Document security classification add-in for Microsoft Office
Identify and label unstructured data. Let people know how they should use, share and secure sensitive data.
Encourage email and file encryption. Integrate with secure email and collaboration tools to automatically encrypt classified data when sharing.
Use document fingerprinting to keep track. Add meta data to monitor documents throughout their lifecycle, even if the content and filenames are changed.
Audit your data and meet compliance. Get a detailed view of your organization's sensitive data to improve user education and information governance strategy.
Document security classification with flawless integration
Dynamic, policy-based control. Recommend or force classification of documents and fine tune the way your organization treats sensitive data.
Customizable labels and end-user experience. Add custom headers, footers and watermarks, plus choose prompts that help people make better decisions.
Integrate with existing DLP libraries and use your own. Tailor classification triggers and keyword libraries to your needs, integrating standard and industry-specific keywords.
Promote data security awareness
Classify in Office and Outlook. Desktop integration makes data classification easy, with drop-down menus to classify at the click of a button.
Automate classification. With bespoke policy control, have the reassurance of automated, fail-safe classification whenever keywords are picked up.
Prompt appropriate security. Integrate classification with email encryption to apply the right security to content when sharing.
Create a culture of security awareness. Improve your security culture, avoid data loss and prevent data breaches.
Want to get more technical? Here are some good things to know about Egress Email and Document Classification.
1. Office and Outlook Add-in
Egress Email and Document Classification seamlessly integrates into Microsoft Office and Outlook to provide easy document classification within existing workflows. Automated prompts to apply classification and encryption also improves user education, aiding in depth understanding of how to treat data of different sensitivities. Use policies to customise the response to different kinds of data, for example, if OFFICIAL SENSITIVE material is detected, force encryption before sending the email. In addition, prevent certain data being sent to external domains.
2. Centralised control over dynamic policies and DLP scans
Administrators can assign dynamic policies to individual users or groups, or apply them organisation-wide. Further, administrators can easily manage the policies that dictate how users should classify different document types, and then set up the prompts for appropriate security. Set parameters for domains, users, keywords, attachment classifications, and more, as well as the user action or automation that results. Mandate or automate encryption of files of certain classification, or even prevent their release at all.
3. Perform classification at the desktop or email gateway
Automate the classification process at the email gateway as data leaves your organisation, or give end-users the ability to classify and encrypt in Outlook and Office. Egress supports true end-to-end encryption of emails, with encryption at rest encrypting contents of the inbox and sent items folders.
4. Classification reporting
Administrators can also view audit logs to get a detailed overview of user activity, and identify how to improve their organisational data security strategy. Document fingerprinting adds unique meta data to classified documents, enabling the tracking of sensitive content, even if content is later changed or renamed.
5. Security overview
Intelligent DLP policies mean encryption can be prompted or forced when the classified data is shared via email. The email body and classified attachments are encrypted in transit and at rest with AES256-bit encryption.
Not what you’re looking for? We love talking technical, so contact our team today!
Trial the software
We believe that using Egress for yourself is the best way to demonstrate how effective it can be. So why not contact us to set up a free software trial today?Sign up
Not Sure What You Need?
We recognise that defining your specific security requirement is not easy and is often dependent on a number of factors including budget, hosting and integration. So why not use our selection tool to help define what you need.Find Out Now