GIGATRUST DESKTOP PDF

Desktop. GigaTrust Intelligent Rights Management™ solutions extend and enhance Microsoft’s Rights Management Services (RMS)— enabling secure. GigaTrust Desktop Client Control access to your data using Microsoft Rights Management Services- even when sending a PDF, JPG or other non-Office file. GigaTrust Desktop Client blocks over screen capture/remote sharing programs from being launched with its blacklist support for Risk Management System.

Author: Galmaran Kazraktilar
Country: Brazil
Language: English (Spanish)
Genre: Life
Published (Last): 13 January 2004
Pages: 388
PDF File Size: 8.72 Mb
ePub File Size: 19.28 Mb
ISBN: 903-9-71373-365-9
Downloads: 38446
Price: Free* [*Free Regsitration Required]
Uploader: Vudohn

The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and safe to share these documents. I left there in to begin my entrepreneurial trek. I continued in the telecommunications field and founded a company that made multiplexers.

I deesktop the company public and then sold it. This was during the time when the original, peer-to-peer Napster deektop on its way out. We created custom CDs from our library of gitatrust to a million songs that we licensed from major publishers.

This company also went public. I have been with GigaTrust for 14 years. For the past 10 years, I have served as the CEO, overseeing the strategic direction, operation and growth of the company. Our GigaCloud is a SaaS Software as a Service offering that provides secure email and document collaboration services anytime, anywhere, and on virtually any device, along with real-time data analytics, reporting and administrative tools.

This goes well beyond just file synchronizing and sharing — we protect the emails and documents via both encryption and rights permissions management and with our private cloud options, the customer exclusively holds their private key.

We take this approach because we learned that there are two main scenarios for security problems inside an enterprise:. Our system is easy to use and a company can be up and running in a day. In situations where enterprise information must be shared with outside parties — which is very easy with our cloud architecture — there is no additional fee for the outside parties.

We sell to Microsoft-centric companies, but we do not compete with Microsoft — we are Microsoft partners. We focus on filling in the features and capabilities that Microsoft does not provide, such as:.

  INCADA SILK PDF

In addition to our desktop and mobility components, Data Over Watch is an additional component of GigaCloud that provides measurement, auditing, tracking and analytics of data gigatrusy. It consists of an agent residing on endpoint devices that records every transaction i.

On the other end, there is a set of server-side tools for administrators to set rules and policies, monitor what is going on, and verify proper document protection. Any enterprise with confidential information is a prime candidate for our software. Having said that, there are certain verticals that naturally have a greater need, such as:. These industries are characterized by the fact that in addition to having confidential data, they also have regulatory requirements and are subject to huge fines if any confidential information leaks out.

We have highly recognized customers all over the world and they typically have a minimum of several thousand employees. Our two main sources of leads and new customers are Microsoft and security industry events. In addition, we also run ongoing social media marketing initiatives, including Twitter, LinkedIn, gigayrust email. First, it is a very rapidly changing landscape. Enterprises and security companies are realizing that current approaches to preventing intrusions mostly do not work.

The focus is now on the endpoints. Companies are investing a lot of money in a plethora of solutions to try to cover many different user cases. Unfortunately, it is still like the wild west and this is probably the biggest issue for IT departments today.

GigaTrust Desktop Client | GigaTrust Corporation

We are also working on a solution for the social media market. Today we cover both business-to-business and business-to-consumer e.

Our social media product, which we plan to launch by the end ofwill be our entry into the consumer-to-consumer market — which is a huge market. Jackie is leading the community relationship in vpnMentor. He is responsible for managing, editing, and developing high quality interviews with security professionals. His background includes gkgatrust and website development, as well as online marketing gigatruzt.

This page isn’t yet translated into. If you wish to volunteer and translate it, please contact us using the contact us page. Please type an email. Please type a Name. Best VPNs by Category. Please tell me a little bit about yourself and your background. The approach you have taken is to focus on securing the documents, rather than to focus on securing the perimeter.

  BEYAZ ZAMBAKLAR ULKESINDE PDF

We take this approach because we learned that there are two main scenarios for security problems inside an enterprise: Information goes out — Confidential information is sent out from the enterprise, without being properly protected i.

Hackers come in — Enterprises assume that they will be hacked and the data is subsequently breached, despite their best efforts at prevention and detection. They therefore assume confidential documents will be stolen and they want to protect them. Another thing that I noticed right away about your service is that it is very Microsoft-centric. Why limit your market? We focus on filling in the features and capabilities that Microsoft does not provide, such as: You also have Data OverWatch?

What deskktop does it do?

How do you define your market? Who is your specific target audience within that market? Having said that, there are certain verticals that naturally have a greater need, such as: Healthcare Pharmaceuticals Banking and Financial Services Manufacturing Energy Government Defense Agencies These industries are characterized by the fact that in addition to having confidential data, they also have regulatory gigatrusf and are subject to huge fines if any confidential information leaks out.

How would you describe your current typical customer? Who are some of your biggest customers? Our current biggest customer is the US Veterans Association, which hasusers.

Office 365 Desktop Applications And Azure RMS

What methods do you normally use to attract and engage with new customers? How do you see corporate security and corporate security market evolving in the next few years?

What are your future plans for GigaTrust? How many employees do you have today?

Where are they located? We currently have 75 employees at our headquarters here in Herndon, Virginia. Was this article helpful? Let me help Such a shame. You’re not as safe as you think you are! Get weekly tips on how to stay protected and up to date on what’s going on in the gigarrust. One last request Share on Facebook Tweet this.