Technology Overview

The Sertainty technology imbues data with self-governance, provenance and protection capabilities. In its activated state, we refer to this data as “data: empowered.”  For the first time, data can actively participate, as if an endpoint itself.  With Sertainty, the data-owner-user relationship is monitored and governed by data: empowered and assured for the life of that relationship, whether at rest, in transit or under process.  The owner’s intentions are manifested within and enforced by the data; be they rules, policies, record of ownership, access attempts (successful or not), alerts and so on.

No longer is there a perimeter or extraneous control of data exerted by an application like a firewall or other system; the data controls, protects and governs itself.