Vendor Focus: Covertix

Updated: January 21, 2010

This analysis is presented to align with the key solution and vendor characteristics identified as critical to buyers in the Focus Research Methodology. These include product, cost and vendor considerations.

Product Considerations: Covertix has created a solution that focuses information protection efforts on individual specific business documents and the files containing them. The Covertix CxSense System includes a "SafeZone Manager" and analytics, dashboard, monitoring and reporting features. The "SmartFile" technology on which the Covertix solution is based enables information to protect itself, at rest or in transit, within and beyond corporate firewalls, according to Covertix.

A Document Governor provides policy-driven control over all protected documents and files. Examples of the types of protection offered include control over the right to copy, paste or print content or to capture screen prints. Specific operations and permissions can also be controlled based on specific dates, times, locations or network or host characteristics, such as VPN (virtual private network) connectivity. An Information Risk Analyzer presents auditing, tracking and other "forensic" information on who uses what files, when and where to help to identify and avoid information-related risks. The Covertix solution intends to provide a policy-driven approach to information security that combines DLP (data loss/leakage prevention) and ERM (enterprise rights management) techniques, according to the company.

The first time a user receives a Covertix-protected document and attempts to read it, the user must download and install a free, small software component, as they often must do to read Adobe PDF files. From that point onward, the Covertix solution is designed to operate transparently and non-disruptively. The solution avoids forcing users to learn or use additional security applications or to add steps to their usual workflows to protect "their" information. Focus believes that such features are essential to fostering the adoption levels necessary to maximize the business value of any information security measures.

Cost Considerations: Pricing for the Covertix solution is per-user, per-month, and varies with configuration and capacities. However, Focus expects overall costs to users to be at least competitive with more traditional solutions for functions such as encryption.

Vendor Considerations: Covertix is basically a startup, its partner ecosystem in its earliest stages. However, its founders have years of experience in finance, insurance and telecommunications, arenas where information security is a paramount concern.

Related Categories
Featured Research
  • Securing Enterprise Information Technology

    In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more

  • Office365 Adoption eGuide

    Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more

  • Okta Directory Integration

    For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more

  • Top 8 Identity and Access Management Challenges with Your SaaS Applications

    With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more

  • Better BYOD with Pulse Secure and MDM Partners

    Learn how Pulse Secure and leading MDM product partners are transforming the way employees and IT benefit from the productivity and flexibility of BYOD — without compromising security or increasing management complexity. more