Entitlement Manager for Exchange

NextLabs Email Protection for Exchange Server is designed to enforce policies on the Exchange Server across different platforms and email applications, including Outlook, mobile devices, and Outlook Web App (OWA). The solution determines whether users can send email messages or meeting requests that include attached documents, based on the domain or the individual address of the sender or recipient. This capability enables granular control over distribution of data inside or outside of the company, while still allowing users to send information to authorized and trusted outsiders such as OEM partners, suppliers, system integrators, and press outlets.

Policy administrators can write policies for the Exchange Server that prevents users from distributing a specified class of documents to users at competitors’ domains. In this case, for example, policies can be designed to allow users to send documents only to design and manufacturing contractors – no other recipients. Further, administrators can apply specific obligations for certain types of documents or correspondence when sending that information to specific recipients. For instance, you can automatically encrypt certain information in the attachment, or append a warning text to the subject line or the body of email when sending to a certain class of recipients.

Email applications also allow users to share potentially sensitive information when they create meeting requests. NextLabs Email Protection for Exchange Server can also enforce policies for text and attachments included in meeting requests. The solution should be installed wherever there is concern about data loss from unauthorized actions performed in email applications.

Comprehensive Data Protection Protect your valuable business data such as customer information, engineering design documents, financial information, or trade secrets by implementing fine-grained access controls to prevent sharing of emails with unintended parties or unauthorized recipients.
Secure Collaboration Rights protected files are automatically secure throughout the entire sharing process, whether information is shared with co-workers or throughout the partner network. Attributes about the user and recipient are utilized to enforce policies.
Automated Data Security Documents and attachments are automatically classified and rights protected. Customized requirements can also be automatically applied for specific documents and attachments or for types information within those documents.
Fine-Grained Access Control Policies for sharing information are enforced based on attributes about the sender, the recipient, and the email attachment to ensure that all of the relevant information about the individuals and information are considered before making a decision.
Email Routing The Enforcer supports various combinations of incoming/outgoing email routing, including a user that is on premise corresponding with another on premise or with an external domain user.
File Tagging The system supports Exchange normal file tagging and classifies the attachments before they are sent.
Integrated Rights Management Enforcer classifies the documents and applies rights protection to the email attachments
Email Notification Users are notified if they mistakenly or inadvertently try to send documents or attachments to unauthorized users or users who do not have the right qualifications to access that particular class of information.

Microsoft Dynamic Access Control for IT and Compliance: An Example Use Case


Securing Sensitive IP and Trade Secrets When Working with Remote Employees and Partners


Rockwell Collins