NC Protect augments authentication using the unique identity a file builds over time. It starts the moment a file is first saved, with its content, name, authorship and date stamps. And then through its lifecycle it gains additional transient context such as the file location or information repository and classification levels.
Real-time authentication reflects the user’s current context, blending traditional user permissions with granular business information such as security level or project team. Additionally, NC Protect leverages even more transient context such as IP address, device, browser or time of day.
NC Protect takes your data security policies and enforces them for each and every user and device, completely transparent to the end user.