Home
%3CLINGO-SUB%20id%3D%22lingo-sub-967024%22%20slang%3D%22en-US%22%3EMicrosoft%20Ignite%202019%20%E2%80%93%20Microsoft%20Information%20Protection%20solutions%20Partner%20ecosystem%20showcase%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-967024%22%20slang%3D%22en-US%22%3E%3CP%3ELast%20year%20at%26nbsp%3B%20the%20Ignite%20conference%20we%20delivered%20the%20%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fmipsdkdocs%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Information%20Protection%20SDK%3C%2FA%3E%2C%20which%20enabled%20our%20growing%20ecosystem%20of%20partners%20to%20build%20integrations%20in%20a%20truly%20cross-platform%20way.%26nbsp%3B%20Since%20then%20several%20partners%26nbsp%3B%20have%20joined%20the%20Microsoft%20Intelligent%20Security%20Association%20(MISA)%20and%20are%20in%20the%20process%20of%20releasing%20or%20already%20have%20solutions%20in%20the%20market%20that%20enhance%20and%20extend%20the%20value%20of%20Microsoft%20Information%20Protection%20capabilities.%20Below%20is%20a%20round-up%20highlighting%20some%20of%20the%20key%20Microsoft%20Information%20Protection%20integrations%20available.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1852470530%22%20id%3D%22toc-hId-1852470530%22%3EAdobe%3C%2FH2%3E%0A%3CP%3ENow%20you%20can%20use%20Adobe%20Acrobat%20DC%20and%20Acrobat%20Reader%20DC%20on%20Windows%20%26amp%3B%20MacOS%20desktop%20computers%20to%20open%20files%20protected%20by%20Microsoft%20Information%20Protection%20capabilities.%3C%2FP%3E%0A%3CP%3EAcrobat%20Reader%20DC%20%2F%20Acrobat%20DC%20auto-detects%20a%20%26nbsp%3Bfile%20protected%20by%20Microsoft%20Information%20Protection%20and%20prompts%20you%20to%20download%20the%20corresponding%20plugin%20from%20Adobe%E2%80%99s%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fhelpx.adobe.com%252Facrobat%252Fkb%252Fmip-plugin-download.html%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C0ff7c69a24034157329008d7591605b9%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637075823435482403%26amp%3Bsdata%3D1vbRxHtL8p0F%252B%252BwoVZmx61oAVbbsH1sq2xonAHcQsJo%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehelpx%20page%3C%2FA%3E.%20Once%20you%20download%20and%20install%20the%20plug-in%2C%20the%20protected%20file%20open%20like%20any%20other%20PDF%20in%20Acrobat%20or%20Reader%20after%20authentication.%20You%20can%20also%20see%20the%20sensitivity%20label%20information%20applied%20to%20the%20PDF%20file%20using%20Acrobat%20Reader%20DC%20and%20Acrobat%20DC.%3C%2FP%3E%0A%3CP%3EYou%20can%20download%20the%20plugin%20from%20the%20following%20location%20(make%20sure%20you%20have%20the%20latest%20version%20of%20Adobe%20Acrobat%20installed%3A%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fhelpx.adobe.com%252Facrobat%252Fkb%252Fmip-plugin-download.html%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C0ff7c69a24034157329008d7591605b9%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637075823435492398%26amp%3Bsdata%3D0In%252BBnSuWCs8dsMT5aoZvi2lWbUjJ%252FjMSCH4OmLuqkg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fhelpx.adobe.com%2Facrobat%2Fkb%2Fmip-plugin-download.html%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F151818iA0843F6D20A20DCA%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Adobe%20Integration.png%22%20title%3D%22Adobe%20Integration.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAdobe%20integration%20with%20Microsoft%20Information%20Protection%20on%20Windows%20and%20Mac%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--699686431%22%20id%3D%22toc-hId--699686431%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-1043123904%22%20id%3D%22toc-hId-1043123904%22%3EAbsolute%20Software%3C%2FH2%3E%0A%3CP%3EAbsolute%2C%20the%20self-healing%20endpoint%20security%20company%2C%20has%20solidified%20its%20technology%20partnership%20with%20Microsoft%20by%20integrating%20with%20Microsoft%20information%20Protection%20solutions%2C%20adding%20persistent%20visibility%20to%20enhance%20data%20protection.%3C%2FP%3E%0A%3CP%3EThe%20integration%20allows%20organization%20to%20detect%20productivity%20file%20types%20that%20contain%20sensitive%20data%20such%20as%20Word%2C%20Excel%2C%20PowerPoint%2C%20and%20PDF%20files.%26nbsp%3B%20Once%20the%20rules%20are%20configured%20via%20the%20Absolute%20console%2C%20the%20sensitivity%20label%20and%20protection%20persists%20with%20the%20file%20even%20when%20it%20moves%20off%20the%20endpoint.%20Customers%20now%20have%20a%20better%20way%20to%20manage%20unwanted%20access%20to%20sensitive%20files%2C%20without%20restrictive%20policies%20that%20hamper%20productivity.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20more%20information%2C%20go%20to%20%3CA%20href%3D%22https%3A%2F%2Fwww.absolute.com%2Fplatform%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.absolute.com%2Fplatform%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152090i108B225D42CA2E73%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Absolute.png%22%20title%3D%22Absolute.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EAbsolute%20Software%20Integration%20with%20Microsoft%20Information%20Protection%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1509033057%22%20id%3D%22toc-hId--1509033057%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-233777278%22%20id%3D%22toc-hId-233777278%22%3EBigID%3C%2FH2%3E%0A%3CP%3EBigID%E2%80%99s%20integration%20with%20Microsoft%20Information%20Protection%20allows%20enterprises%20to%20automatically%20propagate%20labels%20to%20sensitive%20and%20personal%20data%20for%20greater%20accuracy%2C%20ensure%20consistent%20enforcement%2C%20and%20address%20emerging%20privacy%20regulations%2C%20including%20GDPR%20and%20CCPA.%26nbsp%3BBigID%20helps%20identify%20whether%20or%20not%20Microsoft%20Information%20Protection%20labeled%20data%20contains%20data%20regulated%20by%20resident-based%20policy%20(like%20the%20CCPA%20or%20GDPR)%20or%20identity-based%20policy%20(like%20HIPAA%20or%20CCPA)%20%E2%80%93%20and%20can%20automate%20data%20protection%20policies%26nbsp%3Bbased%20on%20regulation%20and%20data%20privacy%20best%20practices.%20With%20BigID%2C%20organizations%20can%20automate%20data%20access%20rights%2C%20assign%20data%20residency%2C%20and%20monitor%20%26amp%3B%20alert%20on%20cross-border%20data%20flows.