Does Liquid Machines rely on the end user to apply a policy, or can the process be automated?
Liquid Machines offers several ways to automate the process of protecting content. 1) The Liquid Machines Fileshare Gateway can be configured to protect files that are located in specified locations on the network. Different policies can be used to protect different locations or different file types within the same folder. Recursive protection ensures that contents contained in sub-folders are also protected. 2) Liquid Machines APIs can be used to integrate the policy protection and the policy creation process with existing workflows and automated systems. Examples include integration with content management systems, email archiving systems, or automated processes that generate large volumes of individual files. 3) Liquid Machines command line utilities enable system administrators to bulk encrypt or decrypt content which can be used to expedite the implementation process.
Related Questions
- Can IncrediBuild slow down other users machines in my organization as a result of the distributed compilation process?
- How does Liquid Machines revoke rights and keep local permissions in sync with those on the Policy Server?
- Does Liquid Machines rely on the end user to apply a policy, or can the process be automated?