The Magic of FinalCode: Make files disappear AFTER they are sent.
Grant file access to authorized recipients, audit activity throughout the lifecycle, and modify security policies on demand.
Try it for free! Click here to create your account and login!

SECURE

  • Restrict file access
    Dynamic policy modification

    • - No password
    • - Designate recipients
    • - Limit access count/duration
    • - Control
    • - Automatic file deletion on unauthorized access
    • - Print/screen watermark

    • ADVANCED TECHNOLOGY FOR STRONG ENCRYPTION

    • Confidently share files with RSA-2048 bit secure data transmission and strong 256-bit AES encryption. *FIPS140-2 Level 1 certified

    • SECURITY POLICY SETTINGS

    • Extensive and granular file entitlement (open, edit, print, etc.) based on file use and confidentiality.

    • USER OPERABILITY

    • Advanced password-less encryption technology allows users to simply double-click to open and work with the secure file in the users’ existing applications.

    TRACK

  • Persistently track file activity throughout file lifecycle

    • - Access log
    • - Unauthorized access detection
    • - System operation log

    • CENTRALIZED FILE ACTIVITY HISTORY

    • Track and log details on who, when and where shared files are opened, modified, printed, and remotely deleted even after files have been sent.

    • VISIBLE SECURITY POLICY HISTORY

    • All file usage is logged and available to the file owner. No more oversight of inappropriate security policies.

    • STATUS NOTIFICATION

    • File owner receives notification upon unauthorized access attempt. Instant alert of any unsanctioned file usage.

    REMOTE DELETE

  • Make files disappear AFTER they are sent

    • - Remote file deletion
    • - Remote policy modification

    • PERSISTENT CONTROL OF FILES WHEREVER THEY GO

    • File ownership remains with the file creator even after files have been sent.
      Users can modify security policies to change file access and permissions at anytime.
      Security policy updates are instantly reflected to the file.

    • REMOTE DELETE ANYTIME, ANYWHERE

    • Trigger remotely delete on recipient’s device on demand or on access attempt violation, even after files have been shared. Sensitive data remains intact even if the files were stolen or exfiltrated.


    The Challenge

  • Companies face the monumental challenge of establishing strong and persistent data protection to ensure sensitive corporate information remains protected on devices, content management systems, cloud storage, and collaboration channels. Data leakage, reputation, compliance, and liability risks are amplified by many factors that fall outside an IT organisation’s oversight: Shadow IT, email, mobile devices, and much more. Plus, with robust internet connections available worldwide, it is common for many businesses to collaborate and share screens on various devices, regardless of time or place.



  • The FinalCode Solution

  • FinalCode makes implementing enterprise-grade Document encryption and granular usage control functionality easy, whether it is a SaaS or on-premise virtual appliance offering. The patented approach preserves user workflows, and Document storage and collaboration platform investments, while also protecting Documents across communication channels such as: trusted, untrusted, private or public.

    Easy, Powerful, Scalable and Cost-Effective

    With FinalCode, your employees can share sensitive Documents internally and externally with confidence, knowing that unauthorized recipients will not have access. This platform provides effective Document security in a host of ways:


  • Flexibility

  • Readily works with popular applications, devices, Document storage, enterprise or cloud-based content management systems across multiple communication channels.

    Intelligence

    Comprehensive auditing, pattern tracking, notification, and governance across the Document usage lifecycle with the means to modify policy settings on-demand or via recipient request.

    Rapid Deployment

    Lightweight and efficient software client, automated onboarding, extensive directory and infrastructure interoperability, and scalable SaaS or on-premise virtual appliance.

    Control

    Granular Document permission and protection settings by owner or through enterprise policy templates: authorized users, duration, open, copy, paste, edit, save, share, print, screen capture, revoke, and remote delete.

    Security

    AES-256 encryption, standards-based key management, secure key server, global user access management systems, and persistent protection with application whitelisting and remote Document detection.

    How FinalCode Works

    Secure

  • For any Document an enterprise user would like to share on PC, mobile, MFD, or any other device with access to sensitive Documents, FinalCode quickly encrypts the source Document and sets Document permissions for each authorised recipient. Permissions can be set manually by the Document owner or automatically according to pre-defined enterprise policy.

  • Send

  • Once FinalCode has encrypted the Document locally, the Document owner can readily share the encrypted Document directly with the intended recipient(s), via any communication channel (trusted or untrusted, private or public) that the user would like to use.

  • Receive

  • Upon receiving the Document and opening it, FinalCode installed on the recipient’s device, whether it be mobile, PC or MFD, verifies permissions and securely imports the required Document encryption key. FinalCode then locally decrypts the Document and enforces the preset permissions by controlling the recipient’s native Document application, operating system, and relevant drivers.

  • Control

  • If an unauthorized recipient tries to open the Document on their chosen device, FinalCode will deny decryption and log the details, allowing the user to modify recipients and permissions. Finally, if the Document owner decides to remotely delete the Document, FinalCode will revoke all permissions, block any decryption attempts, and send a Document Delete command to any user device that attempts to open it.


  • Common Uses

  • Where do you start. Look across your company and map where and how files are shared. This could simply be with HR, Legal and Finance. It also could be with regard to business transactions. Or possibly key areas of intellectual property or data that is regulated, sensitive or private. Assess the data leakage risk and impact. Or the potential business advantage to apply stronger file security.


  • FinalCode Video Overview

  • Protecting Company Shared Files. Anywhere.


  • Equinox Can Help

  • Please contact Equinox on the links below for more information about FinalCode or to schedule a demo.