Prot-On



Prot-On
IRM (Information Rights Management)
It is an IRM (Information Rights Management) solution for the encryption and secure management of information exchange, whose main functionalities are:
- File protection: all copies will be protected with strong encryption, regardless of where they are stored.
- File access control: every time a user tries to open a copy of the file, it is checked if they are authorized and what they can do with it (read, print, edit...).
- Know their activity: allows you to check the actions of authorized users on copies of the document at any time. These permissions can be modified remotely.
- Automatic classification of files and texts: discovery of sensitive information through AI techniques and regular expression patterns, automatic protection of documents based on privacy and security levels and policies, and adaptation to new data protection and security regulations.
The importance of the NIS2 Directive
Prot-On facilitates compliance with NIS2 and information security measures
The NIS2 Directive is a crucial EU regulation to establish the same level of cybersecurity in all member states.

The directive encompasses procedures in risk management, incident management and supply chain security.

By strengthening resilience to cybersecurity threats, it aims to shield the smooth functioning of the EU's internal market and digital autonomy.

The NIS2 Directive in the process of being transposed into Spanish legislation.

Essential Service Operators (OES): in sectors such as energy, banking, financial market infrastructure, healthcare, transport, digital infrastructure, drinking water, wastewater, public administration, ICT service management and space.

Other critical sectors: research, chemistry, food, postal services, digital suppliers, manufacturing and waste management
NIS2
Requirements for NIS2 Compliance
OEs should take steps to manage risk and prevent the impact of incidents by:
- Risk analysis and security policies for information systems;
- Incident management;
- Business continuity, such as backup management and disaster recovery, and crisis management;
- Security in the supply chain, including security-related aspects relating to the relationships between each entity and its direct suppliers or service providers;
- Security in the acquisition, development and maintenance of networks and information systems, including vulnerability management and disclosure;
- Policies and procedures for evaluating the effectiveness of cybersecurity risk management measures;
- Basic cyber hygiene practices and cybersecurity training;
- Policies and procedures relating to the use of cryptography and, where applicable, encryption;
- Human resources security, access control policies and asset management;
- The use of multi-factor authentication solutions;

Proactive security and information encryption
Prot-On facilitates the use of encryption and other proactive security measures required by the NIS2 directive, by:
- Data encryption, an aspect explicitly mentioned in NIS2, within Article 21. Prot-On protects restricted information from unauthorized access, ensuring you retain full control inside and outside your organization
- Prot-On's advanced data protection features, such as granular access rights, expiration dates, remote revocation of document access for any user/user group, and controlled access, offer an additional layer of security for your data and align directly with NIS2 preventative measures
- It helps in supply chain security management, by allowing you to protect and control your data, regardless of whether your email account is Office365 or not, as well as allowing you to integrate user identity management with any IdP (AD, LDAP,..)
- It facilitates data security governance, through built-in manual (per-user) and automatic classification (regular expressions and AI patterns) functions.
- Natively integrates the use of MFA multi-factor solutions for platform access and document access.
Included in the Secure Communications category of the Ministry of Economic Affairs and Digital Transformation’s DIGITAL KIT
DIGITAL KIT PROGRAMME CO-FINANCED BY THE NEXT GENERATION (EU) FUNDS OF THE RECOVERY AND RESILIENCE MECHANISM

Cybersecurity and Risks
The result of the project was the establishment of the Information Security Policy, Information Classification Policy, Guidelines for the Protection of Information, Awareness of the Need for Classification and Prot-On to Protect Classified Information.
Cybersecurity and Risks
The result of the project was that users would be able to access sensitive corporate documents without software installation, in SharePoint Azure and with control of who accesses it and when.
Cybersecurity and Risks
From a business point of view, the structure, policies, standards, procedures and document control of the company were analyzed to adapt them to the use of IRM (Information Rights Management) technologies.
We were able to identify the types of information where if this information were to be disclosed outside the company's boundaries, it could have a high or severe impact on the company, its assets or employees.
PROT-ON
FREQUENTLY ASKED QUESTIONS
What subscriptions does Prot-On for Business have?
With the Small Business or Corporate service, one or more administrators will be able to manage the company’s document permissions, report reports, block users and their respective permissions, create workgroups, etc.
Is SSO authentication possible? (Single Sign-On)
Prot-On offers great flexibility with regard to the authentication of a user. The first alternative would be to authenticate from Prot-On with each user of our database; the second is to use credentials stored in the company’s Active Directory or LDAP, and a third alternative would be to leverage an external identity service provider that supports SAML2, OpenID, or OAuth standard; this would provide Single Sign On with the corresponding systems. s
Is it possible to work with protected documents in SharePoint?
Yes, you can protect document libraries and encrypt them automatically, work with documents stored on the SharePoint platform, edit them and save them directly without losing their protection. In addition, you can open protected documents online with Prot-On Drag’n Drop.
Is it necessary to classify the information before putting Prot-On?
An information classification policy helps to clearly define the different levels of data sensitivity and the protection measures required for each level. The information classification policy establishes the necessary foundations for the successful implementation of an IRM tool, ensuring that the data is managed and protected according to its sensitivity and value for the organization.
appsec helps in the definition of the policy and the identification of the information that must be classified
How can Prot-On integrate with my organization's existing tools and systems?
Prot-On is designed to easily integrate with an organization’s existing tools and systems. It can be integrated with cloud storage services such as Google Drive, OneDrive, and Dropbox, as well as document management systems (DMS) and collaboration platforms such as Microsoft SharePoint.
In addition, Prot-On offers APIs and SDKs so that organizations can customize and integrate rights protection functionality into their own applications and workflows.