THE SOLUTION: E-SAFE COMPLIANCE ENSURES SECURITY IS EVERYONE’S RESPONSIBILITY
e-Safe Compliance gives special attention to data classification. The fundamental difference between e-Safe Compliance and DLP systems is that it treats data leakage as a business problem that needs to be tackled at an operational level, rather than an IT problem.
Secures information at its source, as it gets created, ensuring that information is protected all the time
e-Safe Systems recognised the fact that users are generally busy and cannot spend much time securing information. e-Safe Compliance solved this problem by securing information at its source, encrypting sensitive documents using persistent universal encryption. Documents encrypted using universal encryption can only be opened on devices having the e-Safe agent installed, along with the relevant user credentials, and are tracked throughout their lifecycle from creation to deletion by e-Safe. As such, if the users decide to send the documents to a third party, or decide to copy them, they will need the e-Safe agent to open them.
Protecting highly-sensitive information using document rights management
e-Safe Compliance solves the problem of classifying highly-sensitive information by providing a built-in document rights management module, which allows top management to define sensitive documents. Users can simply right-click on a particular document and define the following:
- Define the classification for the sensitive documents as being
- Office document
- Define who can have access to the said information
- Define the usage restriction on the information such as cut/copy/paste/print etc
More importantly, information owners receive usage reports on the use of their sensitive information. This ensures that, if there is any misuse, the information owner who understands the importance of that potential misuse is in a position to take appropriate action.