Your browser identified itself as a version of IE that was often shipped with default settings that were less than secure. Your internet experience could be made more secure by opening Internet Options in your browser, going to the Advanced tab and looking under the security settings for "Use TLS 1.1" and "Use TLS 1.2". Ensure these are turned on (checked). Doing so will enable your browser to support a higher quality of encryption on this and other websites. You will still be able to browse this site without turning on support for TLS 1.1 and 1.2, but we will have to use a lower level of encryption to accomodate you. See this question on Stack Exchange's Superuser forum from 2011 for more details keeping in mind the comments about TLS 1.2 non-support were made many years ago, and things have changed since then.

If the support for better cryptography has been turned on for your browser, thank you, and you can safely ignore this advisory.

Browser Security Alert

Data Classification

Data discovery, classification, and encryption in one simple workflow

Every company has data—lots of it, and every day more and more data is being created. Companies know that they must keep data safe from internal and external cyber threats, but find it increasingly challenging to protect their sensitive information. How can they have complete visibility of their sensitive data? How can they know where it resides in their networks and devices? How do they understand what kind of data they have and who has access? And how do they ensure the data is protected appropriately at all times?

Security experts often recommend using data discovery, data classification, and remediation solutions including encryption to accomplish this. But the options are less than ideal. Organizations either have to manage three or more stand-alone products, settle for solutions that are missing required capabilities, or—worst of all—choose to leave their sensitive data undiscovered, unclassified, and unsecured while they search for a path forward.

Solution: Integrated Data Discovery, Classification, and Encryption

PKWARE provides an integrated set of discovery, classification, and remediation products that combine these capabilities in one simple workflow. It’s the simplest, most efficient way for organizations to control and secure their sensitive information against loss, theft, or misuse.

How it works

Smartcrypt finds sensitive data, classifies files, and applies remediation — including strong encryption — in one automated workflow. The process can be applied to files at the point of creation, as well as to legacy files that were created before a classification tool was introduced.

With Smartcrypt, organizations can ensure that all of their sensitive data is classified and appropriately protected with persistent encryption that stays with data wherever it is moved, shared, or stored.

Categorize Sensitive Files

Data classification allows users to assign a visual label to the files they create and turns that visual label into metadata classification labels that are used by Smartcrypt to find and protect sensitive information. Companies can choose the right data classification approach for their business whether it be user-driven classification, automatic classification, or a blend of classification techniques.

While involving the users in data classification is important, Smartcrypt helps support users by automatically applying default or suggested labels based on various criteria, such as user groups, departments, or other contextual attributes. Smartcrypt can find sensitive information within files and utilize Smartcrypt's classification capabilities to automatically tag the file based on the company’s security policies.

Find Files Containing Sensitive Data with Smartcrypt Discovery

Smartcrypt for Files and Folders with Data Discovery uses an agent to continuously search for tagged files on servers, laptops, and desktops.

Smartcrypt can also detect untagged sensitive information and initiate classification. Administrators define the types of sensitive data they want to find as well as the locations they want to search for it. Discovery patterns can be used to find all types of sensitive information within files, such as credit card numbers or social security numbers. They can be grouped together to create “Smart Filter Bundles” based on compliance mandates, such as HIPAA, PCI, or GDPR.

Apply Remediation with Smartcrypt Encryption and Key Management

Smartcrypt’s encryption and key management technology is used to apply remediation based on the classification label or content found within a file. Available actions include deletion, reporting, quarantine, or application of persistent encryption using a predefined encryption key.

Once a file is encrypted with Smartcrypt, that protection stays with the data wherever it goes, and any folders containing encrypted files are also protected. Users who attempt to open an encrypted file or folder will only be able to do so if they have been granted access to the key that was used to encrypt the file. Smartcrypt’s intelligent reporting can capture every security event in full detail, allowing organizations to monitor classification and remediation activity and demonstrate compliance with regulations.

Define Policies and Rules with Smartcrypt Enterprise Manager

Administrators use the Smartcrypt Enterprise Manager to define and apply the organization’s data discovery, classification, remediation, and encryption policies. The Smartcrypt Enterprise Manager allows organizations to grant and revoke user access to encryption keys at any time, and for company-controlled policy keys to be included in every encryption operation. These measures ensure complete access and control of data at all times.

Smartcrypt Platform

Learn more about PKWARE's smart encryption platform.

Learn More

Benefits

PKWARE's Smartcrypt makes your security program more effective and helps you face the challenges posed by internal and external cyber threats.

Empowers users to classify data at the point of creation, increasing security awareness through visual labels

Finds legacy sensitive data throughout the organization and automatically applies classification and remediation

Provides persistent strong encryption for sensitive information

Enables organization-wide control and consistent policy enforcement

Encrypted files are as much as 90 percent smaller than the unencrypted data

Support Center

Find answers & help here.

View Support Site

Help Request

Our expert technicians are standing by.

Get Help Now

Sales Team

Request an expert consultation.

Contact Sales