Watchful Software, a leading provider of data-centric information security solutions, announced that its award-winning information security solution, RightsWATCH, is now available to be launched as a certified Microsoft Azure Marketplace Offering. Through the Microsoft Azure Bring Your Own License (BYOL) offering, RightsWATCH is immediately available to a worldwide audience in the Azure environment. In keeping with Microsoft’s cloud deployment and optimization strategy, Azure users now have immediate access to launch and implement one of the industry’s leading data-centric classification engines, while no longer requiring extra hardware expense and lengthy deployment cycles.
Azure Marketplace is the online applications and services marketplace that enables start-ups and independent software vendors (ISVs) to offer their solutions to Azure customers worldwide. It combines Azure partner ecosystems into a single, unified platform to better serve customers and partners by making it easier to search, purchase, and deploy a wide range of applications and services in just a few clicks.
“We’re pleased to have our flagship RightsWATCH offering be one of the first applications of its kind certified and available through the Azure Marketplace,” commented Charles Foley, Chairman and CEO of Watchful Software. “Our customers worldwide are engaging in Azure and Microsoft Office 365 deployments; RightsWATCH in conjunction with Rights Management Services brings the highest level of confidence to their executive teams that their sensitive data, which is moving to the cloud, can be identified, classified, marked/tagged, and protected with power and simplicity.”
“RightsWATCH is a perfect addition to our Microsoft Azure offerings, complementing our AD and Rights Management Services strategies with data classification, marking, and forensics in a streamlined deployment paradigm,” stated Garth Fort, General Manager of Enterprise Partners, Microsoft. “Having RightsWATCH available in the Microsoft Azure Marketplace underscores Microsoft’s commitment to information protection and control across all platforms, especially the cloud. Deployment offerings such as this are key to enabling Microsoft Rights Management Services (RMS) as a lynchpin of information security for enterprise cloud deployments worldwide.”
RightsWATCH is now available worldwide with support from Watchful Software’s Gold and Platinum WAVE Partners. With the BYOL implementation of RightsWATCH, Watchful Software WAVE Partners offer services such as configuration and roll-out, the processing of the licensing procurement, and management of support services. RightsWATCH users utilizing Microsoft Azure are billed for services used including storage and execution fees.
RightsWATCH is a state-of-the-art information security solution that ensures sensitive information is identified, classified, marked, and that it can only be used by those authorized. If data is leaked, it is rendered useless to unauthorized parties that may acquire it. RightsWATCH enforces an organization’s information security policy seamlessly and dynamically, allowing use of sensitive and confidential data only by those who possess the credentials, thereby protecting data privacy, reducing liability, and ensuring regulatory compliance.
About Watchful Software
Watchful Software was formed in 2012 to address the requirement to protect an organization’s most critical asset after its people – its information. The company is staffed by industry executives with decades of systems, software, networking, security, and compliance experience to address the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, Watchful Software has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems or can handle sensitive information, thereby protecting against the massive economic and competitive damage often done by cyberterrorists and information thieves.