Watchful Software Announces Industry’s First Mac OS X Support for Microsoft RMS Classification and Data Protection
October 2014 by Marc Jacob
Watchful Software, a provider of data-centric information protection solutions, announced today the release of RightsWATCH Version 6.2, which introduces a number of ‘industry firsts’. This newest version of the award winning data-centric protection suite adds support for users of Mac OS X, and further extends the industry-leading user experience on ubiquitous iOS and Android platforms. In addition, the new release augments the Active Directory (AD) Group management capability, dynamically enforcing immediate policy adherence to new and existing users in an organization.
RightsWATCH 6.2 can now seamlessly enable Apple’s Mac OS X users to classify and protect sensitive data, by extending the data classification model and the transparent application of Microsoft’s Rights Management Services (RMS) into the Apple’s desktop operating platform. Users of MS Office solutions running on the Mac OS X can now leverage RightsWATCH to identify and classify sensitive emails according to corporate policy, without additional effort or extensive training. Enterprise cybersecurity teams can now ensure that information created by users on these MAC systems can be classified, tagged, and protected with RMS as well as tracking all usage and access for reporting and forensic purposes.
RightsWATCH 6.2 is also designed to allow a more comprehensive user experience when using the RightsWATCH iOS and Android app, when handling sensitive data on a mobile device. Users of the RightsWATCH mobile app are now able to access not only their local mobile device directory but the company’s entire Global Address List when creating classified, protected messages for a more seamless experience. In addition, the new version of RightsWATCH features real-time synchronization with Active Directory (AD) including AD Groups when managing and administering security policies. This ensures that if a user’s rights over sensitive information are changed/removed, that user automatically loses any rights over that classified information, regardless of where that data may reside (even outside of the organization’s network).