We check and examine signs of confidential information leakages.

Confidential Information Visualization Assessment

We examine the status of external sharing of confidential information and situation of circulation of confidential information via e-mail and chats conducted on Microsoft 365. By gaining a picture of where confidential information leakage countermeasures need to be strengthened, you can consider appropriate response measures.

Go Back

Service Overview

JBS examines the status of external sharing of confidential information and situation of circulation of confidential information via e-mail and chats using a trial license for Microsoft 365 E5 Compliance and compiles the results in an analysis report that is provided to you. Upon request we can also examine and analyze the situation of circulation of not only confidential information but of any incidences of use of words/terms of harassment.

  • Confidential Information Circulation Analysis

    • Use Immediately without Purchasing a License
      As a trial license for Microsoft 365 E5 Compliance is used, you can use the service immediately.
    • Provided Remotely
      All work including meetings, not only setting work and results gathering, is provided remotely.
    • Implementation Period of about One Month
      The work is implemented over about a one-month period, including four meetings and workshops from pre-service explanation to explanation of the analysis report.

    Service Benefits

    We analyze the situation of circulation and location of confidential information in files and e-mail within your Microsoft 365 environment’s cloud storage, and communicate risks that may cause information leakage due to internal fraud or inattention. Based on the analysis results, you can deepen you understanding about countermeasures using Microsoft 365 E5 Compliance and consider proposals and preparations to reduce risks in the future.

    Recommended for Customers Who...

    are worried whether there is confidential information stored somewhere that is being shared externally

    are worried that confidential information is being released externally

    Confidential Information Visualization Assessment will resolve these worries.

    Check if there are risks of confidential information leakage using external sharing

    Check if there are risks of sending confidential information externally

    Consider a policy for confidential information leakage countermeasures going forward

    Example of Results Report Summary

    Visualized actual situation report
    Detection Type Result Danger
    Retention of confidential information
    Retention of confidential information Visualization of confidential information retention situation
    Is there confidential information that is shared externally?
    High
    Circulation of confidential information
    Circulation of confidential information Visualization of confidential information circulation situation
    Are there large volume downloads, sending to individuals’ e-mail addresses, or sending of chats to related external departments of confidential information?
    High

    Service Flow

    After explaining the contents to be implemented, we first spend two days on environment setting in order to gather information. After about two weeks of accumulating data, we next check the results and gather and analyze the data. The results are then compiled into a report and we hold a workshop to explain the analysis results and recommend solutions. On your side, we ask that you secure time for environment setting, data gathering, and the workshop. In total, work is completed in about one month.

  • Service Flow

  • Prerequisites

    • All steps are implemented remotely.
    • We ask you to assign an administrator user who can access each management portal.

    Japan Business Systems, Inc. participates in the Microsoft Digital Trust RegTech Alliance as a manager company.

    Microsoft Digital Trust Regtech Alliance
    To top of this screen