
Information Governance for the Enterprise
- Document lifecycle management and governance while improving data controls.
- Clear bottleneck for access to encrypted documents; keep the security while simplifying the process.
- Governance to data owners, showing who, when, and how their sensitive files have been accessed.
Flexible Policies
Secured and user-focused
🟩 Business and information driven rich policies 🟩 Extend beyond a whitelist access approach 🟩 Scalable for the enterprise
🟩 Based on day-to-day conditions to access and share content 🟩Tested in multiple real scenarios
Simplified Data Access
Manage documents permissions in a fast and usable way
🟩 Self-service actions available for a user to get or provide access to content 🟩 Extensible to secure external collaboration
🟩 File access notification and sharing via multiple channels for user convenience 🟩 Extensible to business applications
Comprehensive Business Insights
Detailed activity log
🟩 End-to-end user and administrator logging and analytics 🟩 Sensitive information usage based on defined, policy-driven conditions
E-Cryptor Lifecycle









Some of the Collaboration Challenges solved by E-Cryptor
Owner file unknow
Need to edit the document and don't have permissions
Peer is on vacation, and needs to access one of his files
Share documents with an external user assigning only the necessary permissions
Manager needs to have access to all the documents of one of his employees
Area | Standard | Advanced | E-Suite IP |
---|---|---|---|
Information Driven Policy Content based policy [Label/Template, Content Rights, Expiration, Refresh, Others] | ✔ | ✔ | ✔ |
Business Driven Policy Business focused policy [Manager, Peer, Region, Group, Others] | ✔ | ✔ | ✔ |
External Collaboration External collaboration | ✔ | ✔ | ✔ |
Workflow Approval Workflow based approval | ✔ | ✔ | ✔ |
Microsoft Teams App Integration E-Cryptor Teams App, E-Bot (chatbot) support | ✖ | ✔ | ✔ |
Application Integration via API Line of business [LOB] applications integration via E-Cryptor API | ✖ | ✔ | ✔ |
SIEM Integration Data exportable to SIEM | ✖ | ✔ | ✔ |
Service Analytics and Logging E-Visor for E-Cryptor [E4E] | ✖ | ✔ | ✔ |
Advanced Alerts and Notifications E-Vigilant for MIP | ✖ | ✖ | ✔ |
End-User Analytics E-Visor for MIP | ✖ | ✖ | ✔ |
Advanced data inspection E-Inspector Advanced | ✖ | ✖ | ✔ |