boldon jamesWe are part of the QinetiQ group, a major UK plc and FTSE 250 company, and whilst our business has grown, our attitude to quality software development and customer service excellence remains the same. We pride ourselves in finding real solutions that work for our clients – whatever their challenge.

We have over 30 years’ experience in facilitating secure messaging and classifying data to protect against sensitive data leaks. We work with the world’s leading commercial organisations, system integrators, defence forces and governments, driving effective classification of all kinds of data within their existing software environments. We’ve worked on some of the world’s largest IT security software programmes, collaborating with our network of global partners.

Secur is a Boldon James Platinium partner based in South Africa, offering Boldon James implementation, integration and support services, these services can be offered even in Botswana, Lesotho, Namibia, Kenya and Nigeria

Data Classification

Explore how our best-of-breed data classification solutions helps you categorise, label and protect data. Advanced data classification fuses categorisation with labelling to deliver a powerful data protection and governance punch. Enabling organisations to better manage and control their data, streamline operational performance and improve return on technology investment.

Categorise, Label and Protect your data.

Data classification allows your users to assign a visual label to the data they create, so that informed decisions can be taken about how it is managed, protected and shared, both within and outside of your organisation.

Boldon James Classifier turns that visual label into metadata, which can be used to both enforce your company’s security policies and drive other technologies, such as data loss prevention, information rights management and archiving solutions.

The result is streamlined business processes with data security at the core, reducing risk and improving security culture

Data
Categorisation

Big data, data governance and data management – these are everyday challenges for all organisations today. Data categorisation with Boldon James Classifier helps you identify the context as well as content of data, and critically extends classification beyond the security domain to ensure you a holistic view of data.

Security
Labelling

Sensitive data is important to identify, to ensure the right people have access to the right data. However, sensitivity is just one dimension of data classification. In order to get the full potential from data classification, and value from your data, you need to combine categorisation with security labelling. Boldon James has the unique tools to show you how.

Data Security

Ensure your data at rest, in use and in motion is well protected by encomposing the portfolio of data security solutions from our parent company HelpSystems.

Ensuring sensitive data is well protected

In the same way an organization takes care of its employees, customers, and finances, it also needs to ensure its sensitive data is well protected. Data security is mandated by regulations such as HIPAA, SOX, and GDPR and to ensure compliance, organizations have a duty to safeguard data privacy by preventing unauthorized access.

In theory, the principle behind data security sounds relatively simple. In practice, data security presents a major challenge for organizations, especially when you consider the large volumes and different types of data generated, stored, sent, and received on a daily basis, and the complexity of today’s hybrid IT environments.

Data security is the practice of identifying and protecting sensitive data, and ensuring it remains secure throughout its lifecycle. The data that requires protection is dependent on the compliance regulation or standard that governs the organization – this could be by:

  • Industry, such as the Protected Healthcare Information (PHI) privacy rule, or by
  • Data type, such as Payment Card Information (PCI) or Personally Identifiable Information (PII)

Data security solutions facilitate the proper handling of this data, helping organizations achieve and maintain compliance through the management and control of data at rest, in use, and in motion.

Automated Data Classification

Automated data classification involves the application of a classification for a particular file or message by a pre-defined rule set. The rule set might be based on matching keywords or expressions found in the content with a given list or identifying some other characteristic of the file for example, it came from the customer information data store so needs to be protected.

Automated classification can also extend classification coverage across a variety of originating data sources, including those which originate outside of user control. This approach is useful when organisations have data generated by automated processes or systems that should be classified at the point of creation without user intervention – for example reports that are produced by an ERP system.

Some organisations look to combine automation with a user-driven approach to provide an element of support to the user. For example, applying default labels based on user group or department. This approach reduces the number of clicks that the user has to perform but by involving the user greatly enhances the accuracy of the classification process.

Automatic classification cannot understand the context of a file or document and as a result faces challenges with accuracy. Incorrect matches or ‘false positives’ reduce user’s trust in the system and failure to identify sensitive data or ‘false negatives’ expose the organisation to unnecessary risk. The challenge is to tune these algorithms to provide an acceptable error rate that avoids frustrating users and ensures policies are adequately enforced. Where this is not possible often organisations de-tune their automation rules in order to reduce the error levels, clearly this dilutes the tools effectiveness.

Blending the use of automated techniques with user-driven data classification can deliver significant benefits. Capturing user insight in the process of data classification is critical to ensuring decisions are made within the correct context. In order to get this blend of techniques right for your business, your classification solution needs to offer an integrated range of approaches that you can tailor to meet your precise needs and that can be easily adapted as your needs evolve.

Boldon James Classifier is an Enterprise Classification System that blends together best practice in user-centric and automated classification techniques in the manner most appropriate to your business.

Benefits

  • Adapts to your business and infrastructure needs
  • Reflects the differing requirements of your user communities
  • Supports users in their classification decision-making
  • Streamlines workflow for routine classification tasks
  • Balances technology-based decision-making with user insight
  • Respects the authority of user judgements
  • Widens the reach of data classification
  • Leverages investment in discovery tools such as DLP

Boldon James

Cloud Security

The trend towards more remote and collaborative working has led to increased acceptance of cloud-based applications and storage. Cloud solutions offer the savings of reduced infrastructure requirements, but this need not come at the cost of a loss of ability to control data.

Boldon James Classifier ensures that your data can be classified, and retain classification in Cloud storage and applications, ensuring your data is in your control wherever
it resides.

Classifier allows you to classify your data and establish controls to ensure that your valuable information is not distributed inappropriately, helping to eliminate the risk of data breaches right from the outset.

Utilising best-of-breed classification in association with your cloud security partner ensures that you can reap the benefits from an outsourced service without sacrificing any of the advanced classification controls that your business requires. If you have opted for a private cloud computing solution, we can also work with your service provider to embed classification functionality within their service.

  • Exploit cost-effective cloud options without sacrificing data control
  • Enhance private, public and hybrid cloud solutions
  • Limit risk by controlling where data resides
  • Seamless integration with best-of-breed Cloud security solutions

Data Retention

Businesses save data for many different reasons; regulatory compliance, financial reporting, or disaster recovery, which can lead to conflicting and confusing archiving policies. The net result being that users cannot be confident about deletion so end up saving everything, driving up your data storage costs and risking failure to comply with legal obligations.

By involving users in the classification of their data with the Boldon James Classifier suite, it is possible to remove the need for ad-hoc application of data retention and archiving practices. By assigning value to information through classification metadata, retention policies can be enforced automatically, employing third party archiving systems, making your data archiving and retention more efficient, more reliable and easier to use.

  • Increased consistency with automatic application of data retention policies
  • Reduced cost of data storage
  • Increased operational efficiency & effectiveness
  • Improved data reliability improves performance of eDiscovery
  • Supports compliance obligations for data retention and disposal
  • Makes user-driven classification easy
  • Increases awareness of data value and sensitivity
  • Improved compliance with industry regulations

Traditional Military Message Handling Systems (MMHS) can be difficult & costly to implement, maintain and administer. Boldon James provides a solution that enables you to implement a secure military messaging system quickly, easily and cost-effectively by extending capabilities of commercial off-the-shelf (COTS) Microsoft platforms, most commonly 2007, 2010, and 2013. This means that you can design and deliver messaging systems based on COTS principles much quicker and with lower financial commitment, with confidence in the security of your messaging and ensuring conformance with STANAG 4406 (including Annex E) and RFC 6477 messaging standards..

Get in Touch

+27 (0) 87-164-2205
boldonjames@secur.africa
Request a Quote