Data discovery, classification, and encryption in one simple workflow
Every company has data—lots of it, and every day more and more data is being created. Companies know that they must keep data safe from internal and external cyber threats, but find it increasingly challenging to protect their sensitive information. How can they have complete visibility of their sensitive data? How can they know where it resides in their networks and devices? How do they understand what kind of data they have and who has access? And how do they ensure the data is protected appropriately at all times?
Security experts often recommend using data discovery, data classification, and remediation solutions including encryption to accomplish this. But the options are less than ideal. Organizations either have to manage three or more stand-alone products, settle for solutions that are missing required capabilities, or—worst of all—choose to leave their sensitive data undiscovered, unclassified, and unsecured while they search for a path forward.
Solution: Integrated Data Discovery, Classification, and Encryption
Today, PKWARE and Boldon James offer an integrated set of discovery, classification, and remediation products that combine these capabilities in one simple workflow. It’s the simplest, most efficient way for organizations to control and secure their sensitive information against loss, theft, or misuse.
How it works
Smartcrypt and Boldon James Classifier integrate seamlessly to find sensitive data, classify files, and apply remediation — including strong encryption — in one automated workflow. The process can be applied to files at the point of creation, as well as to legacy files that were created before a classification tool was introduced.
With this joint solution, organizations can ensure that all of their sensitive data is classified and appropriately protected with persistent encryption that stays with data wherever it is moved, shared, or stored.
Categorize Sensitive Files with Boldon James Classifier
Boldon James Classifier allows users to assign a visual label to the files they create and turns that visual label into metadata classification labels that are used by Smartcrypt to find and protect sensitive information. With Smartcrypt and Boldon James, companies can choose the right data classification approach for their business whether it be user-driven classification, automatic classification, or a blend of classification techniques.
While involving the users in data classification is important, Smartcrypt and Boldon James Classifier combine to help support users by automatically applying default or suggested labels based on various criteria, such as user groups, departments, or other contextual attributes. Smartcrypt can find sensitive information within files and utilize Boldon James Classifier to automatically tag the file based on the company’s security policies.
Find Files Containing Sensitive Data with Smartcrypt Discovery
Smartcrypt for Files and Folders with Data Discovery uses an agent to continuously search for Boldon James Classifier-tagged files on servers, laptops, and desktops.
Smartcrypt can also detect untagged sensitive information and initiate classification via Boldon James Classifier. Administrators define the types of sensitive data they want to find as well as the locations they want to search for it. Discovery patterns can be used to find all types of sensitive information within files, such as credit card numbers or social security numbers. They can be grouped together to create “Smart Filter Bundles” based on compliance mandates, such as HIPAA, PCI, or GDPR.
Apply Remediation with Smartcrypt Encryption and Key Management
Smartcrypt’s encryption and key management technology is used to apply remediation based on the classification label or content found within a file. Available actions include deletion, reporting, quarantine, or application of persistent encryption using a predefined encryption key.
Once a file is encrypted with Smartcrypt, that protection stays with the data wherever it goes, and any folders containing encrypted files are also protected. Users who attempt to open an encrypted file or folder will only be able to do so if they have been granted access to the key that was used to encrypt the file. Smartcrypt’s intelligent reporting can capture every security event in full detail, allowing organizations to monitor classification and remediation activity and demonstrate compliance with regulations.
Define Policies and Rules with Smartcrypt Enterprise Manager
Administrators use the Smartcrypt Enterprise Manager to define and apply the organization’s data discovery, classification, remediation, and encryption policies. The Smartcrypt Enterprise Manager allows organizations to grant and revoke user access to encryption keys at any time, and for company-controlled policy keys to be included in every encryption operation. These measures ensure complete access and control of data at all times.
One of our experts will contact you shortly to discuss how to protect your data everywhere it goes.