Customize according to need
-
Separation policies
- Establishing Legal Restrictions on data
- Restrictions to classified/compartmented data
-
Confinement policies
- Restricting web server access to authorized data
- Minimizing damage from viruses and other malicious code
-
Integrity policies
- Protecting applications from modification
- Preventing unauthorized modifications of databases
-
Invocation policies
- Guaranteeing that data is processed as required
- Enforcing encryption policies