SlideShare a Scribd company logo
1 of 13
www.watchfulsoftware.com
RightsWATCH and how to leverage Office 365
www.watchfulsoftware.com January, 20th 2016
www.watchfulsoftware.com
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2
- INTRODUCTIONS & “HOUSE RULES”
- WHAT WE DO AND HOW RIGHTSWATCH WORKS
- LIVE DEMO
- Q&A
Agenda
www.watchfulsoftware.com
Introductions
Cátia Franco
Cátia serves as Product Marketing Manager for
Watchful Software, and is responsible for
product strategy, positioning and messaging.
House Rules
 You are muted centrally. You don’t need to
mute/unmute yourself
 This webinar is being recorded. You’ll have access to
it On-demand at
www.watchfulsoftware.com/en/resources
 The Q&A session will be at the end. You are
welcomed to enter questions anytime, using the
Questions feature in the GoToWebinar control panel
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
www.watchfulsoftware.com
RightsWATCH and how to leverage Office 365
Cátia Franco
Product Marketing Manager
www.watchfulsoftware.com
WHAT WE DO — Dynamic Data-Centric Classification
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 5
WHAT data is truly sensitive?
WHO should have access to it?
HOW is the data to be handled?
WHEN should the classification change?
Sets up and enforces the defined
corporate security policy rules which can
be triggered based on content, context
and metadata
Relieves the user from the workload and
overhead of having to know, understand
and apply corporate policies
www.watchfulsoftware.com
Visual
Tagging
HOW WE DO IT — to let people share information
2/26/2016
© Copyright www.watchfulsoftware.com. 2016 All Rights Reserved.
6
1. Policy-Driven Classification
 RightsWATCH implements a Multilevel Security
Model to classify information – Company/Scope/Level
 Classifies legacy files, current files and e-mails, via a
policy driven and/or user driven fashion
Fingerprinting
Dynamic
Watermarking2. Enforcing Role-Based Access Control Policies
 RightsWATCH classifies the information into your
specific levels of classification according to user roles
 RightsWATCH marks and tags appropriately with
tailored headers, footers, watermarks, disclaimers,
tags, to protect the organization
www.watchfulsoftware.com
HOW DOES RightsWATCH work?
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 7
www.watchfulsoftware.com
RightsWATCH Classification in MS Outlook & MS Exchange OWA
2/26/2016 © Copyright www.watchfulsoftware.com. 2014 All Rights Reserved. 8
www.watchfulsoftware.com
Identify and classify
sensitive data via impact
free user experience
Comprehensive audit trail for
forensic analysis, together with
enhancing SIEM tools for reporting
Bulk and automatic classification of
existing data that resides on the
corporate network
Enforcing role-based
access control policies
over files, anywhere
Support for BYOD and the ability
to classify and protect sensitive
data on top of MDM
Applying data-centric policies to files
and emails to educate and prevent
going against corporate policies
MOBILE
DEVICES
LEGACY
DATA
WHAT MAKES RightsWATCH different
2/26/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
DATA
CLASSIFICATION
LOSS
PREVENTION
RIGHTS
MANAGEMENT
DATA
ANALYTICS
www.watchfulsoftware.com
• Cost of data in wrong
hands
• Cost of responding to
incidents
• Cost of training to
increase user awareness
• Cost of auditing
WHAT’S in it for you?
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 10
• Fewer insider threat
incidents
• Increased visibility with
audit trail
• Protection extended to
mobile Improved
Compliance
Increased
Security
Decreased
Costs
Increased
Productivity
• By taking decisions out
of users hands
• Having forensics
capabilities for tracking
• Also covers legacy files
• Familiar workflow with no
extra steps
• Flexible re-classification
• Less time in training
www.watchfulsoftware.com
RightsWATCH and how to leverage Office 365
Q&A
www.watchfulsoftware.com
Q&A
2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 12
 Check out the “Resources” area on www.watchfulsoftware.com and watch
short product walkthrough demonstrations of how RightsWATCH address a
comprehensive set of use cases
 E-mail info@watchfulsoftware.com to request a demo of RightsWATCH
 This webinar is being recorded. You’ll have access to it On-demand at
www.watchfulsoftware.com
www.watchfulsoftware.com
RightsWATCH and how to leverage Office 365
www.watchfulsoftware.com January, 20th 2016

More Related Content

Similar to How to leverage office 365

The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security BattlegroundWatchful Software
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate dataWatchful Software
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirementsWatchful Software
 
Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingWatchful Software
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Ravindran Vasu
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organizationWatchful Software
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!DevOps.com
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolDavid Castro
 
RWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance ProgramRWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance ProgramDATAVERSITY
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHWatchful Software
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management SolutionsMotty Ben Atia
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataEnterprise Management Associates
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...akquinet enterprise solutions GmbH
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessCA Technologies
 

Similar to How to leverage office 365 (20)

The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirements
 
Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!
 
Transcript
TranscriptTranscript
Transcript
 
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding ToolPitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
Pitch Deck to SMB End Users | Kaseya Partner Program VAR Onboarding Tool
 
RWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance ProgramRWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance Program
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
 
LINK360-Brochure
LINK360-BrochureLINK360-Brochure
LINK360-Brochure
 
Scopia Management Solutions
Scopia Management SolutionsScopia Management Solutions
Scopia Management Solutions
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
ttribute-based Data Masking: How to effectivelyimprove the protectionof your ...
 
