Breach of Confidentiality

Apply the appropriate level of encryption to sensitive email and attachments, with Egress Protect.

The risk to confidential data shared by email

95%

of CISOs say company and client data is at risk on email

33%

of organizations don’t use email encryption to protect their sensitive information

85%

of employees caught breaking security protocols suffered negative consequences

One-size-fits-all email encryption doesn’t work

Unauthorized access to personal information is a leading cause of security incidents reported to regulators.  

Relying on people to select the appropriate level of protection can result in under-encryption, when they forget, don’t understand the safeguards required, or simply find it quicker not to encrypt emails. Similarly, securing every outbound email or relying only on keyword policies can lead to over-encryption, which can frustrate senders and their recipients. 

Traditional email encryption solutions are unable to automate email encryption in response to real-time risk, leaving organizations struggling to manage unworkable one-size-fits approaches. 

Stats V2 Breach Of Confidentiality

Securing confidential data on email

Egress Protect provides unrivalled protection for your most sensitive files and email content. Email and file encryption can be integrated transparently into existing workflows or users can be given the choice to protect the content they share. Integration with Egress Prevent provides dynamic automation of protection based on the real-time risk to confidential data as it is shared by email.

Solutions Breach Of Confidentiality 1

Automate the right level of protection​

  • 1 Analyzing the security of the recipient domain(s).​ Our technology performs security checks on recipients and their domains, detecting signals such as whether they're on a blocklist, have incorrectly configured TLS, or lack TLS altogether. 
  • 2 Content inspection for sensitive data in message body and attachments. Customizable policies scan the subject line, message body, and attachments for sensitive data, such as social security numbers, financial details, or other specified keywords and expressions.
  • 3 Automated prompt ​to encrypt. Egress performs a risk assessment of the message and will prompt the user if it identifies sensitive content or a potential security problem with the recipient(s). The email message body and attachments will be seamlessly encrypted with 256-bit AES encryption keeping all data secure and accessible to the intended recipients only.
Solutions Breach Of Confidentiality 2

Easy-to-use, customizable email encryption

  • 4 Easy-to-use drop-down menu, seamlessly integrated into Microsoft 365. A user-friendly Outlook add-in makes it easy for users to encrypt email content by selecting the appropriate option. This menu and related encryption policies are fully customizable by your organization.
  • 5 Granular rights management. Each encryption label applies varying levels of permissions and control, including read-only access, disabled attachment downloads, and restricted forwarding. The different options also assign their recipient authentication.
  • 6 Message-level encryption. Accredited 256-bit AES encryption provides message-level protection in transit and at rest.
Solutions Breach Of Confidentiality 3

Secure email content on the go​

  • 7 Full mobile app. Read and respond to Egress-encrypted emails from your iOS or Android mobile device.
  • 8 Create secure emails on mobile devices. Compose and send emails on your smartphone or any other internet-enabled device.
  • 9 Protect email content sent to and from mobile devices. Accredited 256-bit AES encryption provides message-level protection in transit and at rest.
  • 10 Review and revoke messages from your mobile device. Track, audit, and even revoke email access directly from your device to keep sensitive data safe.
Solutions Breach Of Confidentiality 4

One click access for a seamless recipient experience​

  • 11 Appropriate authentication. Trusted recipients enjoy seamless authentication without needing to log into our web portal. However, portal-based access, multi-factor authentication, and access using a shared secret remain options for when the risk to sensitive data is higher.
Solutions Breach Of Confidentiality 5

Review and revoke Egress encrypted emails that have already been sent

  • 12 Easy access via our Outlook plug-in. Access your administration panel with one click from the ribbon on your Outlook interface.
  • 13 Set time parameters. Set specific timeouts to minimize unauthorized viewing and keep sensitive data safe.
  • 14 User revocation. Fully revoke access to emails when colleagues or third parties are no longer authorized to view previously shared content.
  • 15 Comprehensive email packages. Review granular details including email content, delivery reports, and a comprehensive audit trail of events.
1500W Threat Trends Apr 24 Web Imgs Blog Thin CTA

2024 Phishing Threat Trends Report: January - March insights

Download report
Solutions ATO 3

Cut through the noise to highlight the risks that matter

Reporting on risks such as breach of confidentiality in your email flows can be manual and slow. Even worse, systems can throw too much unnecessary information at you, making it harder to make timely and effective decisions.

Egress Prevent's intelligence platform provides simplified dashboards and critical insights so that administrators can quickly cut through the noise, identify email security risks and, where necessary, remediate.

Solutions ATO 4

Actionable intelligence

Data and analytics should not overwhelm you with information. Updated in real time, our intelligence dashboard offers insights and statistics into email details, risk levels, authentication checks, communication history, and how your people interacted with Protect.

Interested in how Egress Protect  would help avoid breaches in confidentiality in your organization?

Bensons for Beds deploys Egress in M365 to detect and prevent advanced phishing threats and data loss

"By deploying all three solutions from the Intelligent Email Security platform, we are assured that we are protecting against the complete spectrum of inbound and outbound threats in Microsoft 365."

Trusted by global organizations