how to leverage office 365

13
www.watchfulsoftware.com RightsWATCH and how to leverage Office 365 www.watchfulsoftware.com January, 20 th 2016

Upload: watchful-software

Post on 15-Apr-2017

147 views

Category:

Software


0 download

TRANSCRIPT

Page 1: How to leverage office 365

www.

watc

hful

softw

are.

com

RightsWATCH and how to leverage Office 365www.watchfulsoftware.com

January, 20th 2016

Page 2: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2

- INTRODUCTIONS & “HOUSE RULES”

- WHAT WE DO AND HOW RIGHTSWATCH WORKS

- LIVE DEMO

- Q&A

Agenda

Page 3: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3

Introductions

Cátia FrancoCátia serves as Product Marketing Manager for Watchful Software, and is responsible for product strategy, positioning and messaging.

House Rules You are muted centrally. You don’t need to

mute/unmute yourself

This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources

The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel

Page 4: How to leverage office 365

www.

watc

hful

softw

are.

com

RightsWATCH and how to leverage Office 365Cátia FrancoProduct Marketing Manager

Page 5: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 5

WHAT WE DO — Dynamic Data-Centric Classification

WHAT data is truly sensitive?

WHO should have access to it?

HOW is the data to be handled?

WHEN should the classification change?

Sets up and enforces the defined corporate security policy rules which can be triggered based on content, context and metadata

Relieves the user from the workload and overhead of having to know, understand and apply corporate policies

Page 6: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023

Visual Tagging

HOW WE DO IT — to let people share information

© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6

1. Policy-Driven Classification

RightsWATCH implements a Multilevel Security Model to classify information – Company/Scope/Level

Classifies legacy files, current files and e-mails, via a policy driven and/or user driven fashion

Fingerprinting

Dynamic Watermarking2. Enforcing Role-Based Access Control Policies

RightsWATCH classifies the information into your specific levels of classification according to user roles

RightsWATCH marks and tags appropriately with tailored headers, footers, watermarks, disclaimers, tags, to protect the organization

Page 7: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 7

HOW DOES RightsWATCH work?

Page 8: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2014 All Rights Reserved. 8

RightsWATCH Classification in MS Outlook & MS Exchange OWA

Page 9: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9

Identify and classifysensitive data via impactfree user experience

Comprehensive audit trail forforensic analysis, together with enhancing SIEM tools for reporting

Bulk and automatic classification of existing data that resides on the corporate network

Enforcing role-basedaccess control policies

over files, anywhere

Support for BYOD and the abilityto classify and protect sensitive

data on top of MDM

Applying data-centric policies to files and emails to educate and prevent

going against corporate policies

MOBILE DEVICES

LEGACYDATA

WHAT MAKES RightsWATCH different

DATA CLASSIFICATION

LOSSPREVENTIO

N

RIGHTS MANAGEM

ENT

DATAANALYTICS

Page 10: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 10

• Cost of data in wrong hands• Cost of responding to

incidents• Cost of training to

increase user awareness• Cost of auditing

WHAT’S in it for you?

• Fewer insider threat incidents• Increased visibility

with audit trail• Protection extended

to mobile ImprovedCompliance

IncreasedSecurity

DecreasedCosts

IncreasedProductivity

• By taking decisions out of users hands• Having forensics

capabilities for tracking• Also covers legacy

files

• Familiar workflow with no extra steps• Flexible re-

classification• Less time in training

Page 11: How to leverage office 365

www.

watc

hful

softw

are.

com

RightsWATCH and how to leverage Office 365

Q&A

Page 12: How to leverage office 365

www.

watc

hful

softw

are.

com

05/03/2023 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 12

Q&A

Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases

E-mail [email protected] to request a demo of RightsWATCH

This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com

Page 13: How to leverage office 365

www.

watc

hful

softw

are.

com

RightsWATCH and how to leverage Office 365www.watchfulsoftware.com

January, 20th 2016