SlideShare a Scribd company logo
Egress Switch
                                              Technical Data Sheet




                                          Egress Switch Secure Data Exchange
                                          Are you in control of the information you share?

                                          Over one third of data loss incidents happen at the hands of third parties. When
                                          information is shared with customers, partners, or outsourced, there is a greater risk that
                                          the information will not be handled with the same care that is used internally. Loss of
                                          sensitive data can raise compliance issues, often involves unexpected cleanup costs, and
                                          invariably leads to damaged business reputation. That’s why Egress developed Switch to
                                          protect and control shared information wherever it goes – however it gets there.
Benefits of Egress Switch
                                          Egress Switch is a new generation of security software enabling policy to follow the data
• Protect and control sensitive           wherever it resides!
   information
   Control who can access
   information and how it is used –       Security Made Easy                              Unified Security Platform
   no matter where it goes or how it
   gets there.                            We operate in a market defined by               Sharing information between partners
                                          compliance yet driven by convenience.           and clients demands flexible and robust
• Real time revocation
   Revoke access to shared                This modern day paradox has invariably          technology. While email provides a
   information in real-time even after    contributed to the proliferation of data        convenient method to transfer small
   it has left your physical control.
                                          loss incidents throughout society. The          amounts of information, it is often highly
• Full audit trail                        solution to this problem is clear. In order     restrictive when sharing large amounts of
   Compliance and reporting               to successfully embed security into the         data.
   needs are satisfied for every
   authorised or unauthorised             fabric of business communication it is
   access attempt.                        essential to deliver simple, integrated         Egress Switch offers complete protection
• No infrastructure needed                solutions, designed to make sharing             of outbound data regardless of file size or
   Software as a Service makes it easy    information easy and enforce recipient          transport mechanism. Secure with ease
   for you to enroll and deploy - with
   no additional server infrastructures   accountability at all times.                    any confidential information sent by
   required.                                                                              email, burnt to CD/DVD, or uploaded to
                                          Stay In Control & Maintain Visibility
                                                                                          Cloud Servers and avoid ‘point solutions’
• Free for recipients to use
   As a Switch subscriber your            Egress Switch goes beyond the capabilities      that fail to deliver unified control.
   recipients are entitled to use the     of traditional protection. Legacy
   product completely free of charge
   when sending confidential data to      encryption not only does little to prevent      Centralised Web Based Management
   you and other paying subscribers.      third parties from mishandling shared
                                                                                          The key to success when exchanging
• Access data on the move                 information, but also proves cumbersome
                                                                                          sensitive data is the ability to customise
   Access secure data anywhere on         to use, resulting in a breakdown in secure
   any device with the zero footprint
                                                                                          workflow centrally, enabling users to
                                          communication.
   web access client or dedicated                                                         perform their daily tasks without
   apps for iPhone, iPad & Blackberry
                                                                                          introducing any additional steps. Using
   devices.                               To address this worldwide challenge
                                                                                          the Switch hosted service, not only do you
• Easy to use means better security       Egress Switch offers a new and exciting
                                                                                          benefit from infrastructure cost savings,
   Simple user operation means no         way to secure information distributed by
   workflow changes or complicated                                                        but also deliver centralised enforcement
   steps to forget.                       email, CD/DVD, USB, FTP, or HTTP Web
                                                                                          of security policy, without disrupting core
                                          Servers. Don’t allow confidential data to
                                                                                          business processes.
                                          fall into the wrong hands. Take back
                                          control and maintain visibility at all times!