%20For%20more%20information%20on%20their%20integration%2C%20visit%20the%20following%20link%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fbigid.com%252Fhow-bigid-and-microsoft-information-protection-mip-work-together%252F%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C0fb9784b26c948af32aa08d7531f67c0%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637069266670737332%26amp%3Bsdata%3DIAtaRUNmK9%252BUI4ePM74GT6q0%252B53cXcohjCCvtDn%252B%252FCE%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EHow%20BigID%20And%20Microsoft%20Information%20Protection%20(MIP)%20Work%20Together%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152091iA672CC1A4851E7EF%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22BigID.png%22%20title%3D%22BigID.png%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EBig%20ID%20integration%20with%20MIP%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152092i74292C09B9E7CEA5%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22BigID2.png%22%20title%3D%22BigID2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1976587613%22%20id%3D%22toc-hId-1976587613%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--575569348%22%20id%3D%22toc-hId--575569348%22%3ECheckpoint%20Software%3C%2FH2%3E%0A%3CP%3EAn%20integrated%20solution%20of%20Microsoft%20Information%20Protection%20capabilities%20with%20Check%20Point%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.checkpoint.com%252Fproducts%252Fnext-generation-firewall%252F%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C6f550f82ad3d4c5e7f6708d759633410%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637076156269216259%26amp%3Bsdata%3DKSTfZFsRnqRimzQ%252BfCnCSHQw9ezlwKxcaDuyAiMuWM8%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ENext%20Generation%20Firewall%3C%2FA%3E%26nbsp%3BSecurity%20Solutions%20helps%20protect%20organizations%20from%20data%20loss.%26nbsp%3B%20It%20keeps%20sensitive%20business%20data%20safe%2C%20regardless%20of%20where%20it%20travels%20or%20how%20it%20is%20shared%2C%20including%20via%20email%2C%20web%20browsing%20or%20file-sharing%20services%2C%20which%20extend%20Microsoft%20Information%20protection%20capabilities%20outside%20of%20Microsoft%20Products.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152095i49C1CA55D96DDC88%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Checkpoint1.png%22%20title%3D%22Checkpoint1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152096iDE9E7027C2ABD789%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Checkpoint2.png%22%20title%3D%22Checkpoint2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1167240987%22%20id%3D%22toc-hId-1167240987%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1384915974%22%20id%3D%22toc-hId--1384915974%22%3EDigital%20Guardian%3C%2FH2%3E%0A%3CP%3EDigital%20Guardian%20is%20integrating%20Microsoft%20Information%20Protection%20capabilities%20into%20its%20Linux%20based%20Digital%20Guardian%20Appliance.%26nbsp%3B%20This%20will%20allow%20Digital%20Guardian%20customers%20to%20do%20several%20things%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EInspect%20Microsoft%20Information%20Protection%20labeled%20and%20encrypted%20documents%E2%80%93%20this%20capability%20extends%20the%20Digital%20Guardian%20email%20gateway%20inspection%20process%20to%20allow%20it%20to%20decrypt%20and%20inspect%20Microsoft%20Information%20Protection%20labeled%20and%20encrypted%20documents%20for%20sensitive%20or%20regulated%20data.%26nbsp%3B%20This%20will%20ensure%20that%20even%20encrypted%20documents%20are%20inspected%20and%20adhere%20to%20the%20regulatory%20stance%20of%20an%20organization%20before%20the%20email%20leaves%20the%20organization.%3C%2FLI%3E%0A%3CLI%3EReview%20content%20vs.%20label%20%E2%80%93%20this%20capability%20allows%20Digital%20Guardian%20customers%20to%20compare%20the%20content%2C%20sender%20and%20destination%20of%20an%20emailed%20document%20with%20the%20Microsoft%20Information%20Protection%20sensitivity%20label%20and%20controls%20that%20have%20been%20applied%20to%20the%20document.%26nbsp%3B%20This%20will%20ensure%20documents%20have%20not%20been%20mislabeled%20and%20the%20appropriate%20controls%20are%20applied%20before%20a%20document%20is%20emailed%20out%20of%20an%20organization%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EFor%20more%20information%20about%20the%20integration%2C%20visit%20Digital%20Guardian%E2%80%99s%20website%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdigitalguardian.com%252Fproducts%252Ftechnology-partners%252Fmicrosoft-aip%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257Ce3c927c3031e475a932408d757d07b1e%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637074425264312892%26amp%3Bsdata%3DIAC7JNW1d3ipNKiVgeeGaW%252BkC1GpDBnZXc4NzrUkLkc%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdigitalguardian.com%2Fproducts%2Ftechnology-partners%2Fmicrosoft-aip%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152099i17879D1495B9EADF%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22DG.png%22%20title%3D%22DG.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-357894361%22%20id%3D%22toc-hId-357894361%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--1308986035%22%20id%3D%22toc-hId--1308986035%22%3EForcePoint%3C%2FH2%3E%0A%3CP%3EFor%20many%20years%2C%20customers%20have%20trusted%20Forcepoint%E2%80%99s%20DLP%20to%20satisfy%20compliance%20regulations%20and%20protect%20their%20intellectual%20property.%20With%20the%20enforcement%20of%20the%20GDPR%20regulation%2C%20the%20focus%20on%20classifying%20and%20protecting%20data%2C%20wherever%20it%20resides%2C%20has%20become%20of%20utmost%20importance.%20Forcepoint%20and%20Microsoft%20are%20partnering%20to%20extend%20protection%20offered%20by%20Microsoft%20Information%20Protection%20solutions%20to%20customers%E2%80%99%20on-premises%20digital%20estate.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EForcepoint%E2%80%99s%20ecosystem%20of%20data%20classification%20partnerships%20allows%20for%20joint%20customers%20to%20experience%20the%20best%20that%20both%20solutions%20have%20to%20offer.%20When%20data%20resides%20in%20Microsoft%E2%80%99s%20cloud%20services%2C%20customers%20can%20take%20advantage%20of%20the%20sensitivity%20labeling%20and%20protection%20system%20that%20Microsoft%20provides.%20Forcepoint%20ensures%20that%20Microsoft%20Information%20Protection%20classification%2C%20labeling%20and%20data%20protection%20can%20be%20automatically%20applied%20to%20sensitive%20data%20on%20managed%20endpoints%2C%20within%20the%20customer%E2%80%99s%20datacenter%20infrastructure%20or%20within%20sanctioned%20cloud%20applications.