Download - How to leverage office 365
www.
watc
hful
softw
are.
com
RightsWATCH and how to leverage Office 365www.watchfulsoftware.com
January, 20th 2016
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2
- INTRODUCTIONS & “HOUSE RULES”
- WHAT WE DO AND HOW RIGHTSWATCH WORKS
- LIVE DEMO
- Q&A
Agenda
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
Introductions
Cátia FrancoCátia serves as Product Marketing Manager for Watchful Software, and is responsible for product strategy, positioning and messaging.
House Rules You are muted centrally. You don’t need to
mute/unmute yourself
This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources
The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel
www.
watc
hful
softw
are.
com
RightsWATCH and how to leverage Office 365Cátia FrancoProduct Marketing Manager
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 5
WHAT WE DO — Dynamic Data-Centric Classification
WHAT data is truly sensitive?
WHO should have access to it?
HOW is the data to be handled?
WHEN should the classification change?
Sets up and enforces the defined corporate security policy rules which can be triggered based on content, context and metadata
Relieves the user from the workload and overhead of having to know, understand and apply corporate policies
www.
watc
hful
softw
are.
com
05/03/2023
Visual Tagging
HOW WE DO IT — to let people share information
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6
1. Policy-Driven Classification
RightsWATCH implements a Multilevel Security Model to classify information – Company/Scope/Level
Classifies legacy files, current files and e-mails, via a policy driven and/or user driven fashion
Fingerprinting
Dynamic Watermarking2. Enforcing Role-Based Access Control Policies
RightsWATCH classifies the information into your specific levels of classification according to user roles
RightsWATCH marks and tags appropriately with tailored headers, footers, watermarks, disclaimers, tags, to protect the organization
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 7
HOW DOES RightsWATCH work?
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2014 All Rights Reserved. 8
RightsWATCH Classification in MS Outlook & MS Exchange OWA
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
Identify and classifysensitive data via impactfree user experience
Comprehensive audit trail forforensic analysis, together with enhancing SIEM tools for reporting
Bulk and automatic classification of existing data that resides on the corporate network
Enforcing role-basedaccess control policies
over files, anywhere
Support for BYOD and the abilityto classify and protect sensitive
data on top of MDM
Applying data-centric policies to files and emails to educate and prevent
going against corporate policies
MOBILE DEVICES
LEGACYDATA
WHAT MAKES RightsWATCH different
DATA CLASSIFICATION
LOSSPREVENTIO
N
RIGHTS MANAGEM
ENT
DATAANALYTICS
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 10
• Cost of data in wrong hands• Cost of responding to
incidents• Cost of training to
increase user awareness• Cost of auditing
WHAT’S in it for you?
• Fewer insider threat incidents• Increased visibility
with audit trail• Protection extended
to mobile ImprovedCompliance
IncreasedSecurity
DecreasedCosts
IncreasedProductivity
• By taking decisions out of users hands• Having forensics
capabilities for tracking• Also covers legacy
files
• Familiar workflow with no extra steps• Flexible re-
classification• Less time in training
www.
watc
hful
softw
are.
com
RightsWATCH and how to leverage Office 365
Q&A
www.
watc
hful
softw
are.
com
05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 12
Q&A
Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases
E-mail [email protected] to request a demo of RightsWATCH
This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com
www.
watc
hful
softw
are.
com
RightsWATCH and how to leverage Office 365www.watchfulsoftware.com
January, 20th 2016