Breach of Confidentiality
Apply the appropriate level of encryption to sensitive email and attachments, with Egress Protect.
The risk to confidential data shared by email
of CISOs say company and client data is at risk on email
of organizations don’t use email encryption to protect their sensitive information
of employees caught breaking security protocols suffered negative consequences
One-size-fits-all email encryption doesn’t work
Unauthorized access to personal information is a leading cause of security incidents reported to regulators.
Relying on people to select the appropriate level of protection can result in under-encryption, when they forget, don’t understand the safeguards required, or simply find it quicker not to encrypt emails. Similarly, securing every outbound email or relying only on keyword policies can lead to over-encryption, which can frustrate senders and their recipients.
Traditional email encryption solutions are unable to automate email encryption in response to real-time risk, leaving organizations struggling to manage unworkable one-size-fits approaches.
Securing confidential data on email
Egress Protect provides unrivalled protection for your most sensitive files and email content. Email and file encryption can be integrated transparently into existing workflows or users can be given the choice to protect the content they share. Integration with Egress Prevent provides dynamic automation of protection based on the real-time risk to confidential data as it is shared by email.
Automate the right level of protection
- 1 Analyzing the security of the recipient domain(s). Our technology performs security checks on recipients and their domains, detecting signals such as whether they're on a blocklist, have incorrectly configured TLS, or lack TLS altogether.
- 2 Content inspection for sensitive data in message body and attachments. Customizable policies scan the subject line, message body, and attachments for sensitive data, such as social security numbers, financial details, or other specified keywords and expressions.
- 3 Automated prompt to encrypt. Egress performs a risk assessment of the message and will prompt the user if it identifies sensitive content or a potential security problem with the recipient(s). The email message body and attachments will be seamlessly encrypted with 256-bit AES encryption keeping all data secure and accessible to the intended recipients only.
Easy-to-use, customizable email encryption
- 4 Easy-to-use drop-down menu, seamlessly integrated into Microsoft 365. A user-friendly Outlook add-in makes it easy for users to encrypt email content by selecting the appropriate option. This menu and related encryption policies are fully customizable by your organization.
- 5 Granular rights management. Each encryption label applies varying levels of permissions and control, including read-only access, disabled attachment downloads, and restricted forwarding. The different options also assign their recipient authentication.
- 6 Message-level encryption. Accredited 256-bit AES encryption provides message-level protection in transit and at rest.
Secure email content on the go
- 7 Full mobile app. Read and respond to Egress-encrypted emails from your iOS or Android mobile device.
- 8 Create secure emails on mobile devices. Compose and send emails on your smartphone or any other internet-enabled device.
- 9 Protect email content sent to and from mobile devices. Accredited 256-bit AES encryption provides message-level protection in transit and at rest.
- 10 Review and revoke messages from your mobile device. Track, audit, and even revoke email access directly from your device to keep sensitive data safe.
One click access for a seamless recipient experience
- 11 Appropriate authentication. Trusted recipients enjoy seamless authentication without needing to log into our web portal. However, portal-based access, multi-factor authentication, and access using a shared secret remain options for when the risk to sensitive data is higher.
Review and revoke Egress encrypted emails that have already been sent
- 12 Easy access via our Outlook plug-in. Access your administration panel with one click from the ribbon on your Outlook interface.
- 13 Set time parameters. Set specific timeouts to minimize unauthorized viewing and keep sensitive data safe.
- 14 User revocation. Fully revoke access to emails when colleagues or third parties are no longer authorized to view previously shared content.
- 15 Comprehensive email packages. Review granular details including email content, delivery reports, and a comprehensive audit trail of events.
CISO Strategy Guide: Quishing attacks in Microsoft 365
Download guideCut through the noise to highlight the risks that matter
Reporting on risks such as breach of confidentiality in your email flows can be manual and slow. Even worse, systems can throw too much unnecessary information at you, making it harder to make timely and effective decisions.
Egress Prevent's intelligence platform provides simplified dashboards and critical insights so that administrators can quickly cut through the noise, identify email security risks and, where necessary, remediate.
Actionable intelligence
Data and analytics should not overwhelm you with information. Updated in real time, our intelligence dashboard offers insights and statistics into email details, risk levels, authentication checks, communication history, and how your people interacted with Protect.
Interested in how Egress Protect would help avoid breaches in confidentiality in your organization?
Bensons for Beds deploys Egress in M365 to detect and prevent advanced phishing threats and data loss
"By deploying all three solutions from the Intelligent Email Security platform, we are assured that we are protecting against the complete spectrum of inbound and outbound threats in Microsoft 365."