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EForcepoint%20products%20also%20work%20to%20provide%20the%20appropriate%20visibility%2C%20access%20and%20data%20protection%20in%20public%20or%20hybrid%20cloud%20environments.%20Customers%20looking%20to%20protect%20data%20in%20Office%20365%20and%20other%20SaaS%20apps%20can%20do%20so%20thanks%20to%20this%20interoperability.%20Organizations%20can%20proactively%20apply%20policies%20governing%20the%20use%20of%20cloud-hosted%20files%20to%20help%20ensure%20compliance%20and%20deliver%20uniform%20visibility%20and%20control%20over%20cloud-hosted%20information%20assets%2C%20based%20on%20sensitivity%20labels%20applied%20by%20Microsoft%20Information%20Protection%20solutions.%20For%20more%20information%20about%20the%20integration%20go%20to%20the%20following%20site%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.forcepoint.com%252Fblog%252Finsights%252Fforcepoint-dlp-integration-microsoft-information-protection-protecting-your-critical%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C76a41206c1a54a11d54408d7564b5956%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072753955850518%26amp%3Bsdata%3D5Mk%252FDrvnRnDC4PSbxFa1MW%252BXXLnVkE8vlEUy5EOQDTU%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.forcepoint.com%2Fblog%2Finsights%2Fforcepoint-dlp-integration-microsoft-information-protection-protecting-your-critical%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152100iFB65CFD951A8A985%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22FP_DLP_AIP_Import%20Labels.png%22%20title%3D%22FP_DLP_AIP_Import%20Labels.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152102iD6FD95C140459E9A%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22FP_DLP_AIP%20-%20Incident%20Reporting.png%22%20title%3D%22FP_DLP_AIP%20-%20Incident%20Reporting.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152101i4E4B8313F1179132%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22FP_DLP_AIP%20-%20Action%20Plan.png%22%20title%3D%22FP_DLP_AIP%20-%20Action%20Plan.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-433824300%22%20id%3D%22toc-hId-433824300%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--2118332661%22%20id%3D%22toc-hId--2118332661%22%3EInformatica%3C%2FH2%3E%0A%3CP%3EUnified%20Intelligent%20Data%20Protection%3A%20Informatica%E2%80%99s%20integration%20with%20Microsoft%20Information%20Protection%20capabilities%20offers%20a%20unified%20approach%20to%20data%20protection%2C%20data%20privacy%20and%20the%20support%20of%20regulatory%20compliance%20across%20devices%2C%20the%20modern%20workplace%2C%20Azure%20Data%20Services%2C%20on-premises%20and%20other%20data%20repositories.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOffering%20CISOs%2C%20Privacy%20Officers%20and%20CDOs%20with%20a%20%E2%80%9Csingle%20pane-of-glass%E2%80%9D%20view%20into%20the%20location%2C%20risk%20and%20proliferation%20of%20personal%20and%20sensitive%20data%20throughout%20the%20enterprise%20and%20aggregate%20risk%20profiles%20for%20key%20regulations%20such%20as%20GDPR%20and%20CCPA%20compliance.%20You%20can%20find%20more%20information%20here%3A%20%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fblogs.informatica.com%252F2018%252F09%252F27%252Funified-intelligent-data-protection%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C6c24290510d84bd3771008d75680e019%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072983889868681%26amp%3Bsdata%3DUoPG6sRfiNI929D%252FQCV1uapxuyn9gBiVESFbTKBv9%252FI%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fblogs.informatica.com%2F2018%2F09%2F27%2Funified-intelligent-data-protection%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152106iF65CBC52164F6835%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22SplitScreen1%20365%20removed.png%22%20title%3D%22SplitScreen1%20365%20removed.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--375522326%22%20id%3D%22toc-hId--375522326%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-1367288009%22%20id%3D%22toc-hId-1367288009%22%3EMcAfee%3C%2FH2%3E%0A%3CP%3EMcAfee%20MVISION%20Cloud%20now%20supports%20integration%20with%20Microsoft%20Information%20Protection%20Solutions.%20This%20allows%20security%20admins%20to%20take%20advantage%20of%20Microsoft%20Information%20Protection%20encryption%20seamlessly%20across%20multiple%20cloud%20applications%20while%20managing%20policies%20with%20a%20single-pane-of-glass%20view%20provided%20by%20MVISION%20Cloud.%20Some%20of%20the%20key%20use%20cases%20supported%20by%20McAfee%20MVISION%20Cloud%20with%20Microsoft%20%26nbsp%3BInformation%20Protection%20solutions%20include%20monitoring%20sensitive%20documents%20uploaded%20to%20cloud%20applications%20and%20protecting%2Fclassifying%20these%20documents%20with%20Microsoft%20Information%20Protection%20capabilities%2C%20detecting%20collaboration%20activities%20on%20documents%20with%20given%20sensitivity%20label%2C%20and%20protecting%20documents%20being%20downloaded%20to%20unmanaged%20devices%20with%20Microsoft%20Information%20Protection%20sensitivity%20labels%3C%2FP%3E%0A%3CP%3EFor%20more%20information%20go%20to%20the%20following%20website%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.skyhighnetworks.com%252Fcloud-security-blog%252Fmcafee-mvision-cloud-and-azure-information-protection%252F%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C93cafc3586cd42d4a2bc08d753c4b61b%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637069976652549660%26amp%3Bsdata%3DveSDqI0%252BcVWSz%252BkTVPX%252FdofxLcsEdB4HWCXKLjVrSpQ%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.skyhighnetworks.com%2Fcloud-security-blog%2Fmcafee-mvision-cloud-and-azure-information-protection%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152108i3EB3B455BF632A6D%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Configuration%20(1).png%22%20title%3D%22Configuration%20(1).png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152109i54DB4E691B52EA85%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Policy%20-%20AIP%20Label%20Detection.png%22%20title%3D%22Policy%20-%20AIP%20Label%20Detection.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152110i3EF55122ACFF85FE%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Policy%20-%20Apply%20AIP%20Labels.png%22%20title%3D%22Policy%20-%20Apply%20AIP%20Labels.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1184868952%22%20id%3D%22toc-hId--1184868952%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-557941383%22%20id%3D%22toc-hId-557941383%22%3ENetSkope%3C%2FH2%3E%0A%3CP%3ENetskope%E2%80%99s%20integration%20with%20Microsoft%20Information%20Protection%20allows%20policy-based%20rights%20management%20to%20be%20applied%20to%20documents%20stored%20in%20Office%20365%20OneDrive%20for%20Business.