Get Aligned!

Sharing sensitive information with people that are supposed to have it, while at the same time keeping it from people that aren’t, has been one of the toughest problems facing white-collar workers for as long as anyone can remember.  Since the 1960’s, the concept of a having a multilevel security system (MLS) in place to outline the ‘need to know’ matrix for controlling use of sensitive data has been considered a must-have process. Under an MLS structure, both people and information are classified into different levels of clearance (people) and sensitivity (information).  As a result, data classification schemes such as “Public”, “Internal Use Only”, “Confidential”, “Secret”, and “Top Secret”, along with restricted access to those levels based on clearance, have become the baseline of most world-class information security policies.

According to an MLS-based security policy, before users are allowed to look at classified information they must have the right clearance to enable them to use that sensitive data. As an example, users with a “Confidential” clearance are authorized to see documents classified as “Confidential”, but they can’t see/use “Secret” or “Top Secret” information (just like any outsider wouldn’t be able to do so without clearance).

To make this paradigm accessible to virtually any organization, RightsWATCH delivers the complete data-centric information security spectrum of dynamically identifying sensitive/confidential information, classifying it into the right level (according to policy), marking/tagging that information, and encrypting it with the world-class encryption technology in Microsoft’s Azure Rights Management Services so that only those who have express authority to use that information can do so.  All without user involvement required.  With RightsWATCH and Azure RMS, even if sensitive data is somehow leaked, it is totally un-useable by any unauthorized parties into whose hands it may fall.

RightsWATCH enforces your custom MLS data classification model, providing access to data based on its level of sensitivity matched with a user’s credentials to ensure a “need-to-know” basis for sensitive data.  With this approach, you are assured of protecting data privacy and achieving regulatory compliance.  RightsWATCH delivers the ability to grant or revoke each user’s access with multiple security clearances at a given moment in time or based on a specific role performed.

Since each organization is different in its MLS definition and approach, RightsWATCH enables customized and granular definition of your MLS, classifying data not only into levels of sensitivity but also segmenting access by ‘scope of reference’ such as by department (HR, Finance, R&D, etc.) or by project (M&A, product launch, etc.).  With RightsWATCH, the organization has the ability to define multiple levels of segmentation of classification such as “Scope” and “Level” in establishing a rich, automated classification system.  Users are then granted role-based access to the company, scope, and levels of information appropriate to their functions.

Leveraging data classification and information rights management in a single solution, RightsWATCH keeps sensitive data safe and secure independent of its state: at rest, in motion, or in use. Further, sensitive data is always protected, even if it exists totally outside your ‘secure’ network perimeter.


Back to List

Related Stories

Windows 7, Server 2008 and 2008 R2 security updates end January 2020

Windows 7, Server 2008 and 2008 R2 security update…

On January 14, 2020, support for Windows 7, Windows Server 2008 and 2008 R2 will end. That means the end of regular security updates. Failur…

Read Post

Protecting Your Property

Protecting Your Property

The physical protection of your building and IT Systems is just as important as online protection. With the use of information technology an…

Read Post

Understanding The Digital Workplace

Understanding The Digital Workplace

The digital workplace is the virtual, modern version of the traditional workplace. It quickly and securely provides personalised, role-based…

Read Post

5 Things to Know About Wi-Fi 6 and 5G

5 Things to Know About Wi-Fi 6 and 5G

The sixth generation of Wi-Fi, Wi-Fi 6, also known as 802.11ax, provides more speed, lower latency, and increased device density. The fifth …

Read Post

The New Technology Buyer

The New Technology Buyer

It is predicted that 80% of new technology spend will sit with business buyers by 2020. This is a change which has come about primarily due …

Read Post

Security on the move

Security on the move

The ability to stay secure and productive anywhere, on any device is of great and growing importance to all businesses.

We look at the fi…

Read Post

Business Benefits of Microsoft Azure

Business Benefits of Microsoft Azure

Connecting Clouds: The growing pains of cloud adoption continue as organisations realise that a single solution of either Private Cloud, Dat…

Read Post

Understand & improve your security posture

Understand & improve your security posture

Gain deeper visibility into and take control of your security.

Assessing your security posture is an ongoing challenge. Increasingly soph…

Read Post

Artificial Intelligence

Artificial Intelligence

Artificial Intelligence (AI) and Machine Learning (ML) are fast becoming important pillars of many organisations’ digital transformation s…

Read Post

IT Risk Management

IT Risk Management

With today’s pressures of compliance, cybercrime and customer demands organisations can no longer afford to have ad-hoc IT Policies and IT…

Read Post