
Discovery and Inventory
Find sensitive information by file content, metadata, and more​
🟩 Business-driven, efficient, and dynamic inventorys​ 🟩 Discover sensitive files by information type
đźź© See where and when files are accessed and by who đźź© Based on day-to-day access and share content scenarios
Granularity
Discover and protect multiple files based on specific data attributes ​
đźź© Scan by multiple filters such as location, type of information, users, and much more.
đźź© Filter reports quickly, and at multiple levels, saving the equivalent of 10,000+ manual DB queries
đźź© Apply information protection with flexible, information-driven, rich policies
Optimization
Dynamically apply file lifecycle actions
đźź© Bulk copy, move, and delete actions for files, based on multiple parameters đźź© Manage owners, change file permissions, and apply or remove encryption to files
đźź© Bulk label and classify information based on several scopes
E-Inspector Lifecycle







Some of challenges solved by E-Inspector
Identify what type of data (e.g., credit card numbers, personal data, etc.), where it is stored and who is accessing it
Understand and monitor the types of information stored in specific repositories (SharePoint Online, SharePoint Server, Teams, OneDrive, on-premises, and more)
Migrate files to the cloud excluding specific data
Change document permissions when the user is no longer part of the organization
Encrypt files by data type, area, users and specific location
E-Inspector implementation
Turning over the iceberg​




Scenario
- Identify what type of data is currently stored in the HR and finance repositories.
- Find documents containing sensitive information such as credit card numbers, personal data, and social security numbers.
- Build a risk mitigation plan for data leakage.
Impact
- Inefficient process with potential for human risks.
- Not an automated process.
- Demanding in effort and time.
Solution
- E-Inspector automates the process.
- Detailed inventory (including document characteristics and content).
- Correlation of who uses the document(s) (user/department).

Scenario
- Finance needs to identify which documents contain credit cards in a specified repository
- Implement encryption on these documents.
Impact
- Inefficient process with potential human risks.
- Not an automated process.
- Demanding in effort and time.
Solution
- E-Inspector applies the required encryption according to the content of the document.
- E-Inspector streamlines and automates the process.
- Detailed inventory of the files.

Scenario
- Alex is no longer part of the organization.
- Find all of Alex’s documents.
- Assign all of Alex’s documents to Carol.
Impact
- Exposure to a possible risk and effort to find that information.
- Manual process may result in omission of documents.
- Unprotected documents, possible leakage of information.
Solution
- E-Inspector identifies all of Alex’s documents.
- It grants permissions to Carol automatically.
- Does not remove encryption on documents.
- Detailed inventory.

Escenario
Impact
- ExposiciĂłn a posibles riesgos. Complejidad y esfuerzo para encontrar esa informaciĂłn.
- El proceso manual puede dar lugar a la omisiĂłn de documentos.
Solution
- Proceso automatizado.
- No elimina el cifrado de los documentos.
- Inventario detallado.

![]() | ![]() | ![]() | |
---|---|---|---|
Area | Standard | Advanced | E-Suite IP |
Information Driven Policy Content based policy [Label/Template, Content Rights, Expiration, Refresh, Others] | âś” | âś” | âś” |
Business Driven Policy Business focused policy [Manager, Peer, Region, Group, Others] | âś” | âś” | âś” |
External Collaboration External collaboration | âś” | âś” | âś” |
Workflow Approval Workflow based approval | âś” | âś” | âś” |
Microsoft Teams App Integration E-Inspector Teams App, E-Bot (chatbot) support | âś– | âś” | âś” |
Application Integration via API Line of business [LOB] applications integration via E-Inspector API | âś– | âś” | âś” |
SIEM Integration Data exportable to SIEM | âś– | âś” | âś” |
Service Analytics and Logging E-Visor for E-Inspector [E4E] | âś– | âś” | âś” |
Advanced Alerts and Notifications E-Vigilant for MIP | âś– | âś– | âś” |
End-User Analytics E-Visor for MIP | âś– | âś– | âś” |
Advanced data inspection E-Inspector Advanced | âś– | âś– | âś” |
FREE DEMO TRAINING!
Request more information
Or you may reach us at
- (+1) 425-6893310
- [email protected]