%20Netskope%20continuously%20monitors%20OneDrive%20to%20uncover%20specific%20data%20using%20predefined%20data%20loss%20prevention%20(DLP)%20rules%20for%20common%20regulations%20(PCI%2C%20HIPAA%20etc)%2C%20or%20custom%20rules%20that%20use%20advanced%20DLP%20capabilities%20(Regex%2C%20OCR%20etc).%26nbsp%3B%20Documents%20discovered%20to%20contain%20sensitive%20data%2C%20and%2For%20inappropriately%20shared%20externally%2C%20can%20have%20specific%20rights%20management%20policies%20applied%20by%20Netskope%20to%20protect%20the%20files.%3C%2FP%3E%0A%3CP%3EFor%20more%20information%20please%20go%20to%20the%20following%20website%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fresources.netskope.com%252Fproduct-demos%252Fdemo-azure-rms-integration%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257Cfb930de5f7c546faab1608d756b3d7e1%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637073202740771950%26amp%3Bsdata%3DSmSb%252BT6%252FvtRpPaAd6jXMr1tTuL4S6hbTU3Ml%252FXX1grk%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fresources.netskope.com%2Fproduct-demos%2Fdemo-azure-rms-integration%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152111i6D7D7BE9E2CF0D62%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Netskope%20integration%20with%20MIP%20policy%20screenshot.png%22%20title%3D%22Netskope%20integration%20with%20MIP%20policy%20screenshot.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1994215578%22%20id%3D%22toc-hId--1994215578%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--251405243%22%20id%3D%22toc-hId--251405243%22%3ENucleusCyber%3C%2FH2%3E%0A%3CP%3ENC%20Protect%E2%80%99s%20integration%20with%20Microsoft%20Information%20Protection%20sensitivity%20labels%20provides%20customers%20with%20a%20solution%20that%20can%20dynamically%20apply%26nbsp%3B%20Microsoft%20Information%20Protection%20labels%20and%20protection%20at%20time-of-access%2C%20right%20down%20to%20the%20individual%20file%20level.%20This%20allows%20support%20for%20multiple%20protection%20policies%20for%20a%20single%20Microsoft%20Information%20Protection%20file%20classification%20to%20protect%20the%20data%20across%20every%20conceivable%20collaboration%20scenario.%20For%20more%20details%2Creview%20the%20following%20url%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fnucleuscyber.com%252Fnc-protect-overview%252F%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C0fda9d83a0ef461e134008d756801253%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072980387476575%26amp%3Bsdata%3D7dOwM%252F%252FDDXyQrWoPMhnxprPoQEkX86yvg9drpqQFTeE%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fnucleuscyber.com%2Fnc-protect-overview%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152112i46875CA44C7A7570%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22NC%20Labels%20SDR.png%22%20title%3D%22NC%20Labels%20SDR.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152113i8583961C4FEEF358%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22NC%20Labels.png%22%20title%3D%22NC%20Labels.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1491405092%22%20id%3D%22toc-hId-1491405092%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-1178526798%22%20id%3D%22toc-hId-1178526798%22%3EPalo%20Alto%20Networks%3C%2FH2%3E%0A%3CP%3EPalo%20Alto%20Networks%20Next-Generation%20Firewalls%2C%20using%20the%20ContentID%20feature%2C%20and%20Prisma%20SaaS%2C%20can%20identify%20Microsoft%20Information%20Protection%20sensitivity%20labels%20in%20documents%20that%20are%20in-transit%20through%20the%20network%20or%20are%20at-rest%20on%20sanctioned%20SaaS%20applications.%20These%20capabilities%20allow%20granular%20auditing%20and%20tracking%20of%20sensitive%20documents.%20Security%20policies%20can%20be%20configured%20on%20Next-Generation%20Firewalls%20to%20alert%20when%20files%20with%20specific%20Microsoft%20Information%20Protection%20labels%20leave%20the%20corporate%20network%2C%20and%20sensitive%20data%20leak%20prevention%20can%20be%20achieved%20by%20preventing%20files%20with%20certain%20labels%20to%20be%20uploaded%20to%20non-sanctioned%20services.%20Prisma%20SaaS%20can%20detect%20labels%20on%20files%20and%20documents%20stored%20on%20sanctioned%20SaaS%20services%20to%20identify%20issues%20with%20data%20governance%20and%20flag%20abnormal%20behavior.%26nbsp%3B%20For%20more%20details%2C%20checkout%20the%20following%20URLs%3A%3C%2FP%3E%0A%3CP%3EPrisma%20SaaS%20-%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.paloaltonetworks.com%252Fprisma%252Fprisma-saas%252Fprisma-saas-admin%252Fmanage-prisma-saas-policy%252Fprisma-saas-policy%252Fconfigure-data-patterns%252Fadd-file-property-data-pattern.html%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257Cc9366138787445b2977d08d75677934e%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072943945195505%26amp%3Bsdata%3DJWwZxeXv2tUc8CJSlgKVC%252BfFF5c8RRT0ZCrPWnr1ZyE%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.paloaltonetworks.com%2Fprisma%2Fprisma-saas%2Fprisma-saas-admin%2Fmanage-prisma-saas-policy%2Fprisma-saas-policy%2Fconfigure-data-patterns%2Fadd-file-property-data-pattern.html%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENext-Generation%20Firewall%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Flive.paloaltonetworks.com%252Ft5%252FBlogs%252FUsing-Azure-Information-Protection-Policies-to-Control-Document%252Fba-p%252F252652%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257Cc9366138787445b2977d08d75677934e%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072943945205497%26amp%3Bsdata%3DagWVryWpCtNSkLv3lZ3Z8BVYMhPiZ692O4kQlKWzEec%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Flive.paloaltonetworks.com%2Ft5%2FBlogs%2FUsing-Azure-Information-Protection-Policies-to-Control-Document%2Fba-p%2F252652%3C%2FA%3E%26nbsp%3Band%26nbsp%3B%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.paloaltonetworks.com%252Fpan-os%252F9-0%252Fpan-os-admin%252Fthreat-prevention%252Fset-up-data-filtering%252Fcreate-a-data-filtering-profile.html%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257Cc9366138787445b2977d08d75677934e%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072943945205497%26amp%3Bsdata%3Dl0SwXQBMh%252BsoGzzzgeb33%252FhJ8VSMa0zY%252BWQ%252BbQ86KsE%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.paloaltonetworks.com%2Fpan-os%2F9-0%2Fpan-os-admin%2Fthreat-prevention%2Fset-up-data-filtering%2Fcreate-a-data-filtering-profile.html%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152114iBD6346E93504F955%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22prisma-saas-aip.png%22%20title%3D%22prisma-saas-aip.