IPAC protects computer files on all platforms. It can protects file create from all sources and used by all kind of applications, but for the sake of efficiency, it should be used to protect the files that contains confidential information and should be access by selected people. IPAC is the last defense to outside hackers who managed to steals the files away, and internal uses who may otherwise takes away the files for personal gain. With IPAC, possessing protected files doesn’t mean possessing the information those file contains.

To reduce or eliminate the costs that are raised by losing the information. It is not just monetary cost involved, but organization’s reputation and standing with the customers, and the damaged done to its customers and business partners as collateral. In today’s world, the damage can’t be overstated. The leaders’ reputation is also at stake, and some of them may face liabilities.

The cost of deploying IPAC is similar or less to that of antivirus software or firewalls, it is the cost of living in digital world, but it cost significantly less comparing to the lose of important information that are being stolen or leaked.  The good news is that the IPAC brings more values to the organization through it AI enabled data analysis capability.

  • Client allows IPAC to manage temporary offline access to protected file
  • IPAC works mostly with the files stored on local file system, web application is often being put in a “sandbox” for security reason. This restricts the access of web application to local computer’s resources and file.
  • Most importantly, client enables IPAC to work with many more encryption algorithems, including those brought by customers 

IPAC by itself can’t eliminate the possibility of authorized user to create a copy though many means, anyone think they can should ask Snapchat users. It protects the file from untheorized uses, those who never should have access including hackers and internal users who doesn’t need the information to do their work and who shouldn’t have access by company’s governing policies.

Even for authorized use, it would take tremendous time and efforts to accumulate largeamount of files under the IPAC’s quota feature while evading IPAC’s AI detection.

On the other hand, IPAC is the beginning a new era that application can and should start to recognize and enforce access control the way PDF is having. Currently, most applications doesn’t aware of access control and they simply hand it over to the file system which is inadequate since today most of us don’t work on shared file system any more. PDF file has the permission build into the file and it can’t be changed. IPAC is building a file permission system that extends beyond local file systems and is capable of hand over the access control information to the applications in real-time. This will prompt applications to implement the access control to remove yet another volubility point.

Yes. The official way to work a file offline is to “lease the permission” . Authorized users can lease a file for days up to maximum allowed to use offline on approved device. 

No. IPAC need to know the users is who said he is through authentication, and it also need to make sure that user made the request through interactive way and not remotely running a script, another security measure to prevent hackers stealing the information without use’s knowledge.

Although IPAC is capable to protect all kind of files, it is recommended only to protect the files that belongs to the organization with confidential information, especially those that are intended to be shared with other people within the organization or selected clients. IPAC doesn’t support and recommend to protect executable file and archive files like zip because it could be used to bypass access control policies.

There are many free tools that can be used for personal files.

AI is not better than human, it operates in different spaces than human. Human’s judgement is mostly based on certain rules that are known to people, including those who are being monitored. If the rules are known, and they are in most cases, it is possible to cover the illicit activities in a way that it doesn’t violate the rules in the detectable ways for a period of time. AI, on the other hand, finds the underlying mathematics pattern and correlations among different datasets that are not known to human. If the rules are not known, they can’t be evaded

It is very excisting that APF is the first company to push the AI into information analysis at personal level. Different from existing solutions, IPAC is able to explore the data directly associated with individuals and groups. We believe there is a connection between the usages of technology and how user conduct daily business and that link is what the IPAC AI is intended to find out. One example would be the usages could reveal the change of person’s productivity therefore business can plan for it. Please feel free to contact us for more business cases. We are actively investing in this area and constantly expand into new territories.