New-generation Secure Document Presentation

September 2017 News & Events, Security Services & Risk Management

Presenting interactive documents online has gotten a whole lot safer. Striata has launched its next-generation Secure Document Presentation solution.

Michael Wright
Michael Wright

“This follows the launch last year of our Secure Document Repository (SDR) solution, which provides the ability to effectively safeguard documents containing highly sensitive financial and personal information,” says Striata CEO Michael Wright. “Secure Document Presentation (SDP) is an augmentation of that solution, which enables the presentation of a document as an interactive, dynamic, web or mobile app experience. The document contents are secured, available online, and viewed via a browser or mobile application.

“Online presentation of documents is not a new concept,” notes Wright. “The innovation of this solution lies in the ability to present a document that has full navigation and interactivity as if it were a highly personalised, self-contained website.”

Striata’s document security products are relevant to the challenges facing organisations operating under the burgeoning threat of data security or privacy breaches. The customer experience of these solutions is a seamless one, Wright adds, as both the storage capability and the presentation layer are designed to integrate into existing customer interfaces (portals, mobile apps), enabling customers to serve themselves in a secure environment.

In addition to the customer experience benefits, the solution is designed to keep the contents of the document secure, as well as to ensure that it cannot be exploited to reach any other documents. Says Wright, “The user receives a secure, independent URL that can access only the relevant document, and then only for a period of time. Once the link expires, the document is no longer viewable.”

This is useful in the scenario where the document recipient wants to share the contents of a document temporarily with a third party such as a broker or tax consultant. The ‘time to live’ feature is a further way of securing the information by limiting the period of time it is available to be accessed.

There are multiple opportunities to apply the technology for secure online document presentation. For example, the user receives a secure PDF by email, opens it with a password and then wants to interrogate or drill down into the data. The user clicks on a link inside the secure PDF and is presented immediately with a fully interactive representation of the data. Graphing, sorting and embedded data files are all available.

Stored documents are protected using multiple layers of encryption technology and can only be accessed by an authorised system or user in possession of the appropriate security details.

For more information contact Striata SA, +27 (0)11 530 9600, www.striata.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Gallagher Security’s Integrate Roadshow
Gallagher News & Events
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.

Read more...
Ransomware impersonates employees and self-spreads
News & Events
Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.

Read more...
Level of RDP abuse unprecedented
Sophos News & Events
Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.

Read more...
Hexagon rebrands Qognify
News & Events
Hexagon’s Safety, Infrastructure & Geospatial division announced that Qognify has officially adopted the Hexagon corporate identity and fully integrated into the division as the physical security business unit.

Read more...
Five efficiency strategies for your security installation business
Securex South Africa News & Events
A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
Sales basics for security installers
News & Events
Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.

Read more...