Avatar

ProtectNow! Support

  • Total activity 284
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 146

Articles

Recent activity by ProtectNow! Support Sort by recent activity Recent activity Votes
  • Privacy Policy

    This article presents Definitive Data Security's Privacy Policy. General Definitive Data Security, Inc. (DefiniSec): Cannot access, in plaintext form, data you protect with our products Cannot di...

  • Support Policy

    Introduction Quality Support is critically important to us at DefiniSec. Paying customers, and those taking the time to consider use and deployment of our technologies, deserve our undivided attent...

  • Trial License Support Response

    Introduction DefiniSec aims to provide world-class support at all times, whether working with paying customers or those who have taken the time to consider our technologies for their needs. Excepti...

  • Disclosure Risk Example

    his article offers a glimpse into use of :Respond Disclosure Risk by example.  Introduction :Respond Disclosure Risk Analysis is an on-demand service that analyzes :Assess audit information to det...

  • Bulk Conversion

    This article shows you how to Protect, Release, and Profile data in folders and/or subfolders all at one time. Introduction You can encrypt and decrypt files in Explorer by selecting between one a...

  • Accessing Host Debug Logs

    This article shows you how to access host log files for both the :Foundation Client and :Email. Overview SSProtect records host-specific log information in several files:     SSProtect.log    SSPr...

  • Using Integrity Remediation

    This article shows you how to use :Respond Data Integrity (and Remediation) Analysis. Introduction Data Integrity Analysis/ Remediation allows you to analyze the state of SSProtect-managed content...

  • Getting Started With :Email

    This article shows you how to setup and use SSProtect with Microsoft Outlook.* * This article is intended as an independent starting point, and as a result duplicates information found in related ...

  • Acquiring Data Access Reports

    This article shows you how to request, receive, and review Organization Data Access reports. NOTE: If you are searching for host-local application debug logs, see Accessing Host Debug Logs. Introd...

  • Configuring a 2nd-Factor USB Token

    This article explains SSProtect Task-based 2FA and shows you how to configure operation. Introduction Many data security applications utilize encryption as a way of obfuscating sensitive content w...