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152115i172D6337AB836C72%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22firewall-data-filtering-aip-labels.png%22%20title%3D%22firewall-data-filtering-aip-labels.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1373630163%22%20id%3D%22toc-hId--1373630163%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-369180172%22%20id%3D%22toc-hId-369180172%22%3ESecuPi%3C%2FH2%3E%0A%3CP%3ESecuPi%20data-centric%20security%20and%20privacy%20protection%20platform%20applies%20Microsoft%20information%20Protection%20Labels%20and%20Protection%20at%20creation-time%20across%20every%20business%20application%20and%20analytics%20tool%20in%20use.%3C%2FP%3E%0A%3CP%3EBy%20installing%20the%20light-weight%20SecuPi%20overlays%20on%20the%20application%20servers%2C%20SecuPi%20monitors%20access%20to%20all%20sensitive%20data.%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOnce%20all%20reports%20and%20ad-hoc%20queries%20that%20include%20sensitive%20data%20are%20identified%20(by%20having%20SecuPi%20parse%20and%20identify%20the%20source%20SQL%20to%20the%20list%20of%20sensitive%20tables%20and%20columns).%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENo%20changes%20nor%20manual%20work%20is%20required%20to%20apply%20Microsoft%20Information%20Protection%20labels%20%26nbsp%3Bacross%20millions%20of%20newly%20created%20documents.%3C%2FP%3E%0A%3CP%3EDetails%20on%20SecuPi%20integration%20with%20a%20Microsoft%20Information%20Protection%20Solution%3A%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.youtube.com%252Fwatch%253Fv%253Dm-ZshayZnHY%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257Cb4cd4c6b0cb64bf78a6f08d75d9f6818%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637080811543731586%26amp%3Bsdata%3D9DoXrIy3R2NtckzWp4Dm4BJC8q1Kw0CmVxumNd2Cu3w%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3Dm-ZshayZnHY%3C%2FA%3E%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152355i12C59E3897F93974%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22SecuPi.jpeg%22%20title%3D%22SecuPi.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-2111990507%22%20id%3D%22toc-hId-2111990507%22%3EShieldox%3C%2FH2%3E%0A%3CP%3EThe%20tight%20integration%20between%20Microsoft%20Information%20Protection%20and%20Shieldox%20gives%20organizations%20a%20solution%20that%20finds%20risks%20in%20sharing.%20Office%20365%20has%20made%20sharing%20business%20information%20easier%20than%20ever.%20But%20while%20the%20cloud%20has%20accelerated%20business%2C%20but%20it%20has%20made%20it%20impossible%20for%20organizations%20to%20know%20exactly%20what's%20at%20risk.%20It%20can%20be%20difficult%20to%20determine%20if%20business%20information%20is%20being%20shared%20where%20it%20shouldn%E2%80%99t%2C%20like%20if%20the%20CFO%E2%80%99s%20files%20are%20exposed%20externally%20or%20if%20financial%20information%20is%20circulating%20around%20the%20company.%20Shieldox%20along%20with%20Microsoft%20Information%20Protection%20sensitivity%20labels%20makes%20it%20possible.%20It%20seamlessly%20integrates%20with%20Office%20365and%20Cloud%20App%20Security%20to%20scan%20for%20sharing%20and%20automatically%20label%20business%20information%20with%20a%20high%20degree%20of%20accuracy.%20Shieldox%E2%80%99s%20Information%20Intelligence%20algorithm%20connects%20the%20dots%20between%20different%20share%20events%20and%20actions%2C%20labels%2C%20files%2C%20and%20more%20to%20make%20sense%20of%20sharing%20and%20separate%20risks%20from%20safe%20collaboration%2C%20works%20without%20disrupting%20users%2C%20and%20only%20takes%205%20minutes%20to%20get%20started.%20With%20Shieldox%20and%20Microsoft%20Information%20Protection%2C%20organizations%20gain%20insights%20into%20risks%20to%20shared%20business%20information%2C%20so%20they%20can%20take%20action%20to%20secure%20their%20collaboration.%20Now%20you%20can%20protect%20just%20what%20needs%20protection.%20For%20more%20details%20about%20the%20platform%2C%20visit%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fshieldox.ai%252Fshieldox-and-mip%252F%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C268a03c06d214e36319808d755a3d1a1%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072035202828292%26amp%3Bsdata%3D9RCQ7ZizVOOgHh6pusDfE5ZhvTBKJcKpDgVac4%252BLzYI%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fshieldox.ai%2Fshieldox-and-mip%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152118iFC6DDB4CA57C8FF6%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Sheildox1.png%22%20title%3D%22Sheildox1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152119i1709B09010CADE9B%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Sheidox.png%22%20title%3D%22Sheidox.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--440166454%22%20id%3D%22toc-hId--440166454%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-1302643881%22%20id%3D%22toc-hId-1302643881%22%3ETrustwave%3C%2FH2%3E%0A%3CP%3EAs%20enterprises%20migrate%20to%20Microsoft%20Information%20Protection%20for%20encryption%20and%20enabling%20restricted%20access%20to%20documents%20and%20email%20both%20inside%20and%20outside%20the%20organization%2C%20protected%20content%20remains%20obfuscated%2C%20creating%20security%20blind%20spots%20-%20Trustwave%20Secure%20Email%20Gateway%20(SEG)%20decrypts%20Microsoft%20Information%20Protection%20encrypted%20messages%20(including%20protected%20files)%20and%20enforces%20corporate%20email%20policies%20on%20the%20decrypted%20content.%20Once%20the%20policy%20has%20been%20applied%2C%20the%20gateway%20can%20repackage%20the%20content%20for%20delivery%20to%20ensure%20your%20company%20data%20is%20both%20inspected%20and%20protected.%3C%2FP%3E%0A%3CP%3EThe%20gateway%20does%20multi-level%20extraction%20of%20the%20message%20to%20allow%20for%20extensive%20analysis%20of%20the%20content%20via%20multiple%20conditions%20such%20as%20DLP%20engines%20and%20file%20types.%20Administrators%20can%20then%20apply%20a%20wide%20range%20of%20actions%20to%20both%20protected%20and%20unprotected%20messages%2C%20like%20quarantine%2C%20stamping%2C%20or%20alerting%20the%20administrator.%20This%20integration%20is%20provided%20in%20both%20SEG%20Cloud%20and%20on-premise%20offerings.