Information Assurance for End User ComputingPrint Version
Business critical spreadsheets and MS Access® databases (collectively known as End User Computing or EUC) present individual challenges for information security officers.
ClusterSeven supports all three elements of the classic information security model, providing an automated approach to ensuring confidentiality, integrity and availability across the enterprise.
Centralized monitoring of user activity creates a rich data warehouse of file metadata and file contents/data. This enables CISOs to receive assurance on policy adherence, while allowing users and management to improve data integrity and business efficiency, with reduced operational risk.Print Version
"Crucially, ClusterSeven’s technology lets us manage our spreadsheets like any other business application."Stephen Ashton, Head of IT Business Management, Dresdner Kleinwort