                                                                                                   © Egress Software Technologies Ltd 2012
                                                                                                      tel: 0871 376 0014 fax: 020 7624 8200
                                                                                                web: www.egress.com email: info@egress.com
Flexible Low Cost Infrastructure
Leveraging patented key management and a choice of on-premise or                            SharePoint) to enable users to upload large files to the internet or to
hosted infrastructure, Egress Switch enables you to rapidly deploy                          local secure servers. Confidential files are encrypted locally then
encryption throughout your business, without the need for end user                          uploaded via a secure channel to administrator defined server addresses.
training.                                                                                   Recipients are then notified of the secure file location to download. Files
                                                                                            downloaded from the secure server still have the added benefit of
                                                                                            ’follow the data’ encryption and can be managed in real-time like any
Desktop & Gateway Email Encryption                                                          other Switch file delivery mechanism. Cloud storage is also provided for
Sending messages and attachments by email remains the most popular                          organisations that want to avoid the cost and infrastructure required for
business tool for sharing information. For this reason, confidential data is                hosting and managing the uploaded information.
increasingly sent to unauthorised recipients accidentally resulting in
costly fines and damaged reputations.                                                       Secure Removable Media
Egress Switch provides a unique and transparent way to encrypt email                        Physical media such as CD/DVD and USB flash drives are popular and
that is simple to use and fast to deploy using integrated desktop,                          cost effective options for exchanging large amounts of information.
gateway, and mobile applications. MS Outlook and Lotus Notes add-ins                        Egress Switch enables organisations to share information on any type of
enable users to send and receive information in the usual manner. The                       removable media. The Egress Switch client includes an integrated
Egress Switch policy engine removes unnecessary decisions, and                              burning application for securely authoring CDs, DVDs and Blue Ray
administrators can configure policies such as enforced encryption based                     media. Unlike traditional security products Egress Switch can provide
on email address, size, content & type of data. Alternatively, users can                    real-time access control and auditing of physical media.
be given freedom of choice when sending information externally.
                                                                                            Powerful Policy Enforcement
Secure Large File Transfer                                                                  At the heart of the Egress Switch infrastructure is a powerful and flexible
                                                                                            policy engine. The policy engine is centrally managed allowing
Today’s businesses often need to exchange large volumes of information
                                                                                            administrators to enforce decisions over how data should be sent, what
that is too large to be sent by email. Egress Switch integrates
                                                                                            security policies are required, and how data access is audited.
transparently with all internet server protocols (FTP(s), HTTP(s), MS


Features & Benefits Summary                                   •   Fully configurable user interface and recipient     •   Policy controls can enforce encryption based on
                                                                  experience                                              security classification
 Ease of use                                                  •   Supports security classification and disclaimers    •   Policies can be configured based on:
 •   Transparently encrypt email message body and
                                                              •   Egress hosted cloud storage provides ease of use        - Data type, content & location
     attachments at the client, web interface,                                                                            - Recipient/Classification
     gateway or mobile device                                     for sharing large files
                                                                                                                          - Size of data/Media type
 •   Encrypt information on CD/DVD and USB                    •   Apps available for Mac OSX, iPhone, iPad and
                                                                                                                      •   Integrates with existing workflow and processes
     removable media                                              Blackberry

 •   Upload information securely to the internet
                                                                                                                      •   Control who can access the information you
                                                              Management                                                  send
     (HTTP(s), FTP(s), MS SharePoint)
 •   View a full audit of who, where and when                 •   Centrally administered user policies                •   Tiered administration allows delegated
     information has been accessed                            •   Immediately revoke access to data/files even            management of users and policies at
                                                                  after they have been sent                               organisation or departmental level



 Recipient Experience
 •   Simple ‘one-time’ sign up process
 •   Zero footprint web interface provides secure
     instant access to email and large files
 •   Free of charge for recipients to send and receive
     encrypted data
 •   Simple ‘click-once’ application streamlines
     recipient experience and requires no elevated
     privileges
 •   Free mobile and client applications for integrated
     access

 Security Accreditation
 •   Secure authentication and user enrolment
 •   Automatic AES 256 bit encryption
 •   Utilises FIPS 140-2 certified libraries
 •   CESG Claims Test Mark (CCTM) Accredited
 •   Accredited data centres to ISO 27001/9001
 •   Patent Protected (GB 0806429.7 | US12/353,390
     | GB 0907665.4)



 System Requirements                                                                                                            .com
 •     Microsoft Windo ws 2003, XP, Vista, or 7 (32/64 bit)

 •     Apple Mac OS X 10.6 or later

 •     Microsoft .NET framework 2.0 SP1+ Runtime libraries

 •     MS Outlook 2003/20 07/2010 (not required)

 •     Internet Connection




                                                                                                                               © Egress Software Technologies Ltd 2012
                                                                                                                                 tel: 0871 376 0014 fax: 020 7624 8200
                                                                                                                           web: www.egress.com email: info@egress.com

More Related Content

What's hot

IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012
Uni Systems S.M.S.A.
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime
Uni Systems S.M.S.A.
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
Uni Systems S.M.S.A.
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
Novell
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust
 
IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
Uni Systems S.M.S.A.
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
Dekkinga, Ewout
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
Neil Readshaw
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
bpaternoster
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014
Jeffrey Strobach
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
Mahmoud Moustafa
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
John White
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
VirtualTal
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
Novell
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
Dell World
 
