SlideShare a Scribd company logo
1 of 2
Download to read offline
Enforce Data Governance and
Compliance Policies
Ensure your organization complies with regulatory
requirements for your industry, such as the Privacy
Acts, HIPAA, FISMA, PCI DSS, OMB, and SEC. Security
policies are enforced using Active Directory (AD)
authentication and SharePoint groups to access,
decrypt or perform other user actions. Content is only
available to users who meet the classification-driven
policies – and business rules to control how authorized
users can consume and distribute content are
automatically enforced.
Reduce the Cost and Effort of
Managing Collaboration
Break through the confines of provisioning individual
sites for each collaborative group. By classifying
documents, access is automatically restricted, or
rights are granted, regardless of the location of the
document. This eliminates the need for administrators
to create special sites to manage new groups and their
content, significantly reducing the cost and complexity
of managing SharePoint and Office 365 and simplifies
document permission management.
Harness the Power of SharePoint and
Office 365 — Without the Risks
Cryptzone provides content compliance and security
solutions that monitor, enforce and remediate the
integrity of unstructured information in content
management systems, file shares, social collaboration
and public facing websites; with a focus on SharePoint,
Office 365 and hybrid environments.
Fully integrated with SharePoint 2010, 2013 and
Office 365 (SharePoint® Online and OneDrive™),
the HiSoftware Security Sheriff suite of solutions
ensure data compliance and security by continuously
monitoring and auditing SharePoint data and
documents against regulatory and corporate policies
to protect against data breaches, unauthorized access
and misuse. The solutions help enforce compliance and
data security policies for privacy and confidentiality,
intellectual property and trade secret protection, data
loss prevention, enterprise social communications,
PII and PCI compliance, HIPAA requirements, and
accessibility guidelines.
Keep Mission Critical Documents
in SharePoint and Office 365
Confidently store highly confidential information in
SharePoint, Office 365—and keep it there. According
to AIIM, 57% of organizations are worried about
SharePoint not meeting their security/compliance
requirements1. Security Sheriff protected sites offer
a range of features to control access to content and
distribution actions. Prevent users from downloading
content to view or edit it, and set restrictions so users
with read only permissions can only access documents
through Sheriff’s secure viewer. Automatically encrypt
confidential documents to prohibit unauthorized
viewing at the file level. Additional controls allow you to
apply fine grain security, making it safe to store even the
most confidential information, consolidate file storage
systems and maximize ROI.
Control the Distribution of
Confidential Documents
Stop accidental and intentional data leakage. Prevent
users from distributing sensitive information by
restricting the actions they can take when editing
Office documents including download, save as, copy/
paste, print and email, in accordance with company
policies. Set controls so confidential attachments can
only be emailed by authorized personnel based on the
classification of the document, to automatically convert
SharePoint attachments to links, and restrict forwarded
documents from being read by secondary recipients.
Security Sheriff extends control of your documents
beyond SharePoint, Office 365 and your domain.
HiSoftware Security Sheriff ®
Content Security & Compliance Solutions for SharePoint® and Office 365™
HiSoftware Security Sheriff ® Key Features
Enforce Policies
Monitor and audit content against
regulatory policies with hundreds of
out-of-the-box checkpoints to validate
compliance with US and international privacy
policies (GLBA, COPPA, Privacy Acts), and
other regulatory mandates including HIPAA,
FISMA, PCI DSS, WCAG and more. Easily
define checkpoints for organizational policies.
Secure Classification
Administrators can easily configure s
ecure metadata and choose values to suit
any business requirement. Authorized users
can classify or declassify documents at the
value level. Once classified, documents will
be automatically controlled according to
defined policies.
Encrypt Documents
Documents can be automatically encrypted
based on their classification, or on the
presence of sensitive data. Only authorized
users will be able to read the content, site
administrators will be excluded, making it
safe to store confidential documents such
as Board discussions, HR documents and
commercially sensitive information.
Control Emailing
Based on the classification of the document
and the authority of the user, documents
can be prevented from being emailed to the
wrong audience.
Quarantine Uploads
Enforce policies and rules about what can
be uploaded and stored in SharePoint
and Office 365. Automated scans detect
documents that are added to libraries against
policies. Automatically restrict, encrypt, alert
administrators or delete files.
Stop Downloads
Prevent downloads to the desktop based
on the classification of the document and
the authority of the user. A secure
document reader helps restrict actions
(edit, print, save as, email) that can be
performed when viewing a document,
based on the user’s permissions.
Permission Management
Automatically apply SharePoint permissions
based on the classification of the document.
File level permissions allow administrators
to reduce the number of sites and libraries
needed for effective collaboration, as well as
minimize the use of folders.
Automatically Scan & Classify
Documents can be scanned and
classified at rest or as they are uploaded
or updated. In this way classification
immediately drives document access,
encryption and distribution, without the need
for user intervention.
Key Benefits
1. Keep mission critical documents in 		
SharePoint and Office 365
2. Enforce governance and compliance 	
policies
3. Secure document viewing and 		
distribution control
4. Dynamic metadata and claims-driven 	
permission management
5. Built on SharePoint
•	 Leverages the Full Business Value
•	 Simplifies Governance and
Increases ROI
•	 Ease of Use / Rapid Deployment
		 www.cryptzone.com	
		 sales@cryptzone.com
		 Twitter: @cryptzone 	
	Americas:
	 +1 888 272 2484 (US & Canada)
	 +1 603 578 1870
Europe, Middle East and Africa:
00 800 9111 3358 (UK, SE, DACH only)
+44 208 899 6189 (For all other countries)
Copyright © 2015 Cryptzone North America Inc. All rights reserved. Cryptzone, the Cryptzone Logo and HiSfoftware Security Sheriff are trademarks of Cryptzone, or its affiliates.
Workflow Supports Business Processes
Use business rules to trigger workflows,
alerts and other processes when users
perform actions on confidential documents
such as add, edit, classify and delete.
Track and Audit Data
Track and alert administrators to certain
user actions. Examine the complete chain
of custody of a document, including who
views, prints and emails it, providing a
complete audit trail in the event of a breach.
1 AIIM Survey: SharePoint Security – A Survey on Compliance with Recommendations for Improvement © AIIM 2012 www.aiim.org © HiSoftware 2012

