Sentrion Overview
Sentrion Platform
Sentrion REAC
Sentrion Mimecast
Hard Appliances
Virtual Appliances
Overview
Policy Compliance
Secure Content
Filtering
Cloud
Partner
Enterprise
Community
Overview
Download
Security
Support
News
Documentation
Tips & Tricks
DKIM
FAQ
Misc
Milters
Overview
Directory Synchronization
Messaging Architecture Review
High Volume Mail
HIPAA Policy
QUICKStart Implementation
Performance Tuning
Training Services Overview
Message Routing and
Configuration
Message Policy
Management
Connection Control /
Attack Prevention
Directory Configuration
and Management
Overview
Sendmail Partners
Milter Community
Industry Organizations
System Integrators & Distributors
Overview
Silver Support
Gold Support
Platinum Support
Open Source Support
Security Advisories
Contact Support
Overview
Customers
Events
Press Room
Board & Investors
Management
Careers
Contact Us
Overview
Ask the Experts
Security Chalk Talks
Collateral
Product Reviews & Awards
IP Reputation Check
Real-time Outbreak Monitor
HOME
|
CUSTOMER LOGIN
Sentrion Message Processors
Sentrion Application Store
Services
Partners
Support
Company
Resources
Open Source
Policy Compliance Applications
Confidential Data Protection Policies
Automates the detection and protection of sensitive information
Provides content and context-based policy detection for accurate monitoring to confidential information
Features extensive enforcement support, including encryption, quarantine, redirect, email notification, adding disclaimers, content modification, and much more
Provides full reporting of events for tracking and trending purposes
DLP Enabler Bundle
Collection of most commonly used applications for implementing complete data-loss prevention solution for policy enforcement
Offers additional services addressing DLP and encryption requirements in single application
Provides low cost solution without complex changes to the messaging infrastructure
Reduces need for additional DLP point solutions
Federal Government Policies
Provides content and context-based policy detection to automate data categorization in accordance with security policy and standards
Protects data isolation via an integrated directory-driven policy framework to define and enforce authorized vs. unauthorized communications - based on content categorization
Provides secure communication channel support as well as several other enforcement methods to protect sensitive data
Financial Services Policies
Enables organizations to monitor and regulate both communication of internally-sensitive information as well as personal privacy-related data to demonstrate compliance with such regulations as Sarbanes-Oxley (SOX), Gramm-Leach-Bliley Act (GLB), Payment Card Industry (PCI), and several others
Monitors and regulates broker-client communications
Secures communication channels for authorized transmission of payment processing information between financial institutions
Monitors intra-department communications via automated directory-driven and content-driven policy engine
Healthcare Policies
Protects patient information, monitoring for patient records, diagnosis information, ICD-9 codes, medical procedures, personal information, and more
Provides secure messaging channels between healthcare partners/providers, doctors, insurance organizations, and other healthcare service providers
Regulates information distribution to authorized and unauthorized communication channels, leveraging full content/context and directory driven-policies
Provides automated detection and protection of healthcare information necessary for HIPAA compliance
Higher Education Policies
Protects financial and education-related information; detecting Social Security Numbers, transcript information, application and financial aid forms, financial history terms, payment information and more
Protects patient healthcare information; detecting patient records, diagnosis information, ICD-9 codes, medical procedures, personal information, and more
Provides methods for secure communication channels between authorized individuals to exchange sensitive information
Incident Reporting and Remediation
Provides technical and business-level views into policy-based events for remediation and reporting
Uses remediation workflow for incident response best practices
Produces detailed drill-down reports for greater incident and attack analysis
Features unified administrative and end-user view of quarantine to inspect and remediate spam and other messages for user analysis
Protected Content
Uses document fingerprinting to detect and protect confidential files and content
Easily registers sensitive files for whole or partial match
Scans all outbound messages and attachments
Provides easy management of files and content with expiration dates
RPost
®
Registered Email
Provides verifiable proof of sending and delivery; content of messages and attachments; and uniform time send and received
Does not require any recipient action or special software
Proves the authorship and authenticity of an email that can be admissible in court
Sent-by-Mistake Prevention
Provides an automatic lag time after you click “Send”
Allows sender to recall a message after it has been sent by mistake
Helps protect against embarrassing gaffes, information leaks, and possible legal problems
User-level S/MIME Encryption
Provides user-level S/MIME encryption automatically with Sentrion policies
Maintains confidentiality of message content between senders and recipients
Encrypts and signs email messages and decrypts and verifies signatures using the S/MIME standard
No end-user key management or message encryption decision making required
Sentrion Connect for Symantec Data Loss Prevention
Minimal impact to the Sentrion Messaging Architecture and Symantec DLP Network Prevent for Email
Provides consolidated auditing and tracking as message enforcement actions are performed on the Sentrion
Increases effectiveness and value for complimentary Sentrion data protection applications (S/MIME Secure Messaging, Voltage IBE Encryption, RPost Registered Mail, and more)
Zip Compression with Optional Password
Available in Japan only
Automatically compresses outgoing email attachments or entire email messages into a Zip file
Allows option to add password to provide security without requiring a separate encryption process
Provides out-of-band delivery of passwords to email recipients for convenience and security