Enterprise automated discovery, audit, and protection of stored sensitive information

Discovery and Inventory

Find sensitive information by file content, metadata, and more

Granularity

Discover and protect multiple files based on specific data attributes

Optimization

Dynamically apply file lifecycle actions

E-Inspector Lifecycle

Some of Challenges solved by E-Inspector

E-Inspector implementation

Turning over the iceberg​

Day-to-day scenarios

Scenario

  • Identify what type of data is currently stored in the HR and finance repositories.
  • Find documents containing sensitive information such as credit card numbers, personal data, and social security numbers.
  • Build a risk mitigation plan for data leakage.

Impact

  • Inefficient process with potential for human risks.
  • Not an automated process.
  • Demanding in effort and time

Solution

  • E-Inspector automates the process.
  • Detailed inventory (including document characteristics and content).
  • Correlation of who uses the document(s) (user/department).

 

Scenario

  • Finance needs to identify which documents contain credit cards in a specified repository.
  • Implement encryption on these documents.
Impact
  • Inefficient process with potential human risks.
  • Not an automated process.
  • Demanding in effort and time.
Solution
  • E-Inspector applies the required encryption according to the content of the document.
  • E-Inspector streamlines and automates the process.
  • Detailed inventory of the files.

Scenario

  • Alex is no longer part of the organization.
  • Find all of Alex’s documents.
  • Assign all of Alex’s documents to Carol.

Impact

  • Exposure to a possible risk and effort to find that information.

  • Manual process may result in omission of documents.

  • Unprotected documents, possible leakage of information.

Solution

  • E-Inspector identifies all of Alex’s documents.

  • It grants permissions to Carol automatically. 

  • Does not remove encryption on documents.

  • Detailed inventory.

Scenario

Customer wants to migrate file repositories from legacy on-premises servers to SharePoint Online; however, the customer does not want to store certain information types in the cloud.

Impact

  • Exposure to possible risks and effort to find that information.

  • Manual process may result in omission of documents.

Solution 

  • Automated process.

  • Does not remove encryption on documents.

  • Detailed inventory.

Business-Driven multilevel dynamic inventory

 
Area
StandardAdvancedE-Suite IP
Information Driven Policy
Content based policy
[Label/Template, Content Rights, Expiration, Refresh, Others]
Business Driven Policy

Business focused policy
[Manager, Peer, Region, Group, Others]
External Collaboration
External collaboration
Workflow Approval
Workflow based approval
Microsoft Teams App Integration

E-Inspector Teams App, E-Bot (chatbot) support
Application Integration via API
Line of business [LOB] applications integration via E-Inspector API
SIEM Integration
Data exportable to SIEM
Service Analytics and Logging
E-Visor for E-Inspector [E4E]
Advanced Alerts and Notifications
E-Vigilant for MIP
End-User Analytics
E-Visor for MIP
Advanced data inspection
E-Inspector Advanced