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to SuccessPre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
Pre-Con Ed: Software Asset Management Jump Start: Ingredients to Success
 

More from Watchful Software

Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationWatchful Software
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationWatchful Software
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationWatchful Software
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classificationWatchful Software
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricksWatchful Software
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric SecurityWatchful Software
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatWatchful Software
 

More from Watchful Software (7)

Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ
 

Recently uploaded (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
ManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide DeckManageIQ - Sprint 236 Review - Slide Deck
ManageIQ - Sprint 236 Review - Slide Deck
 

How to leverage office 365

  • 1. www.watchfulsoftware.com RightsWATCH and how to leverage Office 365 www.watchfulsoftware.com January, 20th 2016
  • 2. www.watchfulsoftware.com 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 2 - INTRODUCTIONS & “HOUSE RULES” - WHAT WE DO AND HOW RIGHTSWATCH WORKS - LIVE DEMO - Q&A Agenda
  • 3. www.watchfulsoftware.com Introductions Cátia Franco Cátia serves as Product Marketing Manager for Watchful Software, and is responsible for product strategy, positioning and messaging. House Rules  You are muted centrally. You don’t need to mute/unmute yourself  This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources  The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
  • 4. www.watchfulsoftware.com RightsWATCH and how to leverage Office 365 Cátia Franco Product Marketing Manager
  • 5. www.watchfulsoftware.com WHAT WE DO — Dynamic Data-Centric Classification 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 5 WHAT data is truly sensitive? WHO should have access to it? HOW is the data to be handled? WHEN should the classification change? Sets up and enforces the defined corporate security policy rules which can be triggered based on content, context and metadata Relieves the user from the workload and overhead of having to know, understand and apply corporate policies
  • 6. www.watchfulsoftware.com Visual Tagging HOW WE DO IT — to let people share information 2/26/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6 1. Policy-Driven Classification  RightsWATCH implements a Multilevel Security Model to classify information – Company/Scope/Level  Classifies legacy files, current files and e-mails, via a policy driven and/or user driven fashion Fingerprinting Dynamic Watermarking2. Enforcing Role-Based Access Control Policies  RightsWATCH classifies the information into your specific levels of classification according to user roles  RightsWATCH marks and tags appropriately with tailored headers, footers, watermarks, disclaimers, tags, to protect the organization
  • 7. www.watchfulsoftware.com HOW DOES RightsWATCH work? 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 7
  • 8. www.watchfulsoftware.com RightsWATCH Classification in MS Outlook & MS Exchange OWA 2/26/2016 © Copyright www.watchfulsoftware.com. 2014 All Rights Reserved. 8
  • 9. www.watchfulsoftware.com Identify and classify sensitive data via impact free user experience Comprehensive audit trail for forensic analysis, together with enhancing SIEM tools for reporting Bulk and automatic classification of existing data that resides on the corporate network Enforcing role-based access control policies over files, anywhere Support for BYOD and the ability to classify and protect sensitive data on top of MDM Applying data-centric policies to files and emails to educate and prevent going against corporate policies MOBILE DEVICES LEGACY DATA WHAT MAKES RightsWATCH different 2/26/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9 DATA CLASSIFICATION LOSS PREVENTION RIGHTS MANAGEMENT DATA ANALYTICS
  • 10. www.watchfulsoftware.com • Cost of data in wrong hands • Cost of responding to incidents • Cost of training to increase user awareness • Cost of auditing WHAT’S in it for you? 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 10 • Fewer insider threat incidents • Increased visibility with audit trail • Protection extended to mobile Improved Compliance Increased Security Decreased Costs Increased Productivity • By taking decisions out of users hands • Having forensics capabilities for tracking • Also covers legacy files • Familiar workflow with no extra steps • Flexible re-classification • Less time in training
  • 11. www.watchfulsoftware.com RightsWATCH and how to leverage Office 365 Q&A
  • 12. www.watchfulsoftware.com Q&A 2/26/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 12  Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases  E-mail info@watchfulsoftware.com to request a demo of RightsWATCH  This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com
  • 13. www.watchfulsoftware.com RightsWATCH and how to leverage Office 365 www.watchfulsoftware.com January, 20th 2016

Editor's Notes

  1. The specified criteria are not mutually exclusive, i.e. organizations can set up policy rules based on several criteria at the same time. Simply stated, policy driven rules can be set “If ALL of the conditions are met” or “If ANY of the conditions are met”. RightsWATCH’s policy driven engine can be set to trigger the following types of rules: Default classifications of e-mails and files Suggested classification of e-mails and files Enforced classification of e-mails and files Presenting disclaimers that need to be signed, for the user to acknowledge the policy being applied Warnings that are presented to users Blocking users from performing actions (ex: sending an email, saving a file) 1. Content – Keywords, phrases, regular expressions (PII, PHI, PCI,…), data formats, partial document matching, … 2. Context – Location (ex: file path), e-mail headers (ex: sender, recipients, e-mail domain addresses, …) Metadata – Current classification and file properties (ex: size, type, date, status, category, author, manager, hostname, owner, user, …)
  2. Start with Increased Security and go clockwise. Give exemples of features related to each point, for example: Increased Security: - Protection extended to mobile (addressing the BYOD paradigm and supporting MDM software) Improved Compliance: - Also covers legacy files (with the Global Protector capability) Increased Productivity: - Flexible re-classification (using ITA, for example) Decreased Costs: - Cost of auditing (refer to the Monit console capability)