Clearswift Information Governance Server (IGS) provides additional data loss prevention (DLP) features to protect your organization’s valuable intellectual property or classified data from accidental or malicious data breaches.
It acts as a secure central repository for document owners to register classified and sensitive information – e.g., M&A projects, payroll information, intellectual property and product designs – to protect it from accidental, unauthorized sharing or malicious breaches both internally and externally.
Files are registered using a web browser or through a client application where text is extracted and registered in a hashed form. If registered files or fragments of these files are emailed to unauthorized recipients internally or externally, or shared over the web to unsanctioned sites, action is taken according to policy set for that data.
The Clearswift IGS integrates seamlessly with all Clearswift Secure Gateways and ARgon for Email, enabling you to detect when information registered within files is in transit.
Key Benefits of Information Governance Server
The IGS allows users to register sensitive documents, or pieces of information within documents, through a simple-to-use web interface or a Windows client which enables single or multiple file registrations.
Users can register sensitive documents either manually or automatically, based on rules, to apply their sensitivity levels using Top Secret, Secret, Informational, and/or Unclassified.
Fingerprints are created using a one-way hashing algorithm to ensure that any data cannot be reverse engineered into its original format. The IGS database holds the full fingerprint values as well as the partial information fingerprints right down to an individual sentence.
The registered document owners are informed of any violations if that document, or even a fragment of it, is uploaded to a website, sent internally, or emailed to an external recipient.
If a file changes name or even format, for example from a Word document to a PDF, or if an extract is cut and pasted into a new document, the registered information can still be discovered.
Depending on the security policy applied, the transfer can be blocked and the person breaking policy, and/or the compliance team and/or the document owner, can be notified of the event for further action.
The Gateways analyze the content of data transfers, and use the IGS to identify whether data is sensitive. The Gateways can then apply policy in real-time based on content, authorization, and the regulatory requirements, including geography, data type (i.e. PII, payment, national security, healthcare, etc.), purpose conditions and security treatment.
Compliance Officers and CISOs can create reports to understand what data is being registered, by whom and where the information is going.
Dashboards provide at-a-glance violation details, breach statistics and user activity to support audit and incident management.
Information Governance Server Datasheet
Protect intellectual property and classified data from accidental or malicious breaches
Not all information is created equal – some is more valuable than others – so it makes sense to protect valuable information that is of critical importance to your organization.
The Information Governance Server (IGS) sits in the heart of the network and acts as a central repository for your critical information. Registered information is tracked by the system through fingerprinting. The IGS database holds the full fingerprint values as well as the partial information fingerprints. IGS with its ability to track millions of pieces of information can then enhance Data Loss Prevention solutions by enabling the detection of free form information.
Discover how the IGS can support your Information Governance or Critical Information Protection strategies.