We check and examine signs of confidential information leakages.
Confidential Information Visualization Assessment
We examine the status of external sharing of confidential information and situation of circulation of confidential information via e-mail and chats conducted on Microsoft 365. By gaining a picture of where confidential information leakage countermeasures need to be strengthened, you can consider appropriate response measures.
Service Overview
JBS examines the status of external sharing of confidential information and situation of circulation of confidential information via e-mail and chats using a trial license for Microsoft 365 E5 Compliance and compiles the results in an analysis report that is provided to you. Upon request we can also examine and analyze the situation of circulation of not only confidential information but of any incidences of use of words/terms of harassment.
- Use Immediately without Purchasing a License
As a trial license for Microsoft 365 E5 Compliance is used, you can use the service immediately. - Provided Remotely
All work including meetings, not only setting work and results gathering, is provided remotely. - Implementation Period of about One Month
The work is implemented over about a one-month period, including four meetings and workshops from pre-service explanation to explanation of the analysis report.
Service Benefits
We analyze the situation of circulation and location of confidential information in files and e-mail within your Microsoft 365 environment’s cloud storage, and communicate risks that may cause information leakage due to internal fraud or inattention. Based on the analysis results, you can deepen you understanding about countermeasures using Microsoft 365 E5 Compliance and consider proposals and preparations to reduce risks in the future.
Recommended for Customers Who...
-
are worried whether there is confidential information stored somewhere that is being shared externally
-
are worried that confidential information is being released externally
Confidential Information Visualization Assessment will resolve these worries.
-
Check if there are risks of confidential information leakage using external sharing
-
Check if there are risks of sending confidential information externally
-
Consider a policy for confidential information leakage countermeasures going forward
Example of Results Report Summary
Detection Type | Result | Danger | |
---|---|---|---|
|
Retention of confidential information |
Visualization of confidential information retention situation Is there confidential information that is shared externally? |
High |
|
Circulation of confidential information |
Visualization of confidential information circulation situation
Are there large volume downloads, sending to individuals’ e-mail addresses, or sending of chats to related external departments of confidential information? |
High |
Service Flow
After explaining the contents to be implemented, we first spend two days on environment setting in order to gather information. After about two weeks of accumulating data, we next check the results and gather and analyze the data. The results are then compiled into a report and we hold a workshop to explain the analysis results and recommend solutions. On your side, we ask that you secure time for environment setting, data gathering, and the workshop. In total, work is completed in about one month.
Prerequisites
- All steps are implemented remotely.
- We ask you to assign an administrator user who can access each management portal.
Japan Business Systems, Inc. participates in the Microsoft Digital Trust RegTech Alliance as a manager company.
- Related Tag