MyDataSecurity: First security dashboard for users

ADVANCED MONITORING

Maintain control over your data

An all-in-one tool that strengthens the key functions of detection, monitoring, audit, and remediation for even greater protection.

Permission Explorer, illustration product

PATENTED TECHNOLOGY

ERGONOMIC

NO INFRASTRUCTURE

REAL TIME

ADVANCED MONITORING

An expert M365 and file monitoring platform

Benefit from a comprehensive tool with 4 key capabilities: detection, monitoring, auditing and remediation.
 
Automate alerts about sensitive data, and schedule permission reviews.
Reduce the number of people responding to security incidents by only involving the right people.

REAL-TIME MONITORING & AUDITING

Keep control over access, permissions, sharing, and configurations

 
Operational security teams have a complete monitoring interface where data is consolidated and available in a single location.
 
Immediately view permissions, configurations, delegations, and access. Easily initiate audits of one or more user accounts.

Audit & supervision IDECSI

REAL-TIME ALERT & DETECTION

Identify any intrusion or malicious act as soon as it occurs

 
The preconfigured threat models ensure no unauthorised access or setting escapes your notice. When an alert is raised, it can be sent to ISS teams, to the SOC, or integrated into a SIEM. It can also be sent directly to users so it can be addressed quickly.
 
Improve the reliability and scope of your detection capabilities.

Detection and alerting IDECSI

AUTOMATION

Orchestrate and automate security operations

 
The platform helps manage security environments relating to access and permissions, and integrates automatic recertification and remediation mechanisms. Optimise your response time and ability to react to security incidents.
 
Improve the productivity and effectiveness of your teams.

Automated processus

USER INVOLVEMENT

Connect your security mechanisms and your users

 
When connected to other IDECSI solutions, Advanced Monitoring helps correct and remediate problems as quickly as possible.
All normal events are filtered and processed by IDECSI and validated by users.
 
Optimise all security processes by involving your users.

involving users

BENEFITS

An expert administration platform

INCREASE THE CAPABILITIES OF YOUR SOC/SIEM

Eliminate false positives, improve reporting of actual incidents and resolving of alerts.
Enrich your SIEM solution with more qualified alerts.

IMPROVE YOUR ROI

Greatly reduce processing and analysis costs. Help security and SOC teams focus only on real security incidents.

INVOLVE YOUR USERS

Your team members will be more aware and empowered. They can immediately validate or raise the alert about any security breach. Shorter resolution times and increased detection capacity.

57%

COMPANIES STATE THEY HAVE EXPERIENCED AT LEAST ONE CYBER ATTACK IN 2020 – *CESIN “BAROMETER OF COMPANY CYBERSECURITY”

Activate real-time detection and alerts for your data

SNCF

IDECSI helped us reduce usage problems and potential security flaws in the M365 tenant. Such a volume required a large-scale solution to review permissions and raise user awareness of data governance.

Antoine Ancel, Director of Operational Cybersecurity
Vincent Gapaillard
Lagardère Travel Retail

Because the solution is easy to use and provides relevant alerts, employees feel empowered to protect data every day.

Vincent Gapaillard, CISO
Confédération française démocratique du travail

Solution installation and configuration only took a few minutes, and ever since we’ve been able to anticipate, detect, and immediately adapt to risk situations.

Patrice Salsa, CIO

IDECSI’S SOLUTION

User-connected platform

The first security platform that gets users involved with the major security features, thus ensuring a high level of protection.
The solution uses a three-pronged approach:

60%

OF CYBERATTACKS ARE CAUSED BY HUMAN ERROR*

45%

OF EMPLOYEES ARE CONCERNED ABOUT THE SECURITY OF THEIR DATA*

80%

OF CISOs CONSIDER SHARING MANAGEMENT BY EMPLOYEES TO BE A MAJOR SECURITY RISK*

Advanced Monitoring

An all-in-one tool that combines detection, monitoring, auditing and remediation.
 
*Accenture “State of cybersecurity” – Report 2020

My Data Security

A dashboard for users to track access, rights and sharing of their data.
 
*IFOP survey “Les salariés et la sécurité de leurs données” – 2019

Permission Explorer

An ergonomic console for analysis and supervision.
 
*CESIN “Barometer of company cyber-security” – 2021

Our articles

Find out how to improve your data protection

MICROSOFT 365 10 DECEMBER 2021 Classify and protect sensitive data
Microsoft 365
Security

Classify and protect sensitive data

Read the article
Logos Microsoft 365
Workplace

Best practices to improve security on Microsoft 365

Read the article
Microsoft teams
Microsoft 365

Microsoft Teams: 5 key points to improve data protection

Read the article
Microsoft 365 accès informatiques
Security

How to improve the access, sharing control

Read the article
Microsoft x IDECSI
Microsoft 365

The Microsoft – IDECSI partnership for optimised security

Read the article
Monitoring Office 365
Security

Office 365 monitoring: 3 use cases to watch closely

Read the article

Data protection:
Let’s talk about your project!

Contact us