Reputation management and risk reduction
Prevents the disclosure of client-confidential and other sensitive information, thus reducing financial and reputation risk
Protects content integrity
Admin - “Set it and forget it” in 3 hours with assisted set-up, administrative tools and responsive support team. Easily scale as needed.
User – Transparent cleaning and ability to immediately get back to work after hitting send
Enforce corporate standards
Cleans without user intervention and converts to PDF/A
Accurate Sent Items speed and improve quality during audits and discovery
Ensures compliance control
Enterprise-grade, server-based metadata management
Metadata management on the server offering protection for all users, including webmail, tablet, smart phone, and desktop users.
Clean and convert files
Clean key Microsoft® Office, PDF, Image and ZIP files and convert to PDF/PDF-A files. Clean more types of metadata (such as Microsoft Excel Formulas, Embedded E-mails, Comments, track changes and PDF properties) than with any other server-based metadata removal product.
Intelligent content clean
With “Intelligent Content Clean,” replace text in Microsoft Word documents that matches a specific pattern. For example, identification numbers (state ID, Social Security, or National Insurance numbers) can be replaced with anonymous characters such as “XXX-XX-XXXX.” After processing, you can see a detailed report of every occurrence.
Admin tools so you can “set it and forget it” and easily manage the system
Saves administrative time with quick and easy set-up and administrative tools. Administrators can also view simple reports to distribute the processing load and optimize servers.
Enterprise-grade, scalable architecture
Fully scalable architecture for any size organization and environment that supports Failover (redundancy) and Load Balancing (faster processing).
Accurate sent items
Sent items and archived e-mails reflect what the recipient receives (i.e., cleaned attachments in Exchange 2007 and 2010 environments).
Integrates with active directory
Active Directory database leveraged for user and/or group cleaning policy settings, allowing administrators to easily maintain the system and harden the perimeter.
Creation of custom policies and settings
Control of individual user’s ability to change or override corporate policies and settings.
Administration choice of types of metadata to clean
Administrators can allow users or groups granular control to override specific cleaning settings and/or exclude documents from cleaning altogether.
Alerts user when action is required (ex: Track Changes are detected and user must decide to send them, a password protected document requires unlocking, etc.)
Viewing of detailed reports via the web
Ability to review metadata detected in documents on the Metadact-e website; see types of metadata removed and number of instances; balance load and optimize servers with simple reports on latency, message size, number of attachments, etc.
View the metadata present in any document in detail, as well as a summary of the “risk” level of the content based on multiple variables, including metadata quantity, type, and location.
Desktop and Batch cleaning
Clean desktop documents (from document management systems or local folder) individually or in batch process mode using optional “On Demand” functionality.
Returns desktop to user immediately
On-the-server processing, allowing users to proceed to the next task as processing occurs.
Free consulting services by highly qualified Exchange and metadata experts provided to design optimal configuration based on a fully-assisted installation. Implementation kits containing user and installation guides, quick references, training videos, and sample e-mail communications; outstanding support staff with excellent help desk tools and fast turn-around.
Apply specific actions and create exclusion lists for select types of metadata such as bookmarks, fields, VBA variables, and custom properties.
Autonomy iManage (WorkSite, DeskSite, FileSite, and MailSite)
Multiple servers and virtual machines recommended
Microsoft Windows XP, 2003, Vista, Windows 7, 2008, and 2008R2
Microsoft Office XP, 2003, 2007, or 2010
Microsoft SQL 2005 or 2008
2.0+ GHZ processor
8 GB RAM, 16 GB recommended
5 GB available hard drive space
Net framework 3.5 (or above)
Internet Information Service 6 (or above)