Fortra Data Classification Suite
Fortra Data Classification Suite (DCS) is a holistic data security platform that intelligently identifies, classifies and protects your data from the moment it is created to the moment it is archived across on-prem, hybrid and SaaS (DCS One) environments. It provides a single classification language for your desktop (DCS for Windows/Mac) and Microsoft 365 web users, prevents sensitive data from falling into the wrong hands, and automates your regulatory compliance processes.
- On-Prem + SaaS Single Platform
- Consistent Labeling on Desktop and M365 Web
- Integration with DLP, SIEM and Encryption
What is it?

One Platform, Two Distribution Models
Fortra DCS combines DCS for Windows/Mac for on-premises infrastructures and DCS One (SaaS) for Microsoft 365 web users into a single platform. The same classification schema and policies are shared between on-prem clients and cloud-based users, ensuring a consistent data protection experience across all environments.

Permanent Digital Identity for Your Data
DCS is a centralized platform that assigns a permanent digital identity (metadata) to all your data. This allows other security solutions such as DLP, CASB, SSE, encryption and archiving to read the sensitivity of the data directly from these tags and take the right action. Policy changes are centrally managed via Policy Manager (on-prem or cloud) and automatically distributed to endpoints.
Identify Your Data

Data security
Data security starts not only with technology investment, but also with the human factor. Fortra DCS creates a sustainable security culture within the organization by actively involving users in data protection processes. Automatic, recommended and user-oriented classification options reduce data leaks that may occur due to carelessness and directly support compliance with ISO standards and regulations such as KVKK/GDPR.

Why It Matters
Fortra DCS provides user-friendly classification interfaces for email (Outlook / Outlook Online), office documents (Word, Excel, PowerPoint - desktop and web) and file systems. It makes sensitive data visible with watermarks, headers/subheaders and section-based markup. On-prem Active Directory and Microsoft Entra ID integration with modern identity infrastructures. Built-in Data Detection Engine (DDE) contextually detects sensitive content such as PII, financial data and health data in documents and emails on-prem or in the cloud, and triggers smart policies with risk scores.
Key Features

Flexible Setup: On-Prem + SaaS
You can use a fully on-premises installation with DCS for Windows/Mac or an infrastructure-less SaaS model with DCS One. In hybrid builds, you can run both models together with the same classification scheme.

Fully Aligned with the Microsoft Ecosystem
Integrates with Active Directory and Microsoft Entra ID and applies the same labels and policies across desktop Office and Microsoft 365 web apps. No matter where the user works, the class of the data does not change.

In-depth Content Analysis (ICA)
Data Detection Engine (on-prem and cloud) contextually detects PII, financial and health data in multiple languages, including Turkish, and generates sensitivity and risk scores. These scores form the basis for intelligent actions such as automatic encryption or blocking exports.

Visual Signs and Awareness
Header/footer, watermarking and part marking make the sensitivity of the data visible at all times. Dynamic alerts and policies guide users in real time, creating a culture of awareness and responsibility across the organization.

Policy-Based Automation and Integration
It takes actions such as automatic classification, warning, encryption, DLP policy triggering depending on events such as sending e-mails, saving or sharing documents. The metadata it produces provides natural integration with your DLP, CASB/SSE, SIEM, encryption and archiving solutions.

Advanced Reporting and Analytics
It logs users' interactions with data and all policy decisions in detail. Reports and dashboards make visible which users generate which types of sensitive data, the most triggered policies and risky behavior patterns, helping you continuously improve your security posture.
Let's Build Your Cyber Security Together!
Let's analyze your needs and requirements together and configure the security architecture specific to your organization.