%20Get%20more%20information%20at%20the%20following%20website%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.trustwave.com%252Fen-us%252Fservices%252Ftechnology%252Fsecure-email-gateway%252F%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257Cebae954327b34b90fca508d755d5786c%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637072247671637580%26amp%3Bsdata%3Droxz7ZB2q0e%252B6GQyM1YeyejrC6dcB2Rlx87wQN8sUjg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.trustwave.com%2Fen-us%2Fservices%2Ftechnology%2Fsecure-email-gateway%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20393px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152121iB56D4F713E7F4F8B%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Trustwave_AIP_ContentTab_STAMPED.PNG%22%20title%3D%22Trustwave_AIP_ContentTab_STAMPED.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20396px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152122i1038976983CF10CF%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Trustwave_AIP_DetailsTab.PNG%22%20title%3D%22Trustwave_AIP_DetailsTab.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152120i57E98AD228E2A772%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Trustwave_AIP_Stamped_Content.png%22%20title%3D%22Trustwave_AIP_Stamped_Content.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1249513080%22%20id%3D%22toc-hId--1249513080%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-493297255%22%20id%3D%22toc-hId-493297255%22%3EVaronis%3C%2FH2%3E%0A%3CP%3EVaronis%20integrates%20with%20Microsoft%20Information%20Protection%20capabilities%20to%20protect%20sensitive%20data%20across%20your%20environment%20regardless%20of%20where%20it%20lives%20-%20or%20how%20it%E2%80%99s%20shared.%26nbsp%3B%20Data%20classification%20labels%20utilizes%20Varonis%E2%80%99%20sophisticated%20rule%20capabilities%20to%20identify%20sensitive%20data%2C%20like%20GDPR%2C%20CCPA%2C%20or%20PCI%2C%20and%20leverages%20their%20extensive%20pattern%20repository%20to%20build%20even%20more%20labeling%20rules.%26nbsp%3B%20By%20integrating%20with%20Microsoft%20Information%20Protection%2C%20customers%20can%20automatically%20apply%20sensitivity%20labels%20and%20encrypt%20files%20that%20Varonis%20has%20identified%20as%20sensitive.%20%26nbsp%3BIn%20addition%2C%20Varonis%20can%20find%20mislabeled%20files%20that%20contain%20sensitive%20data%20based%20on%20its%20advanced%20classification%20engine%20and%20re-apply%20the%20correct%20labels.%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.varonis.com%252Fhow-to-videos%252F%253Fwchannelid%253D2hbvcean3t%2526wvideoid%253Dk9c3oxe7ik%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C431ba9c7459a42e3f10b08d75bef56b6%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637078955838929630%26amp%3Bsdata%3DexW%252FyRn6RgXGxjyJTOTyGKc8JM%252B1GdKeM5DRdS1qjoE%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECLICK%20HERE%3C%2FA%3E%20to%20watch%20a%20technical%20integration%20demonstration.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20learn%20more%2C%20visit%20Varonis%20online%20at%3A%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.varonis.com%252Fproducts%252Fdata-classification-labels%252F%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C431ba9c7459a42e3f10b08d75bef56b6%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637078955838929630%26amp%3Bsdata%3DTYcT%252F5w7O1SNTdTSyzS%252BDKpXf9NobD7r7Pv5Dp9eexk%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.varonis.com%2Fproducts%2Fdata-classification-labels%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152123i87B797A45A0C1D74%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22Varonis_DCL_ScreenShot2019_v2%20-%20Copy.PNG%22%20title%3D%22Varonis_DCL_ScreenShot2019_v2%20-%20Copy.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--2058859706%22%20id%3D%22toc-hId--2058859706%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId--316049371%22%20id%3D%22toc-hId--316049371%22%3EVeritas%3C%2FH2%3E%0A%3CP%3EVeritas%20Enterprise%20Vault%20is%20the%20archiving%20solution%20providing%20the%20ability%20to%20archive%20and%20index%20over%2080%20content%20sources.%26nbsp%3B%26nbsp%3B%20Our%20integration%20with%20Microsoft%20Information%20Protection%20allows%20encrypted%20content%20to%20be%20fully%20indexed%20and%20classified%20when%20archived%20while%20still%20preserving%20the%20original%20AIP%20encrypted%20files%20with%20full%20fidelity.%26nbsp%3B%26nbsp%3B%20Veritas%20worked%20closely%20with%20Microsoft%20in%20building%20a%20tool%20to%20decrypt%20content%20to%20facilitate%20text%20extraction%20prior%20to%20indexing.%26nbsp%3B%26nbsp%3B%20The%20original%20encrypted%20file%20is%20preserved%20in%20the%20archive%20along%20with%20the%20extracted%20text%20in%20HTML%20format%20for%20use%20in%20Discovery%20use%20cases.%26nbsp%3B%26nbsp%3B%20Upon%20export%20from%20Discovery%2C%20content%20can%20be%20decrypted%20to%20allow%20production%20to%20external%20counsel.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20more%20information%3A%26nbsp%3B%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.veritas.com%252Finsights%252Fenterprise-vault%26amp%3Bdata%3D02%257C01%257Ckartikka%2540microsoft.com%257C1223f4ef00ef461afdae08d75cdf8480%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637079987393014005%26amp%3Bsdata%3D5rgFVdREy54puGFSFKFocbiWPKhH0iPxwCbKedFPGkU%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fwww.veritas.com%2Finsights%2Fenterprise-vault%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20398px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152130i95101FCEBAD2E461%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22EV1.jpg%22%20title%3D%22EV1.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20374px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F152131iCD24F1330702CDC9%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22EV2.jpg%22%20title%3D%22EV2.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-967024%22%20slang%3D%22en-US%22%3E%3CP%3EPartners%20that%20have%20the%20embraced%20the%20Microsoft%20Information%20Platform%20within%20their%20solutions%20to%20provide%20customers%20visibility%20into%20their%20sensitive%20data%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-967024%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EInformation%20Protection%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Information%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E

