Seclored: The Data Security News Blog

Securing Emails Wherever They Go & While They are Being Utilized Automatically

auto protector blogYour Email Has Left the Building. Is it Really Secure?

Emails – whether yours or Hillary Clinton’s – have a knack for ending up in the wrong places.

Hillary Clinton wanted the convenience of using the same device for personal and official use, so she set up her own email server. It was essentially a case of Shadow IT gone horribly wrong.

Emails often contain an organization’s most sensitive – and embarrassing – information. Sensitive emails seem to have a natural inclination – intentionally or unintentionally – of finding their way into the most dangerous inboxes – and perhaps eventually to the press. All this has grave implications for user privacy and corporate reputation.

Moreover, as the Snowden revelations make clear – your confidential emails are not even safe from reputed email service providers.

A range of security tools are available today to tackle this problem. They can classify emails, they can encrypt emails, they can control the ability of your users to send emails – and so on. But are these tools enough?

Why and How Traditional Email Security Measures Fail

Many emails circulated within your organization need to be restricted to certain users or departments. In most cases however, any email can easily be forwarded by any employee to another employee without any restrictions. There may be logs generated – but they are post-facto and of little help in restricting information access and use.

If emails sent internally can be a headache to secure, imagine the difficulty of securing emails sent to outsourcers and third parties. There is little you can do to restrict what the external recipient can do with the email and attachment (edit, copy, print) nor can you stop them from forwarding the email to unauthorized people.

Email Protection by Seclore

In today’s borderless world, restricting your email security to just your email domain is not enough. Seclore Rights Management technology allows you to:

  • Secure and track your emails – even when sent to other domains
  • Ensure that only intended recipients are able to access your emails and attachments
  • Control exactly what the recipient can do with the email content and attachments (what they can do with the file, for how long, and from which device/IP address)
  • Track emails and individual attachments to see who is opening them
  • Revoke emails sent or forwarded to the wrong recipient by mistake or malice
  • Expire emails (and attachments) whenever you want – even after they are sent

With Seclore Email Protector, your security travels with your email – even while the email content and attachments are open and in-use.

Seclore One-Click Protection

Seclore One-Click Protection is an add-in for Outlook and Outlook for the web[1] that lets users secure emails right from Outlook. Users can attach granular usage rights to their emails and attachments with just a single click. Email senders can control:

  • Reading, editing, printing, or sharing
  • The expiration date and time of the email content

Activity logs of all access and usage are available and updated in real time. Users track and revoke access to your emails for each individual recipient.

The entire lifecycle of protecting, viewing, replying, tracking, and revoking emails can now be performed inside Outlook itself.

Seclore Email Auto-Protector

Traditional email security solutions carry many administrative overheads and – let’s face it – expect a lot from the end user. What if you could automatically protect email content and attachments with highly granular usage controls – without any user intervention?

Enter Seclore Email Auto-Protector. It acts like a Mail Transfer Agent (MTA), sitting side-by-side with your SMTP server – and secures your emails automatically without any user intervention!

Thus, data remains secure and under your control, even while it is being worked upon AND you don’t have to worry about user compliance!

You can set up predefined rules for email protection, and they will be enforced before the email is sent. For example, a rule could protect all attachments sent to a Gmail or Yahoo! ID, while another could set expiry dates for email attachments sent to bidders for a new project. Incoming emails from a sensitive client can be protected before they land in your internal users’ inboxes.

Seclore Email Auto-Protector can also read X-Headers added to your email by any DLP or Data Classification tools and automatically protect emails with granular usage controls.

And since the set up and mapping of rules happens entirely at the backend, it will work with any email client, platform or domain. The same protection can apply to emails sent from Outlook on Windows and the Gmail app for iOS devices.

All this enables you to get the most out of your email infrastructure and enhance it with data-centric security capabilities. Seclore Email Auto Protector works with any email server, including Microsoft Exchange Online.

Moreover, Seclore Auto Protector is highly flexible and customizable and can work with all industry-leading email security solutions. This includes DLP solutions such as Symantec, McAfee, and Forcepoint, as well as data classification, enterprise applications, email archiving solutions, content inspection engines, and data discovery and e-discovery tools.

Going Beyond Traditional Email Encryption with Seclore

In today’s world, data breaches and compliance regulations are increasing while the ability to restrict data flow is decreasing. With trends such as outsourcing and offshoring, employee mobility, Cloud Computing, and BYOD, you need a solution that offers comprehensive data security. A solution with no dependence on the information’s platform, device, network, domain, or location. And a solution with no dependence on the end user. With Seclore One-Click Protector and Seclore Email Auto-Protector, you can control your email and attachments wherever they go – while they are being utilized – anywhere in the world.

[1] Also called Outlook Web Access or OWA

Related Posts

Related Posts