Allowing Trusted Applications to Consume Anchored Content

Allowing Trusted Applications to Consume Anchored Content

This article will give explain which applications can consume anchored content.
You will learn: 
  1. What Authorized applications are?
  2. Which applications are Authorized ?

What are Authorized applications?

Allowing users to use any unanimous or malicious application can lead to the compromise of the data. To avoid such cases, we let the enterprise to choose a list of applications that are perceived safe for their use case. We call these applications "Authorized applications." These applications will be permitted to consume plain text. 

Besides the provided user interface, the Authorized applications are also monitored and protected by Anchor. These applications are used to access data when the access control conditions are met. Files saved through these applications in protected folders are automatically encrypted and are registered with a default rule of username. By this default rule, these files can be consumed and edited by the creator, but cannot be accessed by another Anchor user. The creator of the file can add other users or different types of access rules using our user interface to customize the protection enforced on the file.  A list of the Authorized applications can be found below.

For more information on Authorized applications, click here.

List of Authorized Applications

Application

Description

Microsoft Word

Word processor developed by Microsoft

Microsoft PowerPoint

Presentation program developed by Microsoft

Microsoft Excel

Spreadsheet application developed by Microsoft

Microsoft Access

Database management system developed by Microsoft

Microsoft Publisher

Desktop publishing platform developed by Microsoft

Acrobat Reader

PDF reader provided by Adobe

Acrobat DC

Software produced by Adobe to view, create, manipulate, print, and manage files 

Irfan Image Viewer

Open-source image viewer

Libre Office

Open-source office suite

WordPad

Basic word processor created by Microsoft

Tableau Desktop

Data visualization created by Tableau Software


For detailed tutorials on Authorized applications, watch the following videos.
  
    • Related Articles

    • Anchored Successfully Notification

      This article explains the notification Anchor users will receive when they have Anchored a file. You will learn: What it means when you have anchored a file. How to view a file's access rules. A user can Anchorize (encrypt) a file. The "Files ...
    • UnAnchored Successfully Notification

      This article explains the notification Anchor users will receive when they have unAnchored a file. A user can unAnchor (decrypt) a file. This action will be logged.  Anchor cannot control unAnchored files.   To learn more about Anchoring and ...
    • Invalid Access Rules Notification

      This article explains the notification Anchor users will receive when they are not following a file's access fules. You will learn: What access rules are. What the "Invalid Access Rules" notification means. Which available access rules can be placed ...
    • File Out of Protected Folder Notification

      This article explains the notification Anchor users will receive when a file is outside of a protected folder. You will learn: What a protected folder is. What it means when your file is outside of a protected folder. What happens when your file is ...
    • Open a Non-Protected File when a DAtAnchor Protected File is Open Notification

      This article explains the hybrid block notification that Anchor users may receive. You will learn:  What hybrid blocking is. What happens when you open a non-protected folder when a protected folder is open. What happens when you open a protected ...