SlideShare a Scribd company logo
1 of 12
Boldon James Classifier
1 product, 8 fantastic solutions to your data loss prevention policy
Email
Office
OWA
File
Notes
Power
SP
Mobile
TM
TM
© IT Governance Ltd 2013
Classifier - The Ribbon Bar
Classifier sits seamlessly within
the Microsoft Ribbon Bar
2
TM
© IT Governance Ltd 2013
Drop Down Menu/Quick Click –
Labelling Scheme
End user can be presented with either drop down menus or
Quick Click buttons
3
TM
© IT Governance Ltd 2013
Drop Down Menu Secondary
Descriptor
Helps the end user to choose a more
specific label
4
TM
© IT Governance Ltd 2013
Assisted Labelling Ability
Assisted Labelling guides the end user based on the
labelling classification they choose
5
TM
© IT Governance Ltd 2013
Favourites Menu
If the end user consistently uses certain
labels, they can simply go to favourites
6
TM
© IT Governance Ltd 2013
Policy Check Box
Policy Check Box gives the end user the opportunity to check they
have Labelled correctly before the message is sent to recipient
7
TM
© IT Governance Ltd 2013
What The Recipient Sees
The recipient receives the
email and sees various
indicators of how the
message is labelled. These
are all variable environments
and can be configured in line
with the organisation’s data
policy
Shown in the red box is
what we term LLOT –
“Last line of Text”
Shown in the red box is the
suffix of the label chosen -
could also be a prefix
Shown in the red box is
what we term FLOT –
“First line of Text”
8
TM
© IT Governance Ltd 2013
The “Oops” Scenario
Policy check for user clearance or email domain clearance, ensures information is
controlled and mitigates against sending to wrong recipients or domains you’d
rather not go to.
9
TM
© IT Governance Ltd 2013
Restricted Information - Correct
Scenario
Right Person P
Right level of classification P
Sensitive Information Protected P
10
TM
© IT Governance Ltd 2013
Information Classification
Software
View the modules available:
• Email Classifier
• Office Classifier
• File Classifier
• OWA Classifier
• SharePoint Classifier
• Mobile Filter
• Power Classifier
11
TM
© IT Governance Ltd 2013
Contact Us
Find out more:
http://www.itgovernance.co.uk/data-classification-
software.aspx
Email us: servicecentre@itgovernance.co.uk
Call us: +44 (0) 845 070 1750
12

More Related Content

More from IT Governance Ltd

More from IT Governance Ltd (20)

Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Information Classifier Software

  • 1. Boldon James Classifier 1 product, 8 fantastic solutions to your data loss prevention policy Email Office OWA File Notes Power SP Mobile TM
  • 2. TM © IT Governance Ltd 2013 Classifier - The Ribbon Bar Classifier sits seamlessly within the Microsoft Ribbon Bar 2
  • 3. TM © IT Governance Ltd 2013 Drop Down Menu/Quick Click – Labelling Scheme End user can be presented with either drop down menus or Quick Click buttons 3
  • 4. TM © IT Governance Ltd 2013 Drop Down Menu Secondary Descriptor Helps the end user to choose a more specific label 4
  • 5. TM © IT Governance Ltd 2013 Assisted Labelling Ability Assisted Labelling guides the end user based on the labelling classification they choose 5
  • 6. TM © IT Governance Ltd 2013 Favourites Menu If the end user consistently uses certain labels, they can simply go to favourites 6
  • 7. TM © IT Governance Ltd 2013 Policy Check Box Policy Check Box gives the end user the opportunity to check they have Labelled correctly before the message is sent to recipient 7
  • 8. TM © IT Governance Ltd 2013 What The Recipient Sees The recipient receives the email and sees various indicators of how the message is labelled. These are all variable environments and can be configured in line with the organisation’s data policy Shown in the red box is what we term LLOT – “Last line of Text” Shown in the red box is the suffix of the label chosen - could also be a prefix Shown in the red box is what we term FLOT – “First line of Text” 8
  • 9. TM © IT Governance Ltd 2013 The “Oops” Scenario Policy check for user clearance or email domain clearance, ensures information is controlled and mitigates against sending to wrong recipients or domains you’d rather not go to. 9
  • 10. TM © IT Governance Ltd 2013 Restricted Information - Correct Scenario Right Person P Right level of classification P Sensitive Information Protected P 10
  • 11. TM © IT Governance Ltd 2013 Information Classification Software View the modules available: • Email Classifier • Office Classifier • File Classifier • OWA Classifier • SharePoint Classifier • Mobile Filter • Power Classifier 11
  • 12. TM © IT Governance Ltd 2013 Contact Us Find out more: http://www.itgovernance.co.uk/data-classification- software.aspx Email us: servicecentre@itgovernance.co.uk Call us: +44 (0) 845 070 1750 12

