SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Enforce Data Governance and
Compliance Policies
Ensure your organization complies with regulatory
requirements for your industry, such as the Privacy
Acts, HIPAA, FISMA, PCI DSS, OMB, and SEC. Security
policies are enforced using Active Directory (AD)
authentication and SharePoint groups to access,
decrypt or perform other user actions. Content is only
available to users who meet the classification-driven
policies – and business rules to control how authorized
users can consume and distribute content are
automatically enforced.
Reduce the Cost and Effort of
Managing Collaboration
Break through the confines of provisioning individual
sites for each collaborative group. By classifying
documents, access is automatically restricted, or
rights are granted, regardless of the location of the
document. This eliminates the need for administrators
to create special sites to manage new groups and their
content, significantly reducing the cost and complexity
of managing SharePoint and Office 365 and simplifies
document permission management.
Harness the Power of SharePoint and
Office 365 — Without the Risks
Cryptzone provides content compliance and security
solutions that monitor, enforce and remediate the
integrity of unstructured information in content
management systems, file shares, social collaboration
and public facing websites; with a focus on SharePoint,
Office 365 and hybrid environments.
Fully integrated with SharePoint 2010, 2013 and
Office 365 (SharePoint® Online and OneDrive™),
the HiSoftware Security Sheriff suite of solutions
ensure data compliance and security by continuously
monitoring and auditing SharePoint data and
documents against regulatory and corporate policies
to protect against data breaches, unauthorized access
and misuse. The solutions help enforce compliance and
data security policies for privacy and confidentiality,
intellectual property and trade secret protection, data
loss prevention, enterprise social communications,
PII and PCI compliance, HIPAA requirements, and
accessibility guidelines.
Keep Mission Critical Documents
in SharePoint and Office 365
Confidently store highly confidential information in
SharePoint, Office 365—and keep it there. According
to AIIM, 57% of organizations are worried about
SharePoint not meeting their security/compliance
requirements1. Security Sheriff protected sites offer
a range of features to control access to content and
distribution actions. Prevent users from downloading
content to view or edit it, and set restrictions so users
with read only permissions can only access documents
through Sheriff’s secure viewer. Automatically encrypt
confidential documents to prohibit unauthorized
viewing at the file level. Additional controls allow you to
apply fine grain security, making it safe to store even the
most confidential information, consolidate file storage
systems and maximize ROI.
Control the Distribution of
Confidential Documents
Stop accidental and intentional data leakage. Prevent
users from distributing sensitive information by
restricting the actions they can take when editing
Office documents including download, save as, copy/
paste, print and email, in accordance with company
policies. Set controls so confidential attachments can
only be emailed by authorized personnel based on the
classification of the document, to automatically convert
SharePoint attachments to links, and restrict forwarded
documents from being read by secondary recipients.
Security Sheriff extends control of your documents
beyond SharePoint, Office 365 and your domain.
HiSoftware Security Sheriff ®
Content Security & Compliance Solutions for SharePoint® and Office 365™
HiSoftware Security Sheriff ® Key Features
Enforce Policies
Monitor and audit content against
regulatory policies with hundreds of
out-of-the-box checkpoints to validate
compliance with US and international privacy
policies (GLBA, COPPA, Privacy Acts), and
other regulatory mandates including HIPAA,
FISMA, PCI DSS, WCAG and more. Easily
define checkpoints for organizational policies.
Secure Classification
Administrators can easily configure s
ecure metadata and choose values to suit
any business requirement. Authorized users
can classify or declassify documents at the
value level. Once classified, documents will
be automatically controlled according to
defined policies.
Encrypt Documents
Documents can be automatically encrypted
based on their classification, or on the
presence of sensitive data. Only authorized
users will be able to read the content, site
administrators will be excluded, making it
safe to store confidential documents such
as Board discussions, HR documents and
commercially sensitive information.
Control Emailing
Based on the classification of the document
and the authority of the user, documents
can be prevented from being emailed to the
wrong audience.
Quarantine Uploads
Enforce policies and rules about what can
be uploaded and stored in SharePoint
and Office 365. Automated scans detect
documents that are added to libraries against
policies. Automatically restrict, encrypt, alert
administrators or delete files.
Stop Downloads
Prevent downloads to the desktop based
on the classification of the document and
the authority of the user. A secure
document reader helps restrict actions
(edit, print, save as, email) that can be
performed when viewing a document,
based on the user’s permissions.
Permission Management
Automatically apply SharePoint permissions
based on the classification of the document.
File level permissions allow administrators
to reduce the number of sites and libraries
needed for effective collaboration, as well as
minimize the use of folders.
Automatically Scan & Classify
Documents can be scanned and
classified at rest or as they are uploaded
or updated. In this way classification
immediately drives document access,
encryption and distribution, without the need
for user intervention.
Key Benefits
1. Keep mission critical documents in 		
SharePoint and Office 365
2. Enforce governance and compliance 	
policies
3. Secure document viewing and 		
distribution control
4. Dynamic metadata and claims-driven 	
permission management
5. Built on SharePoint
•	 Leverages the Full Business Value
•	 Simplifies Governance and
Increases ROI
•	 Ease of Use / Rapid Deployment
		 www.cryptzone.com	
		 sales@cryptzone.com
		 Twitter: @cryptzone 	
	Americas:
	 +1 888 272 2484 (US & Canada)
	 +1 603 578 1870
Europe, Middle East and Africa:
00 800 9111 3358 (UK, SE, DACH only)
+44 208 899 6189 (For all other countries)
Copyright © 2015 Cryptzone North America Inc. All rights reserved. Cryptzone, the Cryptzone Logo and HiSfoftware Security Sheriff are trademarks of Cryptzone, or its affiliates.
Workflow Supports Business Processes
Use business rules to trigger workflows,
alerts and other processes when users
perform actions on confidential documents
such as add, edit, classify and delete.
Track and Audit Data
Track and alert administrators to certain
user actions. Examine the complete chain
of custody of a document, including who
views, prints and emails it, providing a
complete audit trail in the event of a breach.
1 AIIM Survey: SharePoint Security – A Survey on Compliance with Recommendations for Improvement © AIIM 2012 www.aiim.org © HiSoftware 2012

