Discover MyDataSecurity: The first security dashboard for users

PERMISSION EXPLORER

Facilitate analysis and supervision

Review permissions with a single click. Oversee all operations, permissions and sharing on Microsoft 365 and file servers. Easily find sensitive data.

video background

SECURITY TEAM AUTONOMY

IMPROVED VISIBILITY AND TRACEABILITY

INTEGRATE MIP CLASSIFICATIONS

INTUITIVE PLATFORM

PERMISSION EXPLORER

A powerful tool for governance and supervision

Benefit from advanced analysis and research functions to manage and understand permissions, access, sharing, and OTHER operations in your environments. Greater control over your most sensitive data.
Facilitate investigations and manage compliance for your data.

video background

LOGGING AND TRACEABILITY

Map your data

 
The IDECSI platform collects and facilitates access to information on all your files and users, as well as the operations carried out: configuration, MIP classifications, activities, operations, media used, location.
 
Benefit from expert monitoring with real-time visibility to all permissions and mailbox delegations.

data historisation

REPORTING

Get personalized reports with a single click

 
Security teams can quickly launch audits and personalized reports (PowerBI and Excel integrations).
 
Provide information and publish reports for each profile in the correct format: IT, Security Experts, Managers, Users.

Audit and personalised reporting

SIMPLIFIED FORENSICS

Quickly investigate incidents

 
In the event of an incident, security teams have an advanced tool to perform fine-grained analyses and report all operations carried out.
 
Your security investigations will become more efficient thanks to the centralized information structure.

Forensic

CORRECTION AND REMEDIATION

Respond quickly once a threat has been detected

 
Remove or update compromised permissions. Drive recertification and remediation campaigns from the IDECSI platform.

Correction and remediation

Benefits

An agile platform to monitor your data

IMPROVED VISIBILITY

Immediately view all sensitive elements.
Security teams can regularly and easily check the integrity of key applications and security of their users.

GREATER EFFICIENCY

Launch precise multi-criteria searches to identify any overexposed data and protect it.

FACILITATE YOUR TEAMS’ WORK

Securely facilitate exploration and monitoring of your data through an easy-to-use, intuitive interface.

250

HOURS SPEND ON AVERAGE TO INFILTRATE IN INFORMATION SYSTEMS – SOPHOS “ACTIVE ADVERSARY PLAYBOOK 2020”

Get greater visibility and increase your analytical and monitoring capabilities

Eric Vautier
Groupe Aéroport De Paris

Today, IDECSI is an extension of our control and monitoring systems for access rights to our information assets.

Eric Vautier, Group CISO
Frédéric Petrus
Faurecia

Carrying out sharing reviews on O365, analysing all the hardware and tackling a remediation plan – all this is made possible by user involvement and the IDECSI platform. It’s easy too!

Frédéric Petrus, IS Risk and Compliance Manager
Confédération française démocratique du travail

Solution installation and configuration only took a few minutes, and ever since we’ve been able to anticipate, detect, and immediately adapt to risk situations.

Patrice Salsa, CIO

IDECSI’S SOLUTION

User-connected platform

The first security platform that gets users involved with the major security features, thus ensuring a high level of protection.
The solution uses a three-pronged approach:

60%

OF CYBERATTACKS ARE CAUSED BY HUMAN ERROR*

45%

OF EMPLOYEES ARE CONCERNED ABOUT THE SECURITY OF THEIR DATA*

80%

OF CISOs CONSIDER SHARING MANAGEMENT BY EMPLOYEES TO BE A MAJOR SECURITY RISK*

Advanced Monitoring

An all-in-one tool that combines detection, monitoring, auditing and remediation.
 
*Accenture “State of cybersecurity” – Report 2020

My Data Security

A dashboard for users to track access, permissions and sharing of their data.
 
*IFOP survey “Les salariés et la sécurité de leurs données” – 2019

Permission Explorer

An intuitive platform for analysis and supervision.
 
*CESIN “Barometer of company cyber-security” – 2021

Our articles

Find out how to improve your data protection

identity management in Microsoft 365
Microsoft 365

Identity management: 5 profiles to understand in Microsoft 365

Read the article
licenses Microsoft 365
Microsoft 365

Microsoft 365 Licenses: understanding security levels

Read the article
shared channels in Microsoft Teams
Microsoft 365

Shared channels, a major change in the management of Microsoft Teams?

Read the article
access review m365
Microsoft 365

M365 Collaboration Tools Access Review

Read the article
Risk in Microsoft 365 blogpost
Microsoft 365

4 risks to watch out for in Microsoft 365 collaboration tools

Read the article
Green IT Blogpost
Security

Green IT and hybrid work: towards a more responsible digital world

Read the article
MICROSOFT 365 10 DECEMBER 2021 Classify and protect sensitive data
Microsoft 365
Security

Classify and protect sensitive data

Read the article
Logos Microsoft 365
Workplace

Best practices to improve security on Microsoft 365

Read the article
Microsoft teams
Microsoft 365

Microsoft Teams: 5 key points to improve data protection

Read the article
Microsoft 365 accès informatiques
Security

How to improve the access, sharing control

Read the article

Data protection:
Let’s talk about your project!

Contact us
video background