Dots Screenshot Compressed Dark

Breach of Confidentiality

Apply the appropriate level of encryption to sensitive email and attachments, with Egress Protect.

The risk to confidential data shared by email


of CISOs say company and client data is at risk on email


of organizations don’t use email encryption to protect their sensitive information


of employees caught breaking security protocols suffered negative consequences

One-size-fits-all email encryption doesn’t work

Unauthorized access to personal information is a leading cause of security incidents reported to regulators.  

Relying on people to select the appropriate level of protection can result in under-encryption, when they forget, don’t understand the safeguards required, or simply find it quicker not to encrypt emails. Similarly, securing every outbound email or relying only on keyword policies can lead to over-encryption, which can frustrate senders and their recipients. 

Traditional email encryption solutions are unable to automate email encryption in response to real-time risk, leaving organizations struggling to manage unworkable one-size-fits approaches. 

Stats V2 Breach Of Confidentiality

Securing confidential data on email

Egress Protect provides unrivalled protection for your most sensitive files and email content. Email and file encryption can be integrated transparently into existing workflows or users can be given the choice to protect the content they share. Integration with Egress Prevent provides dynamic automation of protection based on the real-time risk to confidential data as it is shared by email.

Solutions Breach Of Confidentiality 1

Automate the right level of protection​

  • 1 Analyzing the security of the recipient domain(s).​ Our technology performs security checks on recipients and their domains, detecting signals such as whether they're on a blocklist, have incorrectly configured TLS, or lack TLS altogether. 
  • 2 Content inspection for sensitive data in message body and attachments. Customizable policies scan the subject line, message body, and attachments for sensitive data, such as social security numbers, financial details, or other specified keywords and expressions.
  • 3 Automated prompt ​to encrypt. Egress performs a risk assessment of the message and will prompt the user if it identifies sensitive content or a potential security problem with the recipient(s). The email message body and attachments will be seamlessly encrypted with AES 256-bit encryption keeping all data secure and accessible to the intended recipients only.
Solutions Breach Of Confidentiality 2

Easy-to-use, customizable email encryption

  • 4 Easy-to-use drop-down menu, seamlessly integrated into Microsoft 365. A user-friendly Outlook add-in makes it easy for users to encrypt email content by selecting the appropriate option. This menu and related encryption policies are fully customizable by your organization.
  • 5 Granular rights management. Each encryption label applies varying levels of permissions and control, including read-only access, disabled attachment downloads, and restricted forwarding. The different options also assign their own recipient authentication.
  • 6 Message-level encryption. Accredited AES 256-bit encryption provides message-level protection in transit and at rest.
Solutions Breach Of Confidentiality 3

Secure email content on the go​

  • 7 Full mobile app. Read and respond to Egress-encrypted emails from your iOS or Android mobile device.
  • 8 Create secure emails on mobile devices. Compose and send emails on your smart phone or any other internet-enabled device.
  • 9 Protect email content sent to and from mobile devices. Accredited AES 256-bit encryption provides message-level protection in transit and at rest.
  • 10 Review and revoke messages from your mobile device. Track, audit, and even revoke access to emails directly from your device to keep sensitive data safe.
Solutions Breach Of Confidentiality 4

One click access for a seamless recipient experience​

  • 11 Appropriate authentication. Trusted recipients enjoy seamless authentication without needing to log into our web portal. However, portal-based access, multi-factor authentication, and access using a shared secret remain options for when the risk to sensitive data is higher.
Solutions Breach Of Confidentiality 5

Review and revoke Egress encrypted emails that have already been sent

  • 12 Easy access via our Outlook plug-in. Access your administration panel with one click from the ribbon on your Outlook interface.
  • 13 Set time parameters. Set specific timeouts to minimize unauthorized viewing and keep sensitive data safe.
  • 14 User revocation. Fully revoke access to emails when colleagues or third parties are no longer authorized to view previously shared content.
  • 15 Comprehensive email packages. Review granular details including email content, delivery reports, and a comprehensive audit trail of events.
Solutions ATO 3

Cut through the noise to highlight the risks that matter

Reporting on risks such as breach of confidentiality in your email flows can be manual and slow. Even worse, systems can throw too much unnecessary information at you, making it harder to make timely and effective decisions.

Egress Prevent's intelligence platform provides simplified dashboards and critical insights so that administrators can quickly cut through the noise, identify email security risks and, where necessary, remediate.

Solutions ATO 4

Actionable intelligence

Data and analytics should not overwhelm you with information. Updated in real time, our intelligence dashboard offers insights and statistics into email details, risk levels, authentication checks, communication history, and how your people interacted with Protect.

Interested in how Egress Protect would help avoid breaches in confidentiality in your organization?


What our customers say

Hear from companies and organizations who use Egress Protect to prevent against data breaches caused by breach of confidentiality.

Without Egress Protect, we would have had to buy at least five different systems to meet our information sharing requirements – so it has proved a huge cost saving to use as an organization.

Trusted by global organizations

Related resources

Learn how our full suite of advanced email protection technologies work together to mitigate both inbound and outbound email risks like breaches of confidentiality.

Human Risk Summit

12th October 2023 | 10:00 - 12:40 ET/15:00 - 17:40 BST

It's time to adapt.

The next evolution of cloud email security has arrived. Join industry thought leaders at our virtual event for insight into managing human risk and adaptive cloud email security.

Customer webinar: Preventing email data loss and preserving client confidentiality at Bird & Bird

Join this webinar to hear Martyn Styles, Head of Information Security for Bird & Bird, discuss the pivotal role of email DLP for modern law firms.

HCA adopts Egress to secure patient information

Read why the world’s largest healthcare provider, HCA, implemented Egress Protect to keep sensitive patient data secure.

Defending against daily data loss

Download our research report to learn why the risk of data loss is higher than ever – and what you can do about it.