Protect Information with IS-FOX Classification

Target

Identification

Employees classify the information they are compiling in the relevant confidentiality class.

Pencil

Classification

All e-mails and Office documents are classified and labelled visibly in accordance with the confidentiality class.

Thumbs up

Correct handling

Depending on the confidentiality class, the information can be assigned automatic security measures (e.g. encryption).

What You Need to Know about IS-FOX Classification

Although most companies have defined confidentiality classes in order to protect their information, the information isn’t classified in everyday life. IS-FOX Classification for Microsoft Office takes your employees through the classification process. The author of new content classifies it in the relevant confidentiality class. The documents are labelled in accordance with the confidentiality class. Limits can then be set as an option, for example on the further processing of the classified documents.

Your advantages

  • Information is always classified and labelled when it is compiled.
  • All employees are considering the value of information.
  • Classification identifies sensitive information.
  • Correct handling of confidential information and e-mails is supported by technology throughout the entire information lifecycle.

The plug-in for Microsoft Outlook integrates itself seamlessly into the e-mail client and offers the following functions: ​

  • Classification of e-mails as they’re created by users.
  • Labelling: the e-mail is labelled appropriately in accordance with the confidentiality class and the guidelines defined in the Policy Manager.
  • E-mail encryption: depending on the confidentiality class, an existing encryption solution (PGP, S/MIME, gateway solution) can be activated or IS-FOX Encrypt’s integrated, automatic ZIP encryption used.
  • External recipient check: a warning is given when sensitive information is being sent to external parties.
  • Attachment recognition: if a user attaches a document (doc, xls, ppt or pdf) that has been classified using IS-FOX Document Classification, the document’s confidentiality class will be recognised and applied to the e-mail.

IS-FOX Document Classification takes users through the classification of Word, Excel and Powerpoint files. The plug-in integrates itself seamlessly into Microsoft Office and offers the following functions:

  • Classification of documents as they’re compiled by users.
  • Labelling of documents: the document is labelled in accordance with the confidentiality class and guidelines defined in the IS-FOX Policy Manager. You can also attach watermarks and draft labels in Microsoft Word.
  • PDF support: the confidentiality class also applies to an Office document saved as a PDF.
  • Version history: classification changes during the information lifecycle are recorded.
  • Central management and configuration via the IS-FOX Policy Manager.
  • Optimal co-operation with IS-FOX E-Mail Classification.

The IS-FOX Policy Manager allows you, as a security officer, to manage the settings in both IS-FOX Classification plug-ins centrally. You define your own confidentiality classes and plug-in behaviour. This configuration is then distributed centrally to users’ clients.

Sample settings:

  • Is classification obligatory?
  • When and where are e-mails and documents labelled?
  • Should e-mails be automatically encrypted?
  • Is it permitted to downgrade documents that have already been classified?
  • Client operating system:
  • Microsoft Windows Vista, Windows 7, Windows 8, Windows 10 (32 or 64-bit versions)
  • Client components:
  • .NET 4.5 (with VSTO and Office PIA)
  • Office versions:
  • Microsoft Office 2010, Microsoft Office 2013, Microsoft Office 2016 (32 or 64-bit versions)
  • IS-FOX Classification can be operated on terminal servers.

Do you want to test IS-FOX Classification

Free 30-day demo

The right way to introduce Information Classification

The introduction of information classification in the company should be prepared and implemented professionally. As the English saying goes: “A fool with a tool is still a fool”. Our best-practice approach to successful information classification is as follows:

Document

Establish guidelines

Information-classification guidelines define rules and responsibilities.

 magnifying glass with crown jewel

Identify assets

The crown jewels of company departments are determined in workshops with managers.

IS-FOX Logo with gears

Technical support

IS-FOX Classification is piloted and rolled out with supporting awareness measures.

Thumbs up

Embed in everyday life

The combination of insight and tool support leads to consistent application.

The information-classification guidelines form the basis for all subsequent steps. The confidentiality classes are defined here and the procedure for handling information allocated to a particular confidentiality class. Example: Do confidential e-mails (classed as “confidential”) need to be encrypted? For both internal and external recipients?

Our IS-FOX Policy Templates, which have been tested in practice, are available to you if you need them. These templates are drawn up by ISO 27001 auditors, are legally checked and can be tailored to the respective needs of your company without any major effort or expenditure.

Before allowing employees to classify documents and e-mails, you should check the suitability of the security guidelines for everyday use and give your employees concrete classification recommendations.

You can take advantage of our Information Classification Workshop, which has been tried and tested on many occasions. Our experienced information-security consultants host a workshop with selected managers from each company department. It is during this session that the sensitive information in each department is identified.

These workshops have many benefits:

  • Managers develop in-depth insights into information classification and then act as positive multipliers.
  • The policy is tested for everyday use. Potential escalations are already avoided in advance.
  • You can attach the results of the workshop to the policy. They then serve as concrete examples for awareness measures during the introduction of IS-FOX Classification.

Technical tests should be conducted alongside steps 1 and 2. Although IS-FOX Classification is developed at a very high quality level, Office plug-ins may on rare occasions interfere with other plug-ins or macros used. This can be remedied in the technical evaluation phase.

You can roll out IS-FOX Classification across the company once the technical pilot phase has been completed and the workshops have taken place. At the start, your employees receive educational videos and interactive exercises so that they can familiarise themselves quickly with the new functions.

  • Consistent classification of all Office documents makes the value of information obvious to employees. This fosters security-conscious behaviour.
  • Sensitive information can also be supported by technology-based protection measures, for example warnings or automatic encryption.
  • The classification process becomes embedded in everyday office life, as employees are dealing with the confidentiality of their information on a daily basis. This process can also be carried over into other situations, for example CAD drawings or audit reports.

     

Interested in an IS-FOX Classification demo or workshop?

Then call us on (+49 89 890 63 62-0) or send us a message.

Data protection note: how do we handle your data