Cloud computing 2012
Cloud computing 2012Cloud computing 2012
Cloud computing 2012
Uni Systems S.M.S.A.
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Novell
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
Arun Gopinath
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
doan_slideshares
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
rosswilks1
 

What's hot (20)

IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012
 
Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime Secure adn Contained Access for Everybody, at Anytime
Secure adn Contained Access for Everybody, at Anytime
 
Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy Workspaces for Tomorrow: Turning Vision to Strategy
Workspaces for Tomorrow: Turning Vision to Strategy
 
CL100.pdf
CL100.pdfCL100.pdf
CL100.pdf
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
IT__forum_11
IT__forum_11IT__forum_11
IT__forum_11
 
Get your house on order
Get your house on orderGet your house on order
Get your house on order
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Your New Workplace
Your New WorkplaceYour New Workplace
Your New Workplace
 
ITC Capabilities Brief 2014
ITC Capabilities Brief 2014ITC Capabilities Brief 2014
ITC Capabilities Brief 2014
 
Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015Case_Study__Juniper_Expedient_2015
Case_Study__Juniper_Expedient_2015
 
The VDI InfoSec Conundrum
The VDI InfoSec ConundrumThe VDI InfoSec Conundrum
The VDI InfoSec Conundrum
 
Preventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log ManagementPreventing The Next Data Breach Through Log Management
Preventing The Next Data Breach Through Log Management
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Cloud computing 2012
Cloud computing 2012Cloud computing 2012
Cloud computing 2012
 
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
Mitigating Risk for the Mobile Worker: Novell ZENworks Endpoint Security Mana...
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 

Viewers also liked

Transfer purchased songs on ipad to mac
Transfer purchased songs on ipad to macTransfer purchased songs on ipad to mac
Transfer purchased songs on ipad to mac
staefenia sun
 
Ventajas y desvfentajas de tecnologia pacie
Ventajas y desvfentajas de tecnologia pacieVentajas y desvfentajas de tecnologia pacie
Ventajas y desvfentajas de tecnologia pacie
Milena Bustos
 
Präsentation Büroservice für den deutschsprachigen Raum
Präsentation Büroservice für den deutschsprachigen RaumPräsentation Büroservice für den deutschsprachigen Raum
Präsentation Büroservice für den deutschsprachigen Raum
fastNOTE SchreibService
 
Demos1 resument04[1]
Demos1 resument04[1]Demos1 resument04[1]
Demos1 resument04[1]
fjgn1972
 
Diary essay paigeboyle
Diary essay paigeboyleDiary essay paigeboyle
Diary essay paigeboylepaigeboyle
 
HQ T3
HQ T3HQ T3
BMPBuffetReception2012
BMPBuffetReception2012BMPBuffetReception2012
BMPBuffetReception2012BridgeMark
 
Exterior 2
Exterior 2Exterior 2
Exterior 2
kevin_lamb_25
 
Untitled 2-1
Untitled 2-1Untitled 2-1
Untitled 2-1vimosa
 
Diseñosss
DiseñosssDiseñosss
Diseñosss
lucasmoron
 
Projektas mokymosi krypties pasirinkimas. Kursai.tinklas.lt
Projektas mokymosi krypties pasirinkimas. Kursai.tinklas.ltProjektas mokymosi krypties pasirinkimas. Kursai.tinklas.lt
Projektas mokymosi krypties pasirinkimas. Kursai.tinklas.lt
silzab
 
NeverendingStory-JVG
NeverendingStory-JVGNeverendingStory-JVG
NeverendingStory-JVG
Jared Gonzalez
 
Trabajo practico nº 2
Trabajo practico nº 2Trabajo practico nº 2
Trabajo practico nº 2
Pablogimenezb
 

Viewers also liked (15)

Transfer purchased songs on ipad to mac
Transfer purchased songs on ipad to macTransfer purchased songs on ipad to mac
Transfer purchased songs on ipad to mac
 
Ventajas y desvfentajas de tecnologia pacie
Ventajas y desvfentajas de tecnologia pacieVentajas y desvfentajas de tecnologia pacie
Ventajas y desvfentajas de tecnologia pacie
 
Präsentation Büroservice für den deutschsprachigen Raum
Präsentation Büroservice für den deutschsprachigen RaumPräsentation Büroservice für den deutschsprachigen Raum
Präsentation Büroservice für den deutschsprachigen Raum
 
Demos1 resument04[1]
Demos1 resument04[1]Demos1 resument04[1]
Demos1 resument04[1]
 
