Smartcrypt Data Discovery
Find, protect, and control sensitive data
As enterprise data volumes continue to increase, cloud services and mobile devices are fundamentally changing the way we store and access information. With each step we take into our new digital environment, we create new opportunities for sensitive information to fall into the wrong hands.
Traditional solutions like network and device security are all but obsolete when an organization’s network is the internet itself. A new approach to information security—based on intelligent data discovery and persistent data encryption—is the key to remaining secure and competitive in a rapidly-changing world.
Until now, however, data discovery technology has provided limited value to the companies that use it. Discovery products that simply generate lists of files containing sensitive data leave organizations searching for additional solutions that can actually protect the information.
Integrated discovery and encryption
PKWARE’s Smartcrypt combines data discovery and encryption into a single workflow, making it easier than ever before to find and secure your organization's critical data. Whether sensitive information is stored on file servers or user devices, Smartcrypt can identify and encrypt it as soon as it appears, ensuring that only authorized users will be able to access it.
When discovery is integrated with encryption, each process becomes more effective and easier to manage. Discovery becomes more than a simple reporting function, and encryption can be automated, eliminating extra steps and the possibility of human error.
How it works
Smartcrypt uses a software agent to continuously monitor storage locations for sensitive information. Each time a file is added or modified, Smartcrypt initiates a scan based on the organization’s definition of sensitive data. If the data fits one of the defined patterns, the system can apply encryption using a pre-defined encryption key. Smartcrypt also provides the option to remediate data by deletion.
Data discovery can be configured to monitor network storage locations and employee devices like laptops and tablets. The discovery and encryption process is transparent to end users, while PKWARE’s Smartkey technology ensures that the organization maintains complete control over encryption activity.
One of our experts will contact you shortly to discuss how to protect your data everywhere it goes.
|Deployment||Management||End user experience|
Data discovery and encryption is performed by software agents installed on file servers, NAS devices, and end user devices such as desktop and laptop computers. The same agent handles discovery and encryption, eliminating the need for multiple solutions.
After the Smartcrypt agent is installed, administrators can configure data discovery for all Smartcrypt instances or for selected users and storage locations.
Administrators use the Smartcrypt Manager console to define discovery and encryption policies for individual users, user groups, or locations.
Discovery policies define which forms of data should be identified as sensitive, while encryption policies govern which encryption keys are used to protect files containing sensitive data.
When discovery is integrated with encryption, the process is automatic from the end user's perspective. Any files containing sensitive data on a user device will be encrypted according to the organization's policy, without the need for user intervention.
Users who attempt to open an encrypted file in a network storage location will only be able to do so if they have been granted access to the key that was used to encrypt the file.