Discover MyDataSecurity: The first security dashboard for users

MyDataSecurity

The essential dashboard for every user

With MyDataSecurity, users have the means to control and monitor the security of their data and of the company.

video background

IMPROVED VISIBILITY

SIMPLIFIED REMEDIATION

MODERN EXPERIENCE

GREATER TRUST

MYDATASECURITY

Strong, collective protection that is highly cost-effective

Your users control their data using a security dashboard.
 
Connected to the central IDECSI platform, MyDataSecurity considerably improves the management and security of permissions, access, and sharing.

video background

Watch the MyDataSecurity video

preview of the video
video background

CENTRALIZED AND PERSONALIZED DASHBOARD

Provide every user with visibility of their environment and who’s accessing their data

 
Each user has a personalized dashboard allowing them to monitor and visualize their data across their M365 environment: Who can access it? Who has permissions? Who is looking at and sharing their data?
Users can see, control, and make any necessary changes directly.
 
Simplify the security experience through a simple, user-friendly mobile and web interface.

Platform of MyDataSecurity

SIMPLIFIED PERMISSIONS MANAGER TOOL

Launch campaigns with a single click, using automated and centralized dashboard processing

 
The user is able to immediately identify any anomalies, security issues, errors, or obsolete permissions.
 
Thanks to MyDataSecurity, reviewing permissions and recertification becomes interactive and programmable. Performance is monitored and issues can be directly remediated by users.

Rights review simplified

AUTOMATED REMEDIATION

Reduce incident remediation time

 
Notifications can be sent for any actions requiring verification, further increasing the level of vigilance and reducing response time (new permissions, new device, new rule, etc.).
 
The platform can automatically perform remediation operations under supervision, but without requiring intervention by IT administrators or infosec teams.

Timeline for events and automatic remediation

INTEGRATED WITH EXISTING SECURITY TOOLS

Strengthen security across the company

 
Infosec teams define MyDataSecurity parameters: which elements are visible to users, notification policies, and remediation rules.
 
Connected to your SIEM, MyDataSecurity and the IDECSI platform reduce costs and improve event processing. Significant events with real risk are more clearly identified and only then are they reported. SOC teams can improve their performance: greater capacity to analyze and detect and save time by avoiding unnecessary investigations they can be self-managed by users.

Expert platform

AWARENESS AND COLLABORATIVE SECURITY

Data protection for and by users

EMPOWER YOUR USERS

Users help bolster security with MyDataSecurity.
Access to and sharing of their data is better managed and protected.

IMPROVE YOUR PERFORMANCE

MyDataSecurity enables ongoing, dynamic and highly precise monitoring of your organization’s digital security.
Detection and responsiveness are more accurate and faster.

GREATER TRUST

Users have greater visibility over all their resources and are better able to monitor their data.
Everything is centralized; managing and adopting new digital tools is easier than ever.

80%

OF EMPLOYEES WANT TO BE INVOLVED IN SECURING THEIR DATA -IFOP STUDY “EMPLOYEES AND THE SECURITY OF THEIR DATA”

Involve your employees for more effective security

Marc Tournier
Eramet

The combination of IDECSI’s expert security tool and the increased user’s role thanks to MyDataSecurity provides upgraded and optimized security in O365.

Marc Tournier, CISO
Frédéric Petrus
Faurecia

Carrying out sharing reviews on O365, analysing all the hardware and tackling a remediation plan – all this is made possible by user involvement and the IDECSI platform. It’s easy too!

Frédéric Petrus, IS Risk and Compliance Manager
Vincent Gapaillard
Lagardère Travel Retail

Because the solution is easy to use and provides relevant alerts, employees feel empowered to protect data every day.

Vincent Gapaillard – CISO

IDECSI’S SOLUTION

User-connected platform

The first security platform that gets users involved with the major security features, thus ensuring a high level of protection.
The solution uses a three-pronged approach:

60%

OF CYBERATTACKS ARE CAUSED BY HUMAN ERROR*

45%

OF EMPLOYEES ARE CONCERNED ABOUT THE SECURITY OF THEIR DATA*

80%

OF CISOs CONSIDER SHARING MANAGEMENT BY EMPLOYEES TO BE A MAJOR SECURITY RISK*

Advanced Monitoring

An all-in-one tool that combines detection, monitoring, auditing and remediation.
 
*Accenture “State of cybersecurity” – Report 2020

My Data Security

A dashboard for users to track access, permissions and sharing of their data.
 
*IFOP survey “Les salariés et la sécurité de leurs données” – 2019

Permission Explorer

An intuitive platform for analysis and supervision.
 
*CESIN “Barometer of company cyber-security” – 2021

Our articles

Find out how to improve your data protection

identity management in Microsoft 365
Microsoft 365

Identity management: 5 profiles to understand in Microsoft 365

Read the article
licenses Microsoft 365
Microsoft 365

Microsoft 365 Licenses: understanding security levels

Read the article
shared channels in Microsoft Teams
Microsoft 365

Shared channels, a major change in the management of Microsoft Teams?

Read the article
access review m365
Microsoft 365

M365 Collaboration Tools Access Review

Read the article
Risk in Microsoft 365 blogpost
Microsoft 365

4 risks to watch out for in Microsoft 365 collaboration tools

Read the article
Green IT Blogpost
Security

Green IT and hybrid work: towards a more responsible digital world

Read the article
MICROSOFT 365 10 DECEMBER 2021 Classify and protect sensitive data
Microsoft 365
Security

Classify and protect sensitive data

Read the article
Logos Microsoft 365
Workplace

Best practices to improve security on Microsoft 365

Read the article
Microsoft teams
Microsoft 365

Microsoft Teams: 5 key points to improve data protection

Read the article
Microsoft 365 accès informatiques
Security

How to improve the access, sharing control

Read the article

Data protection:
Let’s talk about your project!

Contact us
video background