Information Governance for the Enterprise

  • Document lifecycle management and governance while improving data controls.
  • Clear bottleneck for access to encrypted documents; keep the security while simplifying the process.
  • Governance to data owners, showing who, when, and how their sensitive files have been accessed.

Flexible Policies

Secured and user-focused​
🟩 Business and information driven rich policies​ 🟩 Extend beyond a whitelist access approach 🟩 Scalable for the enterprise
🟩 Based on day-to-day conditions to access and share content 🟩Tested in multiple real scenarios​

Simplified Data Access

Manage documents permissions in a fast and usable way ​
🟩 Self-service actions available for a user to get or provide access to content 🟩 Extensible to secure external collaboration
🟩 File access notification and sharing via multiple channels for user convenience 🟩 Extensible to business applications

Comprehensive Business Insights

Detailed activity log
🟩 End-to-end user and administrator logging and analytics 🟩 Sensitive information usage based on defined, policy-driven conditions

E-Cryptor Lifecycle

Some of the Collaboration Challenges solved by E-Cryptor

Owner file unknow

Need to edit the document and don't have permissions

Peer is on vacation, and needs to access one of his files

Share documents with an external user assigning only the necessary permissions

Manager needs to have access to all the documents of one of his employees

Area
StandardAdvancedE-Suite IP
Information Driven Policy
Content based policy
[Label/Template, Content Rights, Expiration, Refresh, Others]
Business Driven Policy

Business focused policy
[Manager, Peer, Region, Group, Others]
External Collaboration
External collaboration
Workflow Approval
Workflow based approval
Microsoft Teams App Integration

E-Cryptor Teams App, E-Bot (chatbot) support
Application Integration via API
Line of business [LOB] applications integration via E-Cryptor API
SIEM Integration
Data exportable to SIEM
Service Analytics and Logging
E-Visor for E-Cryptor [E4E]
Advanced Alerts and Notifications
E-Vigilant for MIP
End-User Analytics
E-Visor for MIP
Advanced data inspection
E-Inspector Advanced

E-Cryptor Overview

Request more information

Or you may reach us at

Your contact information could not be saved. Please try again.
Your contact has been sent successfully.
The SMS field must contain between 6 and 19 digits and include the country code without using +/0 (e.g. 1xxxxxxxxxx for the United States)
?
Scroll to Top