Solutions by Need
DLP for Office 365 and SharePoint
SharePoint and Office 365 Content Security
Cryptzone helps public and private sector organizations around the globe assess and control content residing in SharePoint and Office 365. Security Sheriff complements the powerful content publishing and collaborative features in SharePoint and Office 365 by enabling users to monitor content at rest and restrict content in motion to protect against data loss and misuse. Security Sheriff works natively within Microsoft’s products to dynamically restrict the functions a user can access through the ribbon and to automatically apply RMS protection when required.
Security Sheriff Secures Data at Rest
By locating and classifying all data on-premises and in the cloud, encrypting and quarantining when required and then reporting status and compliance violations, Security Sheriff helps organizations meet PII and PCI compliance and HIPAA requirements, enforce data security policies and ensure privacy and confidentiality of intellectual property.
Security Sheriff Secures Data in use and in Transit
Security Sheriff works natively with Microsoft products to dynamically restrict ribbon rules by user/file context in all Microsoft office apps. In addition, Security Sheriff can:
- Restrict views of all files and properties so users can’t discover security policies
- Automatically use Microsoft RMS to encrypt individual files only when the situation requires
- Adjust security based on file and user context – including email recipients
- Automatically apply business policies to files as they move between people
Data security rules can be applied centrally or locally, ensuring user compliance, while enabling content experts to fine-tune rules. Capabilities include the ability to prevent downloads to desktops and mobile devices, controlling access and distribution. High-value documents can also be kept in SharePoint.
Manage Content Security and Permissions More Easily
With Security Sheriff, IT administrators can manage user access without creating more security groups, more sites, libraries or folders. Instead, IT administrators define user claims and access rules efficiently and dynamically control access and user actions.
In Security Sheriff, policies and permissions are managed by the people who know the regulations, the users, and the data, reducing cost and frustration.