PKWARE’s Smartcrypt eliminates security gaps by finding, classifying, and protecting sensitive data across the entire enterprise. Smartcrypt provides capabilities no other product can match, allowing each organization to create a tailored data protection solution.
Our Smartcrypt demo videos provide a look at each step in the data-centric security workflow:
- Policy management
- Data discovery
- Data classification
- Protections and remediation
- Audit and reporting
The Smartcrypt Enterprise Manager is the central component of the Smartcrypt platform, allowing organizations to maintain control over sensitive data across the enterprise.
Here, you can get a look at Smartcrypt's administration console and see how security administrators can use it to create policies that govern how Smartcrypt agents will identify and protect sensitive data on laptops, desktops, and servers.
Smartcrypt's data discovery feature uses a software agent to continuously monitor storage locations for sensitive information. Discovery patterns can be used to find all types of sensitive information within files, such as credit card numbers or social security numbers.
In this video, Smartcrypt identifies an Excel file that contains sensitive data (using the example of credit card numbers that require protection under PCI DSS), and then initiates the next steps in the Smartcrypt workflow: classification and protection.
Smartcrypt and Boldon James Classifier integrate seamlessly to find sensitive data, classify files, and apply remediation — including strong encryption — in one automated workflow.
In this video, Smartcrypt identifies a PDF containing patient information that requires encryption under HIPAA. The Smartcrypt agent initiates metatagging via Boldon James Classifier, and then not only encrypts the file, but removes it from an inappropriate location and saves it in a quarantine folder.
Protection and Remediation
Smartcrypt provides a wide range of options for dealing with sensitive information once it has been detected. vailable actions include persistent encryption, quarantine, masking, and deletion.
Using personally identifiable information (PII) as an example, this video demonstrates Smartcrypt's ability to detect sensitive information and protect it using persistent encryption. You'll also see that the end user experience is unchanged—as long as a user is authorized to access a protected file, Smartcrypt decrypts and opens the file automatically.
Audit and Reporting
Organizations can take advantage of Smartcrypt's capabilities to meet their audit and compliance obligations. Classification tags greatly simplify the audit process, while Smartcrypt’s Data Security Intelligence feature provides insight into data protection activity across the organization, making it easy to demonstrate compliance with internal policies, customer requirements, and government mandates.
This video provides a closer look at the tags that Boldon James Classifier can apply to files containing sensitive data, followed by a demonstration of Smartcrypt's ability to generate reports on the presence of sensitive information on user devices. The video also provides a look at another of Smartcrypt's remediation options—deleting unneeded files and creating audit trails to confirm deletion.