Diary essay paigeboyle
Diary essay paigeboyleDiary essay paigeboyle
Diary essay paigeboyle
 
test
testtest
test
 
KSA
KSAKSA
KSA
 
HQ T3
HQ T3HQ T3
HQ T3
 
BMPBuffetReception2012
BMPBuffetReception2012BMPBuffetReception2012
BMPBuffetReception2012
 
Exterior 2
Exterior 2Exterior 2
Exterior 2
 
Untitled 2-1
Untitled 2-1Untitled 2-1
Untitled 2-1
 
Diseñosss
DiseñosssDiseñosss
Diseñosss
 
Projektas mokymosi krypties pasirinkimas. Kursai.tinklas.lt
Projektas mokymosi krypties pasirinkimas. Kursai.tinklas.ltProjektas mokymosi krypties pasirinkimas. Kursai.tinklas.lt
Projektas mokymosi krypties pasirinkimas. Kursai.tinklas.lt
 
NeverendingStory-JVG
NeverendingStory-JVGNeverendingStory-JVG
NeverendingStory-JVG
 
Trabajo practico nº 2
Trabajo practico nº 2Trabajo practico nº 2
Trabajo practico nº 2
 

Similar to Egress Switch Datasheet

It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...
Papitha Velumani
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
Intelligentia IT Systems Pvt. Ltd.
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
Ron Nath Mukherjee
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
Peter de Bruijn
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
Motty Ben Atia
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
Courtland Smith
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
Ronny Stavem
 
Kate Report
Kate ReportKate Report
Kate Report
Mitit Adlawan
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
Sysfore Technologies
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
Papitha Velumani
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
Papitha Velumani
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
TanishqVarma1
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
Mithi SkyConnect
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
DirectReader
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
Ana González Monzón
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
1784 1788
1784 17881784 1788
1784 1788
Editor IJARCET
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
thinkASG
 

Similar to Egress Switch Datasheet (20)

It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Kate Report
Kate ReportKate Report
Kate Report
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 

