Switch Secure Vault
Ground-breaking archiving of encrypted email content
Secure your email data. Highly secure email archiving for compliance, with encryption at rest and in transit.
Search encrypted and plain-text content. Overcome legacy email archiving problems and search across both plain-text and Switch-encrypted emails.
Quickly respond to data requests. Meet regulatory requirements with easy search and export for Freedom of Information requests and Subject Access Requests.
Restrict user access. Control user searches, with votes required before users can search sensitive content.
View full audit logs and access reports. Keep track of all user access to the email store, including all searches and content downloads.
Flexible infrastructure for bespoke data protection
Resolves mailbox size limitations, with no need to delete emails or backups
Choose any storage and platform provider. Store your email data in the cloud, on-premise, or go hybrid for the best of both worlds.
Store data based on classification. Automatically store sensitive data on-premise but use cloud storage for day to day emails and access everything from a unified dashboard.
Organize and customize user permissions. Highly configurable role-based procedures and policies enable administrators to fully control and constrain how their users interact with email data.
Integrate with authentication tools. Benefit from single sign on, and use multi-factor authentication for additional security.
Personal archiving with fast, comprehensive search
A complete platform for e-discovery and compliance
Search across email and inside attachments. Use the powerful search engine to search emails, subject lines, meta data and even inside attached documents, including Switch-encrypted content.
Access personal email archiving from Outlook. Integration into Outlook helps everyone access their historic email data easily.
Bolster your business continuity strategy. Make it easy to carry on working even if mail servers go down, accessing emails and replying directly from Switch Secure Vault.
Conduct searches on plaintext and encrypted emails within Outlook with Switch Secure Vault.
Powerful analytics and intelligence
Enhance compliance and improve business continuity
Use e-discovery to gain insight. Get an overview of your entire mail store, and drill down to gain serious insight into how users are sharing and securing content via email.
Understand your data. View data in a variety of informative ways. Charts and graphs provide effective, exportable visualizations to evaluate your organization's data security.
Improve your information security strategy. Drill down into dates, users, security methods and keywords, and understand where you need to make changes and educate users.
Prevent a data breach. Shore up your data protection strategy, identify strengths and weaknesses in how people are sharing sensitive content, and reduce the risk of data breaches.
Want to get more technical? Here are some good things to know about Switch Secure Vault.
1. Choice of hosting provider and location, with full cloud option
Switch Secure Vault can be deployed on-premise, fully hosted or in a hybrid configuration. Choose the best data hosting provider and location for your needs, including MS Azure and AWS. Utilise true cloud technology for infinitely scalable and resilient architecture, and even store data in specific locations depending on security classification. For example, benefit from the flexibility, scalability and low overheads of cloud storage whilst automatically storing the most sensitive data on-premise.
2. Fast search and investigations with customizable parameters
Use the powerful investigations tool to set parameters and search across the entire organization mail archive, enjoying the lightning fast response times thanks to leading-edge Elasticsearch technology. Search across keywords, senders, recipients and date ranges, and set bespoke permissions for accessing the resulting email data.
3. Set stringent rules around approval of data searches
All investigations require approval by other users with the necessary access permissions, and this approval can be revoked at any point. Full auditing and reporting enables administrators to monitor the subjects of user searches, and investigator’s actions with the resulting search data.
4. Leverage data with e-discovery reporting
Generate e-discovery reports that show the full picture of secure data sharing and email practice in your organization. Explore and export graphs, charts and tables showing DLP matches, classifications used, security applied, recipient domains and attachment file type, as well as many other parameters. Use the data to understand in more detail how users are securing sensitive data, or if they aren’t, allowing targeted improvements to be made to organizational data security strategy.
5. High-level security and access permissions
All content in Switch Secure Vault is encrypted at-rest and in-transit using AES-256 bit encryption. In addition, data is protected with multi-factor authentication and stringent role-based access procedures for users needing to perform investigations into the organizational email data. Cloud hosting is provided by accredited, highly secure data centres.
Not what you’re looking for? We love talking technical, so contact our team today!
Trial The Software
We believe that using Switch for yourself is the best way to demonstrate how effective it can be. So why not contact us to set up a free software trial today?
Boston – September 2017 – In recognition of their commitment to global standards for security excellence, Egress Software Technologies, a leading data security provider, today announces th...Read More
Featured Blog Post
The healthcare sector is now dominated by technology, which plays an ever-increasing role in the delivery of healthcare services. In particular, the use of mobile devices and cloud-hosted service...Read More
Thursday 19th January 2017, 13:00 EST – The Enemy Within: Overcoming a Company’s Greatest Security Vulnerability – Its People
It has been reported that approximately a quarter of breaches are caused by human error or employee negligence. With the increasing costs and risks associated with data breaches, we will be discussing...Read More