Data Loss Prevention is a system which performs real-time data classification of all outbound / inbound transmissions from the Network and Devices while automatically enforcing security policies on security violations including blocking. The key is to protect the content, not the file. So if the same content resides in multiple files of different formats, the system must still detect it and enforce an action on the transmission. New programs requiring the use of unconventional protocols are becoming increasingly more prevalent. Furthermore, despite company policies forbidding the practice, employees frequently utilize peer to peer applications. Microsoft Networks and similar protocols, initially designed for LAN, are perfectly capable of working over the Internet. Finally, malicious applications (e.g., viruses and worms) can be utilized to transfer data across a broad variety of protocols. It is essential that the DLP system detects rogue connections or unauthorized encryption, terminates the connection and provides remediation.
Most of the Data Loss Prevention technologies available in the market have failed with a tradeoff between accuracy (‘missing the target’) or being inundated with irrelevant events (false positives) which renders the solutions useless.
Our Content-Aware Enterprise DLP solution has the ability to detect data loss from different channels with the highest degree of accuracy without any false positives. This is helpful for administrators as it provides the comfort of deploying DLP in enforcement mode where they can actually block violations instead of just monitoring them. Our solution performs partial file/data matches not just on text data but also on binary data. So unlike others, our system is able to detect video, CAD files, including precise partial file matches regardless of file type.
Our DLP solution monitors and protects sensitive data–regardless of their location. We enable organizations to have the overall control and visibility needed to manage advanced threats, analyze data, discover and classify data in real-time, prevent data loss while enforcing compliance.The system provides answers to four basic questions: Where is my data? Who is sending me data? Who is receiving my data? And what channel is the data being sent?
This enables organizations to analyze data from a myriad of sources—laptops, database exchanges, Cloud applications, Shadow IT, email, instant messengers, social media, websites and even malware or cyber espionage insiders “phoning home” data.
Our solution is fully integrated with Data Discovery, real-time Data Classification & Digital Rights Management (DRM/IRM) capabilities. We are able to map policies that decide and determine who is able to access data, what can be done with the data, such as copy, paste or print screen and how to classify the data. Our disruptive technology allows organizations with one push of a button to start the scanning of their corporate cloud and report the places where they have the same type of data.