AUTOMATING DATA CLASSIFICATION AND ENSURING SECURITY AT DEPARTMENTAL LEVELS
Download this resource

PROBLEMS:

One of the key reasons for the failure of existing security systems, such as DLP, is the lack of on-going data classification. New information is being created on a regular basis in a decentralized manner in different departments and has to be classified as soon as it is produced. Unfortunately, the process of data classification is a tedious and time-consuming one, requiring the information owners/department heads to manually analyse huge amounts of information, gather details of what they think is sensitive, and send it to central admin for monitoring purposes. Considering the fact that information owners are busy individuals, this process starts to hit delays, resulting in security gaps.

THE SOLUTION: E-SAFE COMPLIANCE ENSURES SECURITY IS EVERYONE’S RESPONSIBILITY

e-Safe Compliance gives special attention to data classification. The fundamental difference between e-Safe Compliance and DLP systems is that it treats data leakage as a business problem that needs to be tackled at an operational level, rather than an IT problem.

1

Secures information at its source, as it gets created, ensuring that information is protected all the time

e-Safe Systems recognised the fact that users are generally busy and cannot spend much time securing information. e-Safe Compliance solved this problem by securing information at its source, encrypting sensitive documents using persistent universal encryption. Documents encrypted using universal encryption can only be opened on devices having the e-Safe agent installed, along with the relevant user credentials, and are tracked throughout their lifecycle from creation to deletion by e-Safe. As such, if the users decide to send the documents to a third party, or decide to copy them, they will need the e-Safe agent to open them.

2

Monitoring real sensitive information using decentralised and centralised DLP rule creation

e-Safe Compliance offers both centralised as well as decentralised rule creation. Information owners using the information tagging utility can categorize large amounts of information themselves, without involving the central administrators, and create DLP rules. Furthermore, the information owners also receive reports on the usage of information which they have defined as sensitive. This encourages them to carry out the above functions as they are able to see how their information is being used.

Apart from decentralised rule creation, e-Safe Compliance offers centralised rule creation, which allows admin to define generic, organisation-wide monitoring rules.

3

Protecting highly-sensitive information using document rights management

e-Safe Compliance solves the problem of classifying highly-sensitive information by providing a built-in document rights management module, which allows top management to define sensitive documents. Users can simply right-click on a particular document and define the following:

  • Define the classification for the sensitive documents as being
    • Secret
    • Confidential
    • Office document
  • Define who can have access to the said information
  • Define the usage restriction on the information such as cut/copy/paste/print etc

More importantly, information owners receive usage reports on the use of their sensitive information. This ensures that, if there is any misuse, the information owner who understands the importance of that potential misuse is in a position to take appropriate action.

4

Classifying information in file servers, SharePoint and databases

In most organisations, most of the information resides in datastores. e-Safe Compliance, using its server-side scanner technology, can scan existing and new information being created in file servers, databases and SharePoint. Information detected is classified according to the relevant rules and its usage is tracked.


TRY A FREE AUDIT NOW

It is easy and fast to test e-Safe Compliance in your organisation. It only takes a few hours to install and you will immediately get endpoint visibility without any noticeable impact. Furthermore we recommend going for a full free audit done remotely by our experts.

Try Now!!