Contact Us

Information Governance

Protect your organization’s data and reputation

Not all information is created equal – some is more valuable than others – so it makes sense to protect valuable information that is of critical importance to your organization. The Information Governance Server (IGS) sits in the heart of the network and acts as a central repository for your critical information. Registered information is tracked by the system through fingerprinting. The IGS database holds the full fingerprint values as well as the partial information fingerprints. IGS with its ability to track millions of pieces of information can then enhance Data Loss Prevention solutions by enabling the detection of free form information. Discover how the IGS can support your Information Governance or Critical Information Protection strategies.

Click for Demo

Information Governance Server

Clearswift Information Governance Server (IGS) provides additional data loss prevention (DLP) features to protect your organization’s valuable intellectual property or classified data from accidental or malicious data breaches.

It acts as a secure central repository for document owners to register classified and sensitive information – e.g., M&A projects, payroll information, intellectual property and product designs – to protect it from accidental, unauthorized sharing or malicious breaches both internally and externally.

Files are registered using a web browser or through a client application where text is extracted and registered in a hashed form. If registered files or fragments of these files are emailed to unauthorized recipients internally or externally, or shared over the web to unsanctioned sites, action is taken according to policy set for that data.

The Clearswift IGS integrates seamlessly with all Clearswift Secure Gateways and ARgon for Email, enabling you to detect when information registered within files is in transit.

Rethink Information Governance
 

Regulation Readiness

Ready to go policies to comply with regulations (GDPR, HIPAA, PCI, SOX, etc.).

Inspect and Detect

Unevasive sub-file fingerprinting with hashing algorithm.

Security without Disruption

Unique redaction protects without delays.

Extend and Scale

Track billions of transactions across your network and out to your cloud apps.