View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
December 16, 2010

GridIron unveils new offering to stop ‘WikiLeaks’ type security breaches

Provides status updates on sensitive files, including who has accessed, modified or altered the files

By CBR Staff Writer

GridIron Software, a provider of project operating system for enterprise, has expanded capability of its Flow 2.0 offering to cater to the Enterprise security sector.

The Flow 2.0 enterprise security offering leverages the Flow technology platform and adapts it to government agencies and enterprises looking to plug ‘WikiLeaks’ type of security breaches which occur internally from trusted sources.

The company said that the new security technology focuses on actions taken during the ‘Final Mile’ activity and connectivity at the individual user’s workgroup and desktop level within the Enterprise.

The Flow 2.0 enterprise security offering comes with file genealogy, change tracking and network versioning, which can create workflow maps that show interdependencies amongst all files and return relevant security data to the enterprise.

This feature provides the enterprise with pertinent status updates on sensitive files, including who has accessed, modified or altered the files.

By storing the metadata in the cloud, actions taken at the desktop level become transparent and reported in real-time.

Content from our partners
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape
Green for go: Transforming trade in the UK

The security offering can also report on all activities in the Final Mile, such as copying or sharing of sensitive files, through an enhanced dashboard in real-time.

GridIron Software Flow 2.0 offering is currently available for creative enterprise, with Flow 2.0 Enterprise Security offerings for government agencies and Enterprises to be released in Q1 2011.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU