The vast majority of sensitive information is created and resides on endpoints – laptops, desktops, tablets, etc. It’s also where context and content are most clear, which is why classifying data on the endpoint, when it is first created, is the best, and most accurate method for classifying data. In addition, applying protection to data at the endpoint, limits the time a file or document is exposed to threats, and ensures the safety of sensitive information.
File And Folder Protection
Endpoint Suite agents on enterprise hosts instantly identify and classify all new, modified, or accessed sensitive data in spreadsheets, documents, presentations, and multiple other file types from any origin. This data, identified with zero false-positives, is persistently tagged, enabling absolute control over access and usage.
Once classified, IQProtector leverages Microsoft RMS to apply encryption and permissions to files and emails – turning them into islands of security, fully protected no matter
where they go, or who attempts to access them.
Email is the primary vehicle via which users send data outside of the organization. Completely content and context-sensitive, Endpoint Suite classifies and protects email, attached documents or other files tagged as sensitive – encrypting data according to a customizable security policy using existing RMS infrastructure. With Endpoint Suite, end-user involvement in classification is policy-driven – freeing users from differentiating between data that could be encrypted, and data that must be encrypted, while leaving organizations the option of deferring to trusted users’ judgment.
Users work with enterprise applications on a daily basis. Mission-critical applications such as ERP and CRM systems may contain some of the most valuable organizational information. Secure Islands’ Endpoint Suite ensures the security of sensitive information derived from enterprise systems as it moves beyond the borders of the application. Even in non-application settings like exported reports, sensitive data originating from enterprise applications is protected since Secure Islands embeds protection within the data itself. Once classified and tagged as sensitive, data is protected wherever it goes.
Endpoint Suite maintains tight control and security over unstructured distributed cloud and web services data. Endpoint Suite automatically classifies and protects sensitive data uploaded or sent to cloud services– keeping it safe from both service provider staff and third parties. Endpoint Suite also protects sensitive data accessed from cloud or web-based services, as it moves beyond application boundaries in the form of web pages, reports, printouts, and more.
Feature Benefit EMAIL PROTECTION Automatic classification of email content and attachments based on sophisticated deep content analysis Sensitive emails protected even without user intervention Automatic protection based on central policy Complete centralized control over all sensitive information, enterprise-wide User classification Empowers users to apply classification to email, raising accountability and awareness System classification recommendation Enables enterprises to raise awareness by identifying information sensitivity Visual content marking Allows to raise accountability and awareness DLP like features (block, warn, encrypt, remove protection) Supplies All-In-One data enforcements capabilities to supply comprehensive Information Protection and Control solution Secure Collaboration Supports secure collaboration with external users Ad-Hoc protection – based on recipients with any supported usage rights (view, edit, print, extract, export, expiration, etc.) Supports applying protection in granular way to support ad-hoc correspondents DLP and encryption gateways integration Maximize your DLP and encryption gateway investments by leveraging classification tagging APPLICATIONS, WEB,CLOUD, SAAS File protection (file encryption and usage permissions) on upload or store Prevents exposure of sensitive files to third parties – from administrators to hackers. Allows secure collaboration with third parties. Download file protection Applies automatic protection on downloaded files Applying IRM on any file generated by rich/client/fat based application Ability to apply protection as close to the source with zero integration efforts Audit of sensitive data extracted from endpoint, web or cloud Supplying audit capabilities to applications even beyond application boundaries DLP like features (block, warn, encrypt, remove protection) Supplies All-In-One data enforcement capabilities to supply comprehensive Information Protection and Control solution Automatic classification of files and documents generated, uploaded, or downloaded based on source, deep content analysis and context. Sensitive files and reports are being protected even without user intervention as much as close to its source covering the entire information lifecycle Automatic protection based on central policy Complete centralized control over all sensitive information, enterprise-wide User classification Empowers users to apply classification to files, raising accountability and awareness System classification recommendation Enables enterprises to raise awareness by identifying information sensitivity IRM-ing and embedding classification tags into any application and file format Natively support any file format and application natively a-la Office FILE AND FOLDER PROTECTION Identification based on content & context, simple deployment, no repository scanning required 100% content identification accuracy, simple deployment, no repository scanning required Scanner Mode Server Classification and encryption of pre-existing content on file servers, NAS, SAN, and ECM repositories Extends Microsoft RMS file format support (multi format) Protection for additional file formats, without application integration Metadata labeling for DLP, FCI, eDiscovery, archiving Lowers the burden on DLP by accurately identifying, classifying and tagging sensitive enterprise data early in the lifecycle to allow effective DLP enforcement
IQProtector Agent Platform Supports:
- Windows 8 & 8.1 (32 & 64 bit)
- Windows 7 (32 & 64 bit)
- Windows XP Pro (32-bit, SP2 and later)
- Windows Server 2003 (32 & 64 bit)
- Windows Server 2008 (32 & 64 bit)
- Windows Server 2012
MS Office support:
- Microsoft Office 365
- Microsoft Office 2013
- Microsoft Office 2010
- Microsoft Office 2007
- Microsoft Office 2003
- SQL Server 2012 SP1 Standard or higher with full text indexing installed
- SQL Server 2008 SP1 Standard or higher with full text indexing installed
- SQL Server 2008 Express (with advanced services) with full text indexing installed – for a Proof of Concept only or a SMB configuration