Security Gaps Covered By E-Safe Compliance Not Addressed By Other Security Products

The diagram explains the access and movement of information such as payroll, contracts, financials etc either file or text based by Authorised staff or partner. The following use cases have been showcased.
Note: The numbers in the above diagram refer to the sub points under each use case.
USE CASE A MOVEMENT OF INFORMATION TO INTERNET (CLOUD DRIVES, WEBSITES, FREE EMAILS ETC) – NON COMPANY SOURCES
1. Access and creation of information
2. e-Safe Compliance – Information Classification
3. e-Safe Compliance – Encryption and Rights Management
4. e-Safe Compliance – User behaviour Monitoring
The system is able to monitor files uploaded to any websites, cloud storage (Dropbox, Google Drive, etc), social media or free emails/webmails. The system is also able to monitor movement of all text based information via chat, in an email body or web post. Additionally it has keystroke monitoring as a backup feature, to be turned on for specific applications and highly sensitive areas. e-Safe Compliance produces detailed user-centric reports with complete evidence of the event (visual evidence and contextual information) which can be produced in court.
5. Anti-Virus/APTs
6. Identity Management Software/CASB/AD
7. SIEM
8. Firewall/Gateway Filtering/APT Prevention
9. Websites/Cloud Storage/Free emails
10. Unauthorized internal or external users
- Authorized internal or external user Authorised internal or external users will be able to access encrypted files transparently (without the need to provide password or certificates etc). All key management is done automatically. Reports of this interaction are produced in the system.
Use Case B Movement Of Information To Corporate Applications And File Stores (Internal And External Cloud Based Applications)
1. Access and creation of information
2. e-Safe Compliance – Information Classification
3. e-Safe Compliance – Encryption and Rights Management
Additionally, an exception can be set in the system to not encrypt files when being uploaded to corporate applications such as document management systems. This ensures easy integration with various corporate systems.
4. e-Safe Compliance – User behaviour Monitoring
The system is able to monitor files uploaded to any websites, cloud storage (Dropbox, Google Drive, etc), social media or free emails/webmails. The system is also able to monitor movement of all text based information via chat, in an email body or web post. Additionally it has keystroke monitoring as a backup feature, to be turned on for specific applications and highly sensitive areas. e-Safe Compliance produces detailed user-centric reports with complete evidence of the event (visual evidence and contextual information) which can be produced in court.
Corporate email is an important application that is monitored and reports are produced in the case of suspicious behaviour. Additionally, exceptions can be set in the system not to monitor interaction with corporate applications. This is to ensure false hits can be reduced. Another option is to lower the alert level and only to report on the various file and text based interactions.systems.
5. Anti-Virus/APTs
6. Identity Management Software/CASB/AD
7. SIEM
8. Firewall/Gateway Filtering/APT Prevention
9. Corporate Applications and Storage
10. Authorized internal or external users
- Unauthorized internal or external user unauthorised users, either internal or external to the organization, cannot gain access to the encrypted sensitive files. In case of internal users, where the agent is installed, the system also generates alerts for this unauthorised interaction.
Use Case C Mobility/ BYOD / Work From Home/External Storage
1. Access and creation of information
2. e-Safe Compliance – Information Classification
3. e-Safe Compliance – Encryption and Rights Management
As the files are encrypted it doesn’t matter if the user transfers them to any external media (USB, mobile phone sync, SD card) as they remain encrypted and secured. Encryption ensures that it is future proof against new forms of storage mechanisms.
Special BYOD features ensure that only company related information is encrypted and secured. Further special variants are available for people who wish to work from home and for long term partners. For mobile devices, APPs are available to ensure encrypted information can be accessed seamlessly and securely on these devices.
4. e-Safe Compliance – User behaviour Monitoring
The system is able to monitor files uploaded to any websites, cloud storage (Dropbox, Google Drive, etc), social media or free emails/webmails. The system is also able to monitor movement of all text based information via chat, in an email body or web post. Additionally it has keystroke monitoring as a backup feature, to be turned on for specific applications and highly sensitive areas. e-Safe Compliance produces detailed user-centric reports with complete evidence of the event (visual evidence and contextual information) which can be produced in court.
Alerts are produced in case information is transferred to external storage. In case of BYOD and personal devices, monitoring is limited to only corporate encrypted files and corporate emails.
5. Anti-Virus/APTs
6. Identity Management Software/CASB/AD
7. SIEM
8. Firewall/Gateway Filtering/APT Prevention
9. Mobility/ BYOD / Work From Home/External Storage
10. Unauthorized internal or external users
- Authorized internal or external user >> Authorised internal or external users will be able to access encrypted files transparently (without the need to provide password or certificates etc). All key management is done automatically. Reports of this interaction are produced in the system.