IQPROTECTOR CLASSIFICATION AND PROTECTION SUITE
Your Information's First Line of Defense
For files, email, enterprise systems, and everything in between – the IQProtector Suitedelivers easily-implemented and cost-effective solutions for your organizational information classification and protection needs.
CLASSIFICATION DRIVEN PERSISTENT ENCRYPTION AND IRM
In today’s tight security climate, it is commonly agreed that effective data protection requires encryption, and that access should be restricted “on a need to know basis”.
Existing encryption solutions rely on infrastructure (like encrypted drives), require enduser action to operate, and cannot differentiate between data that could be encrypted, data that must be encrypted. Further, existing solutions do not deliver usage rights based on the different types of data, provide a solution for sharing encrypted data with third parties, or enable existing IT systems (antivirus, search, indexing, DLP, and others) to work with encrypted data.
THE SECURE ISLANDS SOLUTION
Effective classification is crucial to efficient and sustainable data security. Secure Islands enables policy-driven implementation of existing classification models – automatically classifying sensitive data with or without user intervention. Implemented seamlessly alongside leading Information Rights Management (IRM) solutions, with no impact on business processes, solutions from Secure Islands lower encryption and IRM usage rights management overhead. Once integrated, Secure Islands agents on your enterprise hosts identify new, modified, or accessed sensitive data. This data is then automatically classified and protected according to a customizable central security policy – across any media, applications, or infrastructure.
- Automatic protection based on user- and system-driven classification
- Automatic application of encryption and entitlements for all users, applications, repositories, and storage locations
- Automatic visual content marking and content meta-data labeling to raise user awareness
- Trusted applications like DLP, A/V, or search engines can still access encrypted data seamlessly