Last year at  the Ignite conference we delivered the Microsoft Information Protection SDK, which enabled our growing ecosystem of partners to build integrations in a truly cross-platform way.  Since then several partners  have joined the Microsoft Intelligent Security Association (MISA) and are in the process of releasing or already have solutions in the market that enhance and extend the value of Microsoft Information Protection capabilities. Below is a round-up highlighting some of the key Microsoft Information Protection integrations available.

 

Adobe

Now you can use Adobe Acrobat DC and Acrobat Reader DC on Windows & MacOS desktop computers to open files protected by Microsoft Information Protection capabilities.

Acrobat Reader DC / Acrobat DC auto-detects a  file protected by Microsoft Information Protection and prompts you to download the corresponding plugin from Adobe’s helpx page. Once you download and install the plug-in, the protected file open like any other PDF in Acrobat or Reader after authentication. You can also see the sensitivity label information applied to the PDF file using Acrobat Reader DC and Acrobat DC.

You can download the plugin from the following location (make sure you have the latest version of Adobe Acrobat installed:  https://helpx.adobe.com/acrobat/kb/mip-plugin-download.html

 

Adobe Integration.pngAdobe integration with Microsoft Information Protection on Windows and Mac

 

 

 

Absolute Software

Absolute, the self-healing endpoint security company, has solidified its technology partnership with Microsoft by integrating with Microsoft information Protection solutions, adding persistent visibility to enhance data protection.

The integration allows organization to detect productivity file types that contain sensitive data such as Word, Excel, PowerPoint, and PDF files.  Once the rules are configured via the Absolute console, the sensitivity label and protection persists with the file even when it moves off the endpoint. Customers now have a better way to manage unwanted access to sensitive files, without restrictive policies that hamper productivity. 

For more information, go to https://www.absolute.com/platform/

Absolute.pngAbsolute Software Integration with Microsoft Information Protection

 

 

BigID

BigID’s integration with Microsoft Information Protection allows enterprises to automatically propagate labels to sensitive and personal data for greater accuracy, ensure consistent enforcement, and address emerging privacy regulations, including GDPR and CCPA. BigID helps identify whether or not Microsoft Information Protection labeled data contains data regulated by resident-based policy (like the CCPA or GDPR) or identity-based policy (like HIPAA or CCPA) – and can automate data protection policies based on regulation and data privacy best practices. With BigID, organizations can automate data access rights, assign data residency, and monitor & alert on cross-border data flows. For more information on their integration, visit the following link: How BigID And Microsoft Information Protection (MIP) Work Together

 

BigID.pngBig ID integration with MIP

 

BigID2.png

 

 

Checkpoint Software

An integrated solution of Microsoft Information Protection capabilities with Check Point  Next Generation Firewall Security Solutions helps protect organizations from data loss.  It keeps sensitive business data safe, regardless of where it travels or how it is shared, including via email, web browsing or file-sharing services, which extend Microsoft Information protection capabilities outside of Microsoft Products.

Checkpoint1.png

 

Checkpoint2.png

 

 

Digital Guardian

Digital Guardian is integrating Microsoft Information Protection capabilities into its Linux based Digital Guardian Appliance.  This will allow Digital Guardian customers to do several things:

  • Inspect Microsoft Information Protection labeled and encrypted documents– this capability extends the Digital Guardian email gateway inspection process to allow it to decrypt and inspect Microsoft Information Protection labeled and encrypted documents for sensitive or regulated data.  This will ensure that even encrypted documents are inspected and adhere to the regulatory stance of an organization before the email leaves the organization.
  • Review content vs. label – this capability allows Digital Guardian customers to compare the content, sender and destination of an emailed document with the Microsoft Information Protection sensitivity label and controls that have been applied to the document.  This will ensure documents have not been mislabeled and the appropriate controls are applied before a document is emailed out of an organization

For more information about the integration, visit Digital Guardian’s website: https://digitalguardian.com/products/technology-partners/microsoft-aip

 

DG.png

 

ForcePoint

For many years, customers have trusted Forcepoint’s DLP to satisfy compliance regulations and protect their intellectual property. With the enforcement of the GDPR regulation, the focus on classifying and protecting data, wherever it resides, has become of utmost importance. Forcepoint and Microsoft are partnering to extend protection offered by Microsoft Information Protection solutions to customers’ on-premises digital estate.


Forcepoint’s ecosystem of data classification partnerships allows for joint customers to experience the best that both solutions have to offer. When data resides in Microsoft’s cloud services, customers can take advantage of the sensitivity labeling and protection system that Microsoft provides. Forcepoint ensures that Microsoft Information Protection classification, labeling and data protection can be automatically applied to sensitive data on managed endpoints, within the customer’s datacenter infrastructure or within sanctioned cloud applications.


Forcepoint products also work to provide the appropriate visibility, access and data protection in public or hybrid cloud environments. Customers looking to protect data in Office 365 and other SaaS apps can do so thanks to this interoperability. Organizations can proactively apply policies governing the use of cloud-hosted files to help ensure compliance and deliver uniform visibility and control over cloud-hosted information assets, based on sensitivity labels applied by Microsoft Information Protection solutions. For more information about the integration go to the following site: https://www.forcepoint.com/blog/insights/forcepoint-dlp-integration-microsoft-information-protection...

FP_DLP_AIP_Import Labels.png

 

FP_DLP_AIP - Incident Reporting.png

 

FP_DLP_AIP - Action Plan.png

 

 

 

Informatica

Unified Intelligent Data Protection: Informatica’s integration with Microsoft Information Protection capabilities offers a unified approach to data protection, data privacy and the support of regulatory compliance across devices, the modern workplace, Azure Data Services, on-premises and other data repositories. 

Offering CISOs, Privacy Officers and CDOs with a “single pane-of-glass” view into the location, risk and proliferation of personal and sensitive data throughout the enterprise and aggregate risk profiles for key regulations such as GDPR and CCPA compliance. You can find more information here:   https://blogs.informatica.com/2018/09/27/unified-intelligent-data-protection

 

 SplitScreen1 365 removed.png

 

 

McAfee

McAfee MVISION Cloud now supports integration with Microsoft Information Protection Solutions. This allows security admins to take advantage of Microsoft Information Protection encryption seamlessly across multiple cloud applications while managing policies with a single-pane-of-glass view provided by MVISION Cloud. Some of the key use cases supported by McAfee MVISION Cloud with Microsoft  Information Protection solutions include monitoring sensitive documents uploaded to cloud applications and protecting/classifying these documents with Microsoft Information Protection capabilities, detecting collaboration activities on documents with given sensitivity label, and protecting documents being downloaded to unmanaged devices with Microsoft Information Protection sensitivity labels

For more information go to the following website:

https://www.skyhighnetworks.com/cloud-security-blog/mcafee-mvision-cloud-and-azure-information-prote...