Recently uploaded

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

Egress Switch Datasheet

  • 1. Egress Switch Technical Data Sheet Egress Switch Secure Data Exchange Are you in control of the information you share? Over one third of data loss incidents happen at the hands of third parties. When information is shared with customers, partners, or outsourced, there is a greater risk that the information will not be handled with the same care that is used internally. Loss of sensitive data can raise compliance issues, often involves unexpected cleanup costs, and invariably leads to damaged business reputation. That’s why Egress developed Switch to protect and control shared information wherever it goes – however it gets there. Benefits of Egress Switch Egress Switch is a new generation of security software enabling policy to follow the data • Protect and control sensitive wherever it resides! information Control who can access information and how it is used – Security Made Easy Unified Security Platform no matter where it goes or how it gets there. We operate in a market defined by Sharing information between partners compliance yet driven by convenience. and clients demands flexible and robust • Real time revocation Revoke access to shared This modern day paradox has invariably technology. While email provides a information in real-time even after contributed to the proliferation of data convenient method to transfer small it has left your physical control. loss incidents throughout society. The amounts of information, it is often highly • Full audit trail solution to this problem is clear. In order restrictive when sharing large amounts of Compliance and reporting to successfully embed security into the data. needs are satisfied for every authorised or unauthorised fabric of business communication it is access attempt. essential to deliver simple, integrated Egress Switch offers complete protection • No infrastructure needed solutions, designed to make sharing of outbound data regardless of file size or Software as a Service makes it easy information easy and enforce recipient transport mechanism. Secure with ease for you to enroll and deploy - with no additional server infrastructures accountability at all times. any confidential information sent by required. email, burnt to CD/DVD, or uploaded to Stay In Control & Maintain Visibility Cloud Servers and avoid ‘point solutions’ • Free for recipients to use As a Switch subscriber your Egress Switch goes beyond the capabilities that fail to deliver unified control. recipients are entitled to use the of traditional protection. Legacy product completely free of charge when sending confidential data to encryption not only does little to prevent Centralised Web Based Management you and other paying subscribers. third parties from mishandling shared The key to success when exchanging • Access data on the move information, but also proves cumbersome sensitive data is the ability to customise Access secure data anywhere on to use, resulting in a breakdown in secure any device with the zero footprint workflow centrally, enabling users to communication. web access client or dedicated perform their daily tasks without apps for iPhone, iPad & Blackberry introducing any additional steps. Using devices. To address this worldwide challenge the Switch hosted service, not only do you • Easy to use means better security Egress Switch offers a new and exciting benefit from infrastructure cost savings, Simple user operation means no way to secure information distributed by workflow changes or complicated but also deliver centralised enforcement steps to forget. email, CD/DVD, USB, FTP, or HTTP Web of security policy, without disrupting core Servers. Don’t allow confidential data to business processes. fall into the wrong hands. Take back control and maintain visibility at all times! © Egress Software Technologies Ltd 2012 tel: 0871 376 0014 fax: 020 7624 8200 web: www.egress.com email: info@egress.com
  • 2. Flexible Low Cost Infrastructure Leveraging patented key management and a choice of on-premise or SharePoint) to enable users to upload large files to the internet or to hosted infrastructure, Egress Switch enables you to rapidly deploy local secure servers. Confidential files are encrypted locally then encryption throughout your business, without the need for end user uploaded via a secure channel to administrator defined server addresses. training. Recipients are then notified of the secure file location to download. Files downloaded from the secure server still have the added benefit of ’follow the data’ encryption and can be managed in real-time like any Desktop & Gateway Email Encryption other Switch file delivery mechanism. Cloud storage is also provided for Sending messages and attachments by email remains the most popular organisations that want to avoid the cost and infrastructure required for business tool for sharing information. For this reason, confidential data is hosting and managing the uploaded information. increasingly sent to unauthorised recipients accidentally resulting in costly fines and damaged reputations. Secure Removable Media Egress Switch provides a unique and transparent way to encrypt email Physical media such as CD/DVD and USB flash drives are popular and that is simple to use and fast to deploy using integrated desktop, cost effective options for exchanging large amounts of information. gateway, and mobile applications. MS Outlook and Lotus Notes add-ins Egress Switch enables organisations to share information on any type of enable users to send and receive information in the usual manner. The removable media. The Egress Switch client includes an integrated Egress Switch policy engine removes unnecessary decisions, and burning application for securely authoring CDs, DVDs and Blue Ray administrators can configure policies such as enforced encryption based media. Unlike traditional security products Egress Switch can provide on email address, size, content & type of data. Alternatively, users can real-time access control and auditing of physical media. be given freedom of choice when sending information externally. Powerful Policy Enforcement Secure Large File Transfer At the heart of the Egress Switch infrastructure is a powerful and flexible policy engine. The policy engine is centrally managed allowing Today’s businesses often need to exchange large volumes of information administrators to enforce decisions over how data should be sent, what that is too large to be sent by email. Egress Switch integrates security policies are required, and how data access is audited. transparently with all internet server protocols (FTP(s), HTTP(s), MS Features & Benefits Summary • Fully configurable user interface and recipient • Policy controls can enforce encryption based on experience security classification Ease of use • Supports security classification and disclaimers • Policies can be configured based on: • Transparently encrypt email message body and • Egress hosted cloud storage provides ease of use - Data type, content & location attachments at the client, web interface, - Recipient/Classification gateway or mobile device for sharing large files - Size of data/Media type • Encrypt information on CD/DVD and USB • Apps available for Mac OSX, iPhone, iPad and • Integrates with existing workflow and processes removable media Blackberry • Upload information securely to the internet • Control who can access the information you Management send (HTTP(s), FTP(s), MS SharePoint) • View a full audit of who, where and when • Centrally administered user policies • Tiered administration allows delegated information has been accessed • Immediately revoke access to data/files even management of users and policies at after they have been sent organisation or departmental level Recipient Experience • Simple ‘one-time’ sign up process • Zero footprint web interface provides secure instant access to email and large files • Free of charge for recipients to send and receive encrypted data • Simple ‘click-once’ application streamlines recipient experience and requires no elevated privileges • Free mobile and client applications for integrated access Security Accreditation • Secure authentication and user enrolment • Automatic AES 256 bit encryption • Utilises FIPS 140-2 certified libraries • CESG Claims Test Mark (CCTM) Accredited • Accredited data centres to ISO 27001/9001 • Patent Protected (GB 0806429.7 | US12/353,390 | GB 0907665.4) System Requirements .com • Microsoft Windo ws 2003, XP, Vista, or 7 (32/64 bit) • Apple Mac OS X 10.6 or later • Microsoft .NET framework 2.0 SP1+ Runtime libraries • MS Outlook 2003/20 07/2010 (not required) • Internet Connection © Egress Software Technologies Ltd 2012 tel: 0871 376 0014 fax: 020 7624 8200 web: www.egress.com email: info@egress.com