Displaying present location in the site.

Solution to Prevent Secondary Information Leaks

PROCENTER/C protects confidential information in Office (Word, Excel, PowerPoint) and PDF documents shared between companies against the risk of secondary information leaks using access rights and operation control.

One system for both management and sharing of data supports efficient and safe work performance!

Further enhancements in the security features of PROCENTER/C prevent information leaks arising from secondary breaches. Data downloaded from the system is encrypted and subject to operational restrictions, including the disabling of menu and shortcut functions on client terminals. As encrypted data can still be edited, PROCENTER/C offers safe information sharing without the loss of convenience.

PROCENTER/C prevents both intentional and accidental information leaks so data can be shared securely between companies.

Controlling edit and operation on downloaded documents

Menu and shortcut restrictions

PROCENTER/C restricts features such as the saving, printing, editing and screenshot of documents on Microsoft Office and PDF applications. By disabling the functions themselves, the system can also regulate shortcuts like "Ctrl+C" to prevent information leaks, regardless of whether they are intentional or accidental.
Users can also set the controlled functions depending on the document they want to protect.

Automatic encryption of documents and cached data protection

Automatic encryption using AES encryption methods makes it impossible to decipher the content of files even if they are brought out of the company or sent to an external party as an e-mail attachment.
PROCENTER/C can also prevent the interception of communication data and leaks from cache data.

Detects prohibited applications

PROCENTER/C force-quits documents whenever prohibited screen capture or file transfer software (such as Winny) is detected, preventing unauthorized leakage of documents.
Limiting OS’s capturing functions also enables users to control unknown software.

Audit support using operation logs

PROCENTER/C not only stores operation history to monitor file usage but also makes it possible to log operations related to information leaks, such as attempts to print or take a screen shot of Office documents or files in PDF applications.

Controlling access rights even after data has been downloaded

Security is further ensured by performing double check by access right to PROCENTER/C and client terminal information.

  • *
    Document types covered are Word, Excel, PowerPoint and PDF files.