Email is the most common mechanism for collaborating but protecting sensitive information contained in emails is challenging. Controlling what is being sent and to whom requires a data focused, centralized approach. The consequences of leaking IP and other critical data can be enormous. Organizations are finding that internal misuse – inadvertent or malicious – is now as big a threat as external breaches. The world has changed – sharing with the extended enterprise is the norm and organizations must safeguard information.
NextLabs Email Protection solution is a key part of the data protection suite. The volume of sensitive information that passes through email communication is forcing organizations to take action and implement additional controls to safeguard email correspondence.
NextLabs has two solutions to safeguard information: NextLabs Email Protection for Microsoft Outlook and NextLabs Email Protection for Exchange.
|More About Outlook||More About Exchange|
Organizations need to prevent users from inadvertently sending sensitive information from the desktop. Desktop Enforcer is a policy-based solution that runs on desktops and laptops to monitor and control user activity. It tracks all data access and usage regardless of how and where it goes. This includes tracking information that is put on a USB device, CD, sent to the printer, moved to a file system or put on a clipboard.
The solution prevents breaches from occurring in real time, online or offline. When a user tries to take an unauthorized action, the system sends an alert and describes the issue so it can be remedied immediately. Workflow can be implemented to automate remediation.
Email protection safeguards critical business data that is contained in email messages so that only authorized receivers can view the contents. The system automatically prevents email messages from being sent if they are not adequately protected according to policy.
Rights Management capabilities are integrated to automatically classify and encrypt files upon emailing the document. Information is encrypted and rights protection is applied to automatically protect sensitive information.
Data is automatically classified based on complex rules using keyword matching and metadata search. The solution utilizes the classification to ensure that any sensitive attachment in an email message is properly protected before being sent.
The solution is integrated so that email messages are automatically protected as they are created – providing a seamless user experience. All sensitive correspondence is logged and reported for regulatory and audit purposes.
The solution leverages information, or attributes, about the user, data and environment at the time of access. Unlike role-based controls that are static in nature, attribute-based controls ensure that the most current information is used to make authorization decisions.
Organizations can centrally control the creation, enforcement, and management of security policies to protect documents and files across all applications and systems. This ensures that the most up to date policies are applied and enforced consistently across the enterprise.