Editor's Notes

  1. Boldon James Classifier Solutions are software plugins which are deployed via an MSI (a Windows software installer)to the end user’s desktop and appear seamlessly within the Ribbon Bar ensuring disruption to the end user is minimised when labelling their messages or documents. The administrator deploys via the Active Directory or File Store and can choose what policy rights specific users or groups get – this is very granular and can be down to the individual user if need is there. The Boldon James Classifier solutions have two main functions:1: They allow the user to visually label their messages and documents. 2: They create underlying meta data which the machine reads and then assists in invoking other technologies such as encryption or rights managementin line with the organisation's rules on the handling and release of information.
  2. The Administrator can choose to deploy the Classifier with either drop down menus or Quick Click buttons across the whole organisation or to specific user groups. This can help ensure the end user experience is as painless as need be and in early deployment scenarios can help decide which method works best in certain environments.
  3. Where there are multiple departments, cost centres or even projects requiring distinct levels of classification, there is the ability to provide up to 3 pull down menus with an infinite number of descriptors.This allows the end user to label at a more granular level and based on Company policies classify in accordance. Different departments may have different security labelling requirements, but also within departments there may need to be different levels of sensitivity. These control vectors can assist other technologies, such as DLP, where stronger content analysis may distinguish what can and can’t be sent more clearly.
  4. Classifier also has the ability to guide end users with assisted labelling capability. This means that menus can be hidden at certain levels of classification and introduced at others.Scenario 1: Labelling information as “unclassified” means the end-user will only be presented with a single menu.Scenario 2: Labelling information as “protect” will introduce a secondary menu allowing the end user to associate this information with a department, project, etc.Scenario 3: Labelling information as “protect”, then choosing, say, the contracts descriptor, will introduce a 3rd pull down menu where, say, “finance” only can receive this information.*** For organisations who wish to ensure their data policy is adhered to and met this can be a very compelling tool to ensure their staff stay within set boundaries.
  5. Favourites Menu is a Boldon James USP and created to assist end users who regularly send to the same groups. This Favourites button again can incorporate the levels of granularity mentioned in Assisted Labelling, i.e. you send information which is protected and relates to contracts to Finance on a regular basis. Your favourites button would show this as “Protect Contracts Finance”.
  6. Policy Checking ensures the end user is happy they have Labelled correctly (this can be turned off if required to speed up labelling). It’s a good educational tool to have in the early days and should be seen as an aid. Reporting can gauge whether it’s time to switch off or continue to keep in place.
  7. Sending an email to the right person is important and visual marking of email and documents helps ensure the right people are receiving the right information. The visual marking shown in the email above are all variable and can be switched on or off to suit your organisation’s needs. What you see is that the level of classification chosen by the sender follows through to both the Subject pane and can be presented in full format or as a suffix or prefix. The FLOT, which is an old military term, again shows the classification label chosen with variable information. The LLOT below the main subject matter of the message can give brevity to the ownership of the information sent.
  8. It happens, let’s face it. You’re rushed and you accidently send an email to the wrong person, someone with a similar name, or someone with the wrong domain name– Bolden James Classifier can and would have stopped this happening!
  9. This is what the end user wants to achieve - sending the right information to the right person with the right level of classification. The benefit to the Organisation is securing their data, protecting their reputation, mitigating fines for data breaches and the extra value-add is data storage costs can be reduced. This can be achieved because not only does the label have a visual property, it also has underlying meta data which can work with archiving solutions to mandate deletion dates. With Organisations storing all data created because they’re not sure what they legally need to keep, Labelling can help distinguish the important content from the rest. Companies can also choose to store data based on the importance of higher or lower specified data storage units.