IPAC protects computer files on all platforms. It can protects file create from all sources and used by all kind of applications, but for the sake of efficiency, it should be used to protect the files that contains confidential information
and should be access by selected people. IPAC is the last defense to outside hackers who managed to steals the files away, and internal uses who may otherwise takes away the files for personal gain. With IPAC, possessing protected
files doesn’t mean possessing the information those file contains.
To reduce or eliminate the costs that are raised by losing the information. It is not just monetary cost involved, but organization’s reputation and standing with the customers, and the damaged done to its customers and business partners
as collateral. In today’s world, the damage can’t be overstated. The leaders’ reputation is also at stake, and some of them may face liabilities.
The cost of deploying IPAC is similar or less to that of antivirus software or firewalls, it is the cost of living in digital world, but it cost significantly less comparing to the lose of important information that are being stolen
or leaked. The good news is that the IPAC brings more values to the organization through it AI enabled data analysis capability.
IPAC by itself can’t eliminate the possibility of authorized user to create a copy though many means, anyone think they can should ask Snapchat users. It protects the file from untheorized uses, those who never should have access including
hackers and internal users who doesn’t need the information to do their work and who shouldn’t have access by company’s governing policies.
Even for authorized use, it would take tremendous time and efforts to accumulate largeamount of files under the IPAC’s quota feature while evading IPAC’s AI detection.
On the other hand, IPAC is the beginning a new era that application can and should start to recognize and enforce access control the way PDF is having. Currently, most applications doesn’t aware of access control and they simply hand it over to the file system which is inadequate since today most of us don’t work on shared file system any more. PDF file has the permission build into the file and it can’t be changed. IPAC is building a file permission system that extends beyond local file systems and is capable of hand over the access control information to the applications in real-time. This will prompt applications to implement the access control to remove yet another volubility point.
Yes. The official way to work a file offline is to “lease the permission” . Authorized users can lease a file for days up to maximum allowed to use offline on approved device.
No. IPAC need to know the users is who said he is through authentication, and it also need to make sure that user made the request through interactive way and not remotely running a script, another security measure to prevent hackers
stealing the information without use’s knowledge.
Although IPAC is capable to protect all kind of files, it is recommended only to protect the files that belongs to the organization with confidential information, especially those that are intended to be shared with other people within
the organization or selected clients. IPAC doesn’t support and recommend to protect executable file and archive files like zip because it could be used to bypass access control policies.
There are many free tools that can be used for personal files.
AI is not better than human, it operates in different spaces than human. Human’s judgement is mostly based on certain rules that are known to people, including those who are being monitored. If the rules are known, and they are in
most cases, it is possible to cover the illicit activities in a way that it doesn’t violate the rules in the detectable ways for a period of time. AI, on the other hand, finds the underlying mathematics pattern and correlations
among different datasets that are not known to human. If the rules are not known, they can’t be evaded
It is very excisting that APF is the first company to push the AI into information analysis at personal level. Different from existing solutions, IPAC is able to explore the data directly associated with individuals and groups. We
believe there is a connection between the usages of technology and how user conduct daily business and that link is what the IPAC AI is intended to find out. One example would be the usages could reveal the change of person’s productivity
therefore business can plan for it. Please feel free to contact us for more business cases. We are actively investing in this area and constantly expand into new territories.