More Related Content

More from David J Rosenthal

Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
David J Rosenthal
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
David J Rosenthal
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
David J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
David J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
David J Rosenthal
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
David J Rosenthal
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 

More from David J Rosenthal (20)

Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft Teams
 
What is Microsoft Teams
What is Microsoft TeamsWhat is Microsoft Teams
What is Microsoft Teams
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Knowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftKnowledge and Insights from Microsoft
Knowledge and Insights from Microsoft
 
Microsoft SharePoint Syntex
Microsoft SharePoint SyntexMicrosoft SharePoint Syntex
Microsoft SharePoint Syntex
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Cryptzone HiSoftware Security Sheriff Guide for SharePoint and Office 365

  • 1. Enforce Data Governance and Compliance Policies Ensure your organization complies with regulatory requirements for your industry, such as the Privacy Acts, HIPAA, FISMA, PCI DSS, OMB, and SEC. Security policies are enforced using Active Directory (AD) authentication and SharePoint groups to access, decrypt or perform other user actions. Content is only available to users who meet the classification-driven policies – and business rules to control how authorized users can consume and distribute content are automatically enforced. Reduce the Cost and Effort of Managing Collaboration Break through the confines of provisioning individual sites for each collaborative group. By classifying documents, access is automatically restricted, or rights are granted, regardless of the location of the document. This eliminates the need for administrators to create special sites to manage new groups and their content, significantly reducing the cost and complexity of managing SharePoint and Office 365 and simplifies document permission management. Harness the Power of SharePoint and Office 365 — Without the Risks Cryptzone provides content compliance and security solutions that monitor, enforce and remediate the integrity of unstructured information in content management systems, file shares, social collaboration and public facing websites; with a focus on SharePoint, Office 365 and hybrid environments. Fully integrated with SharePoint 2010, 2013 and Office 365 (SharePoint® Online and OneDrive™), the HiSoftware Security Sheriff suite of solutions ensure data compliance and security by continuously monitoring and auditing SharePoint data and documents against regulatory and corporate policies to protect against data breaches, unauthorized access and misuse. The solutions help enforce compliance and data security policies for privacy and confidentiality, intellectual property and trade secret protection, data loss prevention, enterprise social communications, PII and PCI compliance, HIPAA requirements, and accessibility guidelines. Keep Mission Critical Documents in SharePoint and Office 365 Confidently store highly confidential information in SharePoint, Office 365—and keep it there. According to AIIM, 57% of organizations are worried about SharePoint not meeting their security/compliance requirements1. Security Sheriff protected sites offer a range of features to control access to content and distribution actions. Prevent users from downloading content to view or edit it, and set restrictions so users with read only permissions can only access documents through Sheriff’s secure viewer. Automatically encrypt confidential documents to prohibit unauthorized viewing at the file level. Additional controls allow you to apply fine grain security, making it safe to store even the most confidential information, consolidate file storage systems and maximize ROI. Control the Distribution of Confidential Documents Stop accidental and intentional data leakage. Prevent users from distributing sensitive information by restricting the actions they can take when editing Office documents including download, save as, copy/ paste, print and email, in accordance with company policies. Set controls so confidential attachments can only be emailed by authorized personnel based on the classification of the document, to automatically convert SharePoint attachments to links, and restrict forwarded documents from being read by secondary recipients. Security Sheriff extends control of your documents beyond SharePoint, Office 365 and your domain. HiSoftware Security Sheriff ® Content Security & Compliance Solutions for SharePoint® and Office 365™
