Promote this Nomination
|Company (that provides the nominated product / solution / service)||Nucleus Cyber|
|Company size (employees)||10 to 49|
|Type of solution||Software|
In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:
• NC Protect offers a centralized and cost-effective AI-driven data security solution to ensure compliance with regulatory and corporate policies and protect against breaches to mitigate risk.
NC Protect is both content and context aware to automatically find, classify and secure unstructured data on-premises, in the cloud and in hybrid environments. It protects against breaches, sensitive data misuse and unauthorized file access enabling enterprises to fully take advantage of the intelligent workplace. NC Protect dynamically adjusts file security based on real-time comparison of user context and file content to make sure that users view, use and share files according to organizational regulations and policies.
With NC Protect enforce compliance and data security policies for privacy and confidentiality, intellectual property and trade secret protection, data loss prevention, enterprise social communications, PII and PCI compliance, HIPAA requirements, and other governance factors. It ensures data compliance and security by continuously monitoring and auditing data and documents against regulatory and corporate policies to protect against data breaches, unauthorized access and misuse.
NC Protect augments access controls using the unique identity a file builds over time from the moment it is first saved, with its content, name, authorship and date stamps. Through its lifecycle it gains additional transient context such as the file location or information repository, and classification levels. Real-time access controls reflect the user’s current context, blending traditional user permissions with granular business information such as security level or project team. Additionally, NC Protect leverages transient context such as location, IP address, device, browser or time of day.
The platform is fully integrated with Microsoft Office 365, SharePoint, files shares and more. It works natively with Microsoft products to restrict the use of certain Microsoft functionality, including elements of the SharePoint user interface, an application’s methods for viewing files, and encryption or restriction of attachments sent through Exchange Email. It requires no additional client-side application, reducing IT overhead and the risks involved in implementing new cloud services or BYOD policies.