Configuration (1).png

 

Policy - AIP Label Detection.png

 

Policy - Apply AIP Labels.png

 

 

NetSkope

Netskope’s integration with Microsoft Information Protection allows policy-based rights management to be applied to documents stored in Office 365 OneDrive for Business. Netskope continuously monitors OneDrive to uncover specific data using predefined data loss prevention (DLP) rules for common regulations (PCI, HIPAA etc), or custom rules that use advanced DLP capabilities (Regex, OCR etc).  Documents discovered to contain sensitive data, and/or inappropriately shared externally, can have specific rights management policies applied by Netskope to protect the files.

For more information please go to the following website: https://resources.netskope.com/product-demos/demo-azure-rms-integration

Netskope integration with MIP policy screenshot.png

 

 

NucleusCyber

NC Protect’s integration with Microsoft Information Protection sensitivity labels provides customers with a solution that can dynamically apply  Microsoft Information Protection labels and protection at time-of-access, right down to the individual file level. This allows support for multiple protection policies for a single Microsoft Information Protection file classification to protect the data across every conceivable collaboration scenario. For more details,review the following url: https://nucleuscyber.com/nc-protect-overview/

NC Labels SDR.pngNC Labels.png

 

Palo Alto Networks

Palo Alto Networks Next-Generation Firewalls, using the ContentID feature, and Prisma SaaS, can identify Microsoft Information Protection sensitivity labels in documents that are in-transit through the network or are at-rest on sanctioned SaaS applications. These capabilities allow granular auditing and tracking of sensitive documents. Security policies can be configured on Next-Generation Firewalls to alert when files with specific Microsoft Information Protection labels leave the corporate network, and sensitive data leak prevention can be achieved by preventing files with certain labels to be uploaded to non-sanctioned services. Prisma SaaS can detect labels on files and documents stored on sanctioned SaaS services to identify issues with data governance and flag abnormal behavior.  For more details, checkout the following URLs:

Prisma SaaS - https://docs.paloaltonetworks.com/prisma/prisma-saas/prisma-saas-admin/manage-prisma-saas-policy/pri... 

Next-Generation Firewall: https://live.paloaltonetworks.com/t5/Blogs/Using-Azure-Information-Protection-Policies-to-Control-Do... and  https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/threat-prevention/set-up-data-filtering/cr...

prisma-saas-aip.png

 

firewall-data-filtering-aip-labels.png

 

SecuPi

SecuPi data-centric security and privacy protection platform applies Microsoft information Protection Labels and Protection at creation-time across every business application and analytics tool in use.

By installing the light-weight SecuPi overlays on the application servers, SecuPi monitors access to all sensitive data. 

Once all reports and ad-hoc queries that include sensitive data are identified (by having SecuPi parse and identify the source SQL to the list of sensitive tables and columns). 

 

No changes nor manual work is required to apply Microsoft Information Protection labels  across millions of newly created documents.

Details on SecuPi integration with a Microsoft Information Protection Solution:

https://www.youtube.com/watch?v=m-ZshayZnHY  

SecuPi.jpeg

 

 

 

Shieldox

The tight integration between Microsoft Information Protection and Shieldox gives organizations a solution that finds risks in sharing. Office 365 has made sharing business information easier than ever. But while the cloud has accelerated business, but it has made it impossible for organizations to know exactly what's at risk. It can be difficult to determine if business information is being shared where it shouldn’t, like if the CFO’s files are exposed externally or if financial information is circulating around the company. Shieldox along with Microsoft Information Protection sensitivity labels makes it possible. It seamlessly integrates with Office 365and Cloud App Security to scan for sharing and automatically label business information with a high degree of accuracy. Shieldox’s Information Intelligence algorithm connects the dots between different share events and actions, labels, files, and more to make sense of sharing and separate risks from safe collaboration, works without disrupting users, and only takes 5 minutes to get started. With Shieldox and Microsoft Information Protection, organizations gain insights into risks to shared business information, so they can take action to secure their collaboration. Now you can protect just what needs protection. For more details about the platform, visit https://shieldox.ai/shieldox-and-mip/

 

Sheildox1.png

 

Sheidox.png

 

 

Trustwave

As enterprises migrate to Microsoft Information Protection for encryption and enabling restricted access to documents and email both inside and outside the organization, protected content remains obfuscated, creating security blind spots - Trustwave Secure Email Gateway (SEG) decrypts Microsoft Information Protection encrypted messages (including protected files) and enforces corporate email policies on the decrypted content. Once the policy has been applied, the gateway can repackage the content for delivery to ensure your company data is both inspected and protected.

The gateway does multi-level extraction of the message to allow for extensive analysis of the content via multiple conditions such as DLP engines and file types. Administrators can then apply a wide range of actions to both protected and unprotected messages, like quarantine, stamping, or alerting the administrator. This integration is provided in both SEG Cloud and on-premise offerings. Get more information at the following website: https://www.trustwave.com/en-us/services/technology/secure-email-gateway/

 

Trustwave_AIP_ContentTab_STAMPED.PNG

 

Trustwave_AIP_DetailsTab.PNG

 

Trustwave_AIP_Stamped_Content.png

 

 

 

Varonis

Varonis integrates with Microsoft Information Protection capabilities to protect sensitive data across your environment regardless of where it lives - or how it’s shared.  Data classification labels utilizes Varonis’ sophisticated rule capabilities to identify sensitive data, like GDPR, CCPA, or PCI, and leverages their extensive pattern repository to build even more labeling rules.  By integrating with Microsoft Information Protection, customers can automatically apply sensitivity labels and encrypt files that Varonis has identified as sensitive.  In addition, Varonis can find mislabeled files that contain sensitive data based on its advanced classification engine and re-apply the correct labels.  CLICK HERE to watch a technical integration demonstration.

 

To learn more, visit Varonis online at:  https://www.varonis.com/products/data-classification-labels/

 

Varonis_DCL_ScreenShot2019_v2 - Copy.PNG

 

 

Veritas

Veritas Enterprise Vault is the archiving solution providing the ability to archive and index over 80 content sources.   Our integration with Microsoft Information Protection allows encrypted content to be fully indexed and classified when archived while still preserving the original AIP encrypted files with full fidelity.   Veritas worked closely with Microsoft in building a tool to decrypt content to facilitate text extraction prior to indexing.   The original encrypted file is preserved in the archive along with the extracted text in HTML format for use in Discovery use cases.   Upon export from Discovery, content can be decrypted to allow production to external counsel.

 

For more information:  https://www.veritas.com/insights/enterprise-vault

EV1.jpg

 

EV2.jpg