The solution has full audit and reporting capabilities on user access, data usage and unauthorized attempts. Activities are monitored, anomalies can be detected, and remediation workflow is integrated to ensure compliance with information barriers.
The Financial Services solution protects the access, handling, and disclosure of unstructured data to maintain the confidentiality of material non-public information and to prevent loss. Attribute-based policies are applied consistently across the organization. Real-time authorization enables proper use of data by leveraging the most recent user and data variables. The solution maintains information barriers or “Chinese Walls” between users and organizations by understanding when disclosure is appropriate for the business.
Email controls are enforced using the same attribute-based policies for documents and files and other sensitive information. This provides consistent enforcement and prevents employees or clients from accessing or sharing unauthorized emails and attachments. For example, firms can prevent analysts from emailing unpublished research documents to investment bankers or outside of the organization. They can also prevent email messages containing client information from being sent outside of the region.
The solution prevents research teams from disclosing unpublished research to banking teams through email, IM, FTP, USB, or other company applications. Deal information is automatically saved to authorized repositories only. When an employee leaves the deal team, they no longer have access to any of the deal files and information is wiped from their computer.
NextLabs ensures that your organization is complying with regulatory requirements, including SOX, Basel III, and SEC. Data classifications are leveraged to apply the proper policies. Policies are automatically enforced based on very specific information about the transaction request: who, what, when, and where. These variables are considered before granting access.
Centralized monitoring and auditing gives the organization visibility into data access, usage and unusual patterns or suspicious behavior so it can prevent breaches from occurring.
Secure Information Sharing
Rights Management capabilities allow financial organizations to safely share documents and files internally or with clients. Documents are automatically classified and encrypted upon creation or upload. This protection remains persistent when the information is shared. Users can give specific permissions to the recipient, including print, edit or copy. Protected information can be easily accessed from any device or through a web browser.