SOLUTIONS BY BUSINESS CHALLENGE
Torsion’s precise access control defends against insider security threats
The problem of staff having information they shouldn’t
When trusted staff allow sensitive information to fall into the wrong hands, either accidentally or maliciously, the damage can be devastating.
Even seemingly harmless information can have severe unforeseen consequences.
A need-to-know policy for all company information minimises the risks. It is the most fundamental, effective strategy for controlling insider security threats.
7 out of 10 employees have access to information they shouldn’t.
Accurately controlling who has access to what, is extremely difficult for lots of reasons:
- Constant business change – teams, ofﬁces, customers, assignments, roles, mergers – things change every day
- Massive and exponentially growing volume of information
- Data spread across multiple systems, both on-premises and in the cloud
- Staff not understanding the sensitivity of information
- Central IT teams don’t really understand the data
- People too busy to think about security
Torsion is the Solution
Torsion cuts through the complexity, making it simple to deliver a precise, need-to-know strategy for access to company information.
And it costs far less than manual, tedious, inaccurate processes for centrally controlling access.
Torsion’s Product Features
The people in the best position to spot inappropriate access are those closest to the information itself.
Torsion empowers information owners in the business to make informed security decisions for their own information.
It is clear and simple, even for non-technical users. Use inline with existing systems.
Information owners can use Torsion to secure files using simple rules, based on why staff members need access.
e.g. ‘Read access for those who work in Finance or Legal, and at New York Office, and as Director’.
Access automatically stays up to date as the business changes.
Torsion allows information owners to assign simple labels to their sites, libraries and files.
Labels provide clear guidance to all users about the sensitivity and handling of any information.
Sharing rules bound to the label are automatically applied, making access consistent and reliable.
Administrators can centrally control access for all information using its label, across every system.