profile on LinkedInSee our profile on LinkedIn Like us on FacebookLike us on Facebook