  • 2. HiSoftware Security Sheriff ® Key Features Enforce Policies Monitor and audit content against regulatory policies with hundreds of out-of-the-box checkpoints to validate compliance with US and international privacy policies (GLBA, COPPA, Privacy Acts), and other regulatory mandates including HIPAA, FISMA, PCI DSS, WCAG and more. Easily define checkpoints for organizational policies. Secure Classification Administrators can easily configure s ecure metadata and choose values to suit any business requirement. Authorized users can classify or declassify documents at the value level. Once classified, documents will be automatically controlled according to defined policies. Encrypt Documents Documents can be automatically encrypted based on their classification, or on the presence of sensitive data. Only authorized users will be able to read the content, site administrators will be excluded, making it safe to store confidential documents such as Board discussions, HR documents and commercially sensitive information. Control Emailing Based on the classification of the document and the authority of the user, documents can be prevented from being emailed to the wrong audience. Quarantine Uploads Enforce policies and rules about what can be uploaded and stored in SharePoint and Office 365. Automated scans detect documents that are added to libraries against policies. Automatically restrict, encrypt, alert administrators or delete files. Stop Downloads Prevent downloads to the desktop based on the classification of the document and the authority of the user. A secure document reader helps restrict actions (edit, print, save as, email) that can be performed when viewing a document, based on the user’s permissions. Permission Management Automatically apply SharePoint permissions based on the classification of the document. File level permissions allow administrators to reduce the number of sites and libraries needed for effective collaboration, as well as minimize the use of folders. Automatically Scan & Classify Documents can be scanned and classified at rest or as they are uploaded or updated. In this way classification immediately drives document access, encryption and distribution, without the need for user intervention. Key Benefits 1. Keep mission critical documents in SharePoint and Office 365 2. Enforce governance and compliance policies 3. Secure document viewing and distribution control 4. Dynamic metadata and claims-driven permission management 5. Built on SharePoint • Leverages the Full Business Value • Simplifies Governance and Increases ROI • Ease of Use / Rapid Deployment www.cryptzone.com sales@cryptzone.com Twitter: @cryptzone Americas: +1 888 272 2484 (US & Canada) +1 603 578 1870 Europe, Middle East and Africa: 00 800 9111 3358 (UK, SE, DACH only) +44 208 899 6189 (For all other countries) Copyright © 2015 Cryptzone North America Inc. All rights reserved. Cryptzone, the Cryptzone Logo and HiSfoftware Security Sheriff are trademarks of Cryptzone, or its affiliates. Workflow Supports Business Processes Use business rules to trigger workflows, alerts and other processes when users perform actions on confidential documents such as add, edit, classify and delete. Track and Audit Data Track and alert administrators to certain user actions. Examine the complete chain of custody of a document, including who views, prints and emails it, providing a complete audit trail in the event of a breach. 1 AIIM Survey: SharePoint Security – A Survey on Compliance with Recommendations for Improvement © AIIM 2012 www.aiim.org © HiSoftware 2012