Help protect data across different workloads
Protect corporate data by allowing more secure access to company resources and enabling safe sharing of sensitive information inside and outside your organization.

Features and Benefits
Automatic, user-driven, and recommended classifications
Data can be classified and labelled automatically through content detection rules. Users can also manually classify data or be prompted to make an informed classification decision.
Data can be classified and labelled automatically through content detection rules. Users can also manually classify data or be prompted to make an informed classification decision.
Classification overrides and justifications
Based on policies and rules, users can be empowered to override a classification and optionally be required to provide a justification.
Based on policies and rules, users can be empowered to override a classification and optionally be required to provide a justification.
Flexible policy and rules engine
A set of default sensitivity labels are available with options to define custom labels based on business needs. Rules can also be configured for actions to take based on classification.
A set of default sensitivity labels are available with options to define custom labels based on business needs. Rules can also be configured for actions to take based on classification.
Protection using encryption, authentication, and use rights
For sensitive data, protection can be applied after classification and labeling. This includes encrypting the document, which requires authentication of the user and enforces user rights that define... show more
For sensitive data, protection can be applied after classification and labeling. This includes encrypting the document, which requires authentication of the user and enforces user rights that define what can be done with the data. show less
Document tracking and revocation
Documents can be tracked to show who has opened the document and from which geographical location. Users can choose to revoke access to the document in the event of unexpected activity.
Documents can be tracked to show who has opened the document and from which geographical location. Users can choose to revoke access to the document in the event of unexpected activity.