Entitlement Manager for Exchange

NextLabs’ Entitlement Manager for Exchange (EM for Exchange) enables organizations to enforce policies on the Exchange Server across different platforms and email applications such as Outlook, mobile devices, and Outlook Web App (OWA). EM for Exchange determines whether users can send emails or meeting requests with attached documents, based on the individual address of the sender or recipient. This capability enables granular control over the distribution of data inside or outside of the company, while still allowing users to send information to authorized and trusted outsiders including OEM partners, suppliers, system integrators, and press outlets. 

Policy administrators can write policies for the Exchange Server, preventing users from distributing a specified class of documents to users at competitors’ domains. For instance, policies could be set up to allow users to send documents to design and manufacturing contractors but no one else. Additionally, administrators can apply specific obligations for certain types of documents or correspondence when sending that information to specific recipients. This could be automatically encrypting certain information in the attachments or appending a warning text to the subject line or the body of email. 

EM for Exchange can also enforce policies on text and attachments included in meeting requests since users can share potentially sensitive information when creating meeting requests. This addresses the concerns surrounding data loss from unauthorized actions performed in email applications. 

NextLabs Entitlement Manager for Outlook

NextLabs Entitlement Manager for Outlook is a policy enforcement software that integrates seamlessly with Microsoft Outlook to monitor and control email communications and document distribution at the endpoint. It works in the background without needing any user attention and interacts only when a policy requires a user to follow proper information handling procedures. 

Fine-Grained Access Control Policies for sharing information are enforced based on attributes about the sender, the recipient, and the email attachment to ensure that all the relevant information about the individuals and information are considered before making a decision. 
Email Routing EM for Exchange supports various combinations of incoming/outgoing email routing, including a user that is on premise corresponding with another on premise or with an external domain user.
File Tagging The system supports Exchange normal file tagging and classifies the attachments before they are sent. 
Integrated Rights Management EM for Exchange classifies the documents and applies rights protection to the email attachments 
Email Notification Users are notified if they mistakenly or inadvertently try to send documents or attachments to unauthorized users or users who do not have the right qualifications to access that particular class of information. 
Comprehensive Data Protection Protect organizationsvaluable business data such as customer information, engineering design documents, financial information, or trade secrets by implementing fine-grained access controls to prevent sharing of emails with unintended parties or unauthorized recipients.
Secure Collaboration Rights protected files are automatically secure throughout the entire sharing process, whether information is shared with co-workers or throughout the partner network. Attributes about the user and recipient are utilized to enforce policies. 
Automated Data Security Documents and attachments are automatically classified, and rights protected. Customized requirements can also be automatically applied for specific documents and attachments or for types of information within those documents. 

Microsoft Dynamic Access Control for IT and Compliance: An Example Use Case


Securing Sensitive IP and Trade Secrets When Working with Remote Employees and Partners


Rockwell Collins