Más contenido relacionado

Más de David J Rosenthal

A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsDavid J Rosenthal
 
Knowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftKnowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftDavid J Rosenthal
 

Más de David J Rosenthal (20)

Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft Teams
 
What is Microsoft Teams
What is Microsoft TeamsWhat is Microsoft Teams
What is Microsoft Teams
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Knowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftKnowledge and Insights from Microsoft
Knowledge and Insights from Microsoft
 
Microsoft SharePoint Syntex
Microsoft SharePoint SyntexMicrosoft SharePoint Syntex
Microsoft SharePoint Syntex
 

Último

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Último (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Cryptzone HiSoftware Security Sheriff Guide for SharePoint and Office 365

  • 1. Enforce Data Governance and Compliance Policies Ensure your organization complies with regulatory requirements for your industry, such as the Privacy Acts, HIPAA, FISMA, PCI DSS, OMB, and SEC. Security policies are enforced using Active Directory (AD) authentication and SharePoint groups to access, decrypt or perform other user actions. Content is only available to users who meet the classification-driven policies – and business rules to control how authorized users can consume and distribute content are automatically enforced. Reduce the Cost and Effort of Managing Collaboration Break through the confines of provisioning individual sites for each collaborative group. By classifying documents, access is automatically restricted, or rights are granted, regardless of the location of the document. This eliminates the need for administrators to create special sites to manage new groups and their content, significantly reducing the cost and complexity of managing SharePoint and Office 365 and simplifies document permission management. Harness the Power of SharePoint and Office 365 — Without the Risks Cryptzone provides content compliance and security solutions that monitor, enforce and remediate the integrity of unstructured information in content management systems, file shares, social collaboration and public facing websites; with a focus on SharePoint, Office 365 and hybrid environments. Fully integrated with SharePoint 2010, 2013 and Office 365 (SharePoint® Online and OneDrive™), the HiSoftware Security Sheriff suite of solutions ensure data compliance and security by continuously monitoring and auditing SharePoint data and documents against regulatory and corporate policies to protect against data breaches, unauthorized access and misuse. The solutions help enforce compliance and data security policies for privacy and confidentiality, intellectual property and trade secret protection, data loss prevention, enterprise social communications, PII and PCI compliance, HIPAA requirements, and accessibility guidelines. Keep Mission Critical Documents in SharePoint and Office 365 Confidently store highly confidential information in SharePoint, Office 365—and keep it there. According to AIIM, 57% of organizations are worried about SharePoint not meeting their security/compliance requirements1. Security Sheriff protected sites offer a range of features to control access to content and distribution actions. Prevent users from downloading content to view or edit it, and set restrictions so users with read only permissions can only access documents through Sheriff’s secure viewer. Automatically encrypt confidential documents to prohibit unauthorized viewing at the file level. Additional controls allow you to apply fine grain security, making it safe to store even the most confidential information, consolidate file storage systems and maximize ROI. Control the Distribution of Confidential Documents Stop accidental and intentional data leakage. Prevent users from distributing sensitive information by restricting the actions they can take when editing Office documents including download, save as, copy/ paste, print and email, in accordance with company policies. Set controls so confidential attachments can only be emailed by authorized personnel based on the classification of the document, to automatically convert SharePoint attachments to links, and restrict forwarded documents from being read by secondary recipients. Security Sheriff extends control of your documents beyond SharePoint, Office 365 and your domain. HiSoftware Security Sheriff ® Content Security & Compliance Solutions for SharePoint® and Office 365™
