Simple Encryption Platform
With SEP, encryption persists with files as they travel anywhere within an enterprise, from SharePoint to email, to outside corporate boundaries, onto a thumb drive or copied to a laptop or tablet.
SEP is designed to empower security administrators and end users to secure data easily, whether information is in transit (email, portable and digital media) or stored on a corporate network, cloud-based storage or SharePoint repository. SEP’s approach is to provide automated authentication and key management that ensures an appropriate level of access rights to all copies of a document with access control lists being transparently updated, wherever they are located.
However files travel within an enterprise or outside corporate boundaries – by SharePoint, email, thumb drive, optical disk or direct download – SEP delivers secure, persistent encryption and centrally managed control. In addition, you have the power to determine who has access to your documents and what they are doing with them, no matter where that content rests. Overall, an organization doesn’t have to assume that one-time authorization equals permanent authorization, so you are able to configure SEP clients to authenticate each and every time a user tries to access a protected document. The SEP platform provides a significant amount of flexibility. For instance, the SEP platform can be installed in an on-premise scenario or delivered as a cloud service.
USB and Portable Storage
Secured eFile extends SEP’s encryption to file systems on any medium or device, providing portable protection and automatic data compression on enterprise file servers, end-user laptops and cloud storage services, such as Dropbox. Secured eUSB extends this protection to removable media – thumb drives, portable hard drives and optical DVD, CD-R and Blu-ray discs. This is where SEP’s centralized administration really comes into its own. The platform can be configured to require synchronization with the central encryption server each time access to a particular document is requested, reducing the risk of data compromise and exposure.