Safeguarding the Security of Your Information

Managing information securely is a fundamental aspect of Therefore™ software. Therefore™ helps ensure that sensitive information is only available to authorized users and that all information is securely backed up. Therefore™ is regularly subjected to penetration testing, and its architecture aligns with industry accepted security standards.

Therefore

Safeguarding the Security of Your Information

Managing information securely is a fundamental aspect of Therefore™ software. Therefore™ helps ensure that sensitive information is only available to authorized users and that all information is securely backed up. Therefore™ is regularly subjected to penetration testing, and its architecture aligns with industry accepted security standards.

  • System permissions restrict unauthorized access to the repository
  • Fully customizable access permissions for specific content and data
  • Anti-tamper measures ensure document authenticity
  • Automatic document back-up for disaster recovery
  • Audit Trail tracks user and document activity
  • Conformation with security standards, regular penetration testing
therefore_icon_security.png

Security

  • Access Controls: prevent unauthorized access.
  • Anti-Tamper Measures: such as encryption and security signatures.
  • Backup and Disaster Recovery: data can easily be backed-up for recovery if disaster should hit.
therefore_icon_accesscontrols.png

Access Control

  • System Permissions make sure only authorized users have access to the system.
  • Therefore™ supports single sign-on for Windows Active Directory, Windows Local Security and LDAP/SAMBA.
  • Client software can not directly access storage devices or database.
therefore_icon_antitamper.png

Tamper Measures

  • Security signatures to detect and prevent tampering.
  • Software is regularly tested for vulnerabilities to outside penetration.
  • Design aligns with OWASP, NIST and ISSTMM coding standards.
therefore_icon_disasterrecovery.png

Disaster Recovery

  • Data can be automatically be saved to primary and backup storage, allowing data retrieval if disaster should strike.
 
Video

Therefore Information Management Solution

 

 

44%

red bar

THE PERCENTAGE OF IT PROFESSIONALS WHO SAID THEIR ORGANIZATIONS’ SECURITY POLICIES EXTENDED TO NETWORK-CONNECTED PRINTERS IN A RECENT PONEMON SURVEY.*

 

Area for extra free edit content.

 

EXPLORE OUR SECURITY COLLECTIONS

 
 

Interested in finding out how Canon Solutions America can help you secure your company’s information?

Contact Us