Comprehensive email analytics tools for compliance
Accelerate compliance with data protection regulations. Use Secure Vault to analyze email communications, fulfil data request obligations and improve information security strategy.
Access detailed reports on sensitive data sharing. Track when sensitive information is sent by email and pinpoint data breach risks, including insider threats.
Search encrypted and plain-text content. Overcome compliance roadblocks and search across both plain-text and Egress-encrypted content for fulfilling data requests.
Enhance your information security strategy. Drill down into dates, users, security methods and keywords to understand where you need to make changes.
Fast, complete responses to data requests
Comply with global regulations. Fast-track subject access request workflows for EU GDPR compliance, as well as adherence to California AB 375, 23 NYCCRR 500 and other legislation.
Fulfil subject access requests efficiently. Search for all personal data, with easy export and redaction for effective compliance.
Comprehensive sensitive data searching. Use Secure Vault’s powerful search engine to inspect emails, meta data and even inside attachments, including Egress-encrypted content.
Export reports to share with data subjects. Easy export from Secure Vault to PDF, with the ability to redact data for security purposes. Plus, work with Egress Secure Workspace to streamline and secure the process of sharing sensitive information with data subjects.
Powerful email analytics and intelligence
Gain insight with intelligent e-discovery. Get an overview of your entire mail store and drill down to gain in-depth knowledge about how users are sharing and securing content.
Understand your data. View fine-grained data in a variety of informative ways, including charts and graphs that provide effective and exportable visualizations to evaluate your organization's data security.
Prevent a data breach. Shore up your data protection strategy by identifying strengths and weaknesses in how people are sharing sensitive content to reduce the risk of data breaches.
Bolster business continuity. Make it easy to carry on working even if mail servers go down, accessing emails and replying directly from Secure Vault.
Flexible infrastructure for bespoke email data protection
Choose any storage and platform provider. Store your email data in the cloud, on-premise, or go hybrid for the best of both worlds.
Store data based on classification. Automatically store sensitive data on-premise but use cloud storage for day-to-day emails and access everything from a unified dashboard.
Organize and customize user permissions. Highly configurable role-based procedures and policies enable administrators to fully control and constrain how their users interact with unstructured email data.
Integrate with authentication tools. Benefit from single sign-on and use multi-factor authentication for additional security.
View full audit logs and access reports. Keep track of all user access to the email store, including all searches and content downloads.
Want to get more technical? Here are some good things to know about Egress Secure Vault.
1. Choice of hosting provider and location, with full cloud option
Egress Secure Vault can be deployed on-premise, fully hosted or in a hybrid configuration. Choose the best data hosting provider and location for your needs, including MS Azure and AWS. Utilise true cloud technology for infinitely scalable and resilient architecture, and even store data in specific locations depending on security classification. For example, benefit from the flexibility, scalability and low overheads of cloud storage whilst automatically storing the most sensitive data on-premise.
2. Fast search and investigations with customizable parameters
Use the powerful investigations tool to set parameters and search across the entire organization mail archive, enjoying the lightning fast response times thanks to leading-edge Elasticsearch technology. Search across keywords, senders, recipients and date ranges, and set bespoke permissions for accessing the resulting email data.
3. Set stringent rules around approval of data searches
All investigations require approval by other users with the necessary access permissions, and this approval can be revoked at any point. Full auditing and reporting enables administrators to monitor the subjects of user searches, and investigator’s actions with the resulting search data.
4. Leverage data with e-discovery reporting
Generate e-discovery reports that show the full picture of secure data sharing and email practice in your organization. Explore and export graphs, charts and tables showing DLP matches, classifications used, security applied, recipient domains and attachment file type, as well as many other parameters. Use the data to understand in more detail how users are securing sensitive data, or if they aren’t, allowing targeted improvements to be made to organizational data security strategy.
5. High-level security and access permissions
All content in Egress Secure Vault is encrypted at-rest and in-transit using AES-256 bit encryption. In addition, data is protected with multi-factor authentication and stringent role-based access procedures for users needing to perform investigations into the organizational email data. Cloud hosting is provided by accredited, highly secure data centers.
Not what you’re looking for? We love talking technical, so contact our team today!
Trial the software
We believe that using Egress for yourself is the best way to demonstrate how effective it can be. So why not contact us to set up a free software trial today?Sign Up
Not Sure What You Need?
We recognise that defining your specific security requirement is not easy and is often dependent on a number of factors including budget, hosting and integration. So why not use our selection tool to help define what you need.Find Out Now
NY DFS Cybersecurity Regulation: Are you ready for the September deadline?
The new NY DFS 23 NYCRR 500 regulation requires all New York State-licensed financial services firms to protect customer data and reduce the risk of data breaches. Yet many of the traditional tools fo...Read More