  • 2. HiSoftware Security Sheriff ® Key Features Enforce Policies Monitor and audit content against regulatory policies with hundreds of out-of-the-box checkpoints to validate compliance with US and international privacy policies (GLBA, COPPA, Privacy Acts), and other regulatory mandates including HIPAA, FISMA, PCI DSS, WCAG and more. Easily define checkpoints for organizational policies. Secure Classification Administrators can easily configure s ecure metadata and choose values to suit any business requirement. Authorized users can classify or declassify documents at the value level. Once classified, documents will be automatically controlled according to defined policies. Encrypt Documents Documents can be automatically encrypted based on their classification, or on the presence of sensitive data. Only authorized users will be able to read the content, site administrators will be excluded, making it safe to store confidential documents such as Board discussions, HR documents and commercially sensitive information. Control Emailing Based on the classification of the document and the authority of the user, documents can be prevented from being emailed to the wrong audience. Quarantine Uploads Enforce policies and rules about what can be uploaded and stored in SharePoint and Office 365. Automated scans detect documents that are added to libraries against policies. Automatically restrict, encrypt, alert administrators or delete files. Stop Downloads Prevent downloads to the desktop based on the classification of the document and the authority of the user. A secure document reader helps restrict actions (edit, print, save as, email) that can be performed when viewing a document, based on the user’s permissions. Permission Management Automatically apply SharePoint permissions based on the classification of the document. File level permissions allow administrators to reduce the number of sites and libraries needed for effective collaboration, as well as minimize the use of folders. Automatically Scan & Classify Documents can be scanned and classified at rest or as they are uploaded or updated. In this way classification immediately drives document access, encryption and distribution, without the need for user intervention. Key Benefits 1. Keep mission critical documents in SharePoint and Office 365 2. Enforce governance and compliance policies 3. Secure document viewing and distribution control 4. Dynamic metadata and claims-driven permission management 5. Built on SharePoint • Leverages the Full Business Value • Simplifies Governance and Increases ROI • Ease of Use / Rapid Deployment www.cryptzone.com sales@cryptzone.com Twitter: @cryptzone Americas: +1 888 272 2484 (US & Canada) +1 603 578 1870 Europe, Middle East and Africa: 00 800 9111 3358 (UK, SE, DACH only) +44 208 899 6189 (For all other countries) Copyright © 2015 Cryptzone North America Inc. All rights reserved. Cryptzone, the Cryptzone Logo and HiSfoftware Security Sheriff are trademarks of Cryptzone, or its affiliates. Workflow Supports Business Processes Use business rules to trigger workflows, alerts and other processes when users perform actions on confidential documents such as add, edit, classify and delete. Track and Audit Data Track and alert administrators to certain user actions. Examine the complete chain of custody of a document, including who views, prints and emails it, providing a complete audit trail in the event of a breach. 1 AIIM Survey: SharePoint Security – A Survey on Compliance with Recommendations for Improvement © AIIM 2012 www.aiim.org © HiSoftware 2012