5 Easy-to-Use Content Aware Features in Endpoint Protector
In today’s ultra-connected fast-paced work environment, it is easy to lose track of data. Companies encourage the use of productivity-enhancing software and collaborative tools: nearly all organizations, for example, use messaging applications to communicate and transfer files. To cut costs, they often choose freely available options such as Skype or Slack without considering their potential risks.
At the same time, companies are frequently not aware of the sort of third-party services their employees use on a day to day basis either out of habit or to increase their efficiency. Popular file transfer or sharing platforms like Google Drive or Dropbox or even social media messaging applications are regularly used to share information in the work place.
It is easy to imagine how things can go wrong from here: data accidentally shared publically, sent to the wrong recipient, saved on unauthorised computers, all with a simple click. In other words: data loss just waiting to happen. How can companies protect themselves from this very real threat to their data’s security? This is where content aware protection comes into play.
Data Loss Prevention tools like Endpoint Protector were built to address these risks. With its Content Aware Module, our product aims to curb the threat to data security by monitoring and controlling data transfers on company networks while at the same time offering a smooth user-friendly experience that greatly reduces implementation times. Here are the top five reasons Endpoint Protector’s Content Aware Protection (CAP) module is the easiest-to-use tool of its kind on the market.
1. Easy to Define Sensitive Information
CAP policies in Endpoint Protector can be built in a few easy steps. Administrators must first define sensitive information as it applies to their company’s needs. Endpoint Protector already has definitions for the most common types of protected data: personal identifiable information, credit card numbers, source code, regular expressions etc. It also offers the possibility of protecting data by file type or name or defining custom content to serve specialized needs.
Admins group these categories of sensitive data into blacklists to which CAP policies can then be applied. They also have the option of defining whitelists, which will contain exceptions to the blacklists.
2. Easy to Build Policies
After the blacklists are defined, administrators can simply define a policy by choosing which operating system it will apply to, which exit points should be monitored (web browsers, instant messaging applications, cloud services etc.) and what actions should be taken when the policy is violated. Namely whether it should be reported, blocked or both.
Policies can be applied globally or restricted to different departments, groups, users or computers. Once CAP policies are in place, they can easily be switched on and off by administrators at any time from the Endpoint Protector dashboard.
3. Compliance Support
With many countries now adopting data protection regulations, from the Middle East to Japan, from the EU General Data Protection Regulation (GDPR) to the California Consumer Privacy Act (CCPA), it seems no company will be spared the burden of compliance. Data protection regulations in general aim to protect individuals’ privacy and certain categories of sensitive information.
Taking these very pressing concerns into consideration, the Endpoint Protector team built predefined CAP policies that aim to help organizations on their road to compliance. Special profiles for GDPR, PCI DSS and HIPAA compliance were built, that, once selected, can support companies’ efforts to protect sensitive data that falls under the jurisdiction of these regulations. At the same time, due to the high number of predefined policies for personal information, organizations can easily build profiles for compliance with their local data protection regulations.
4. A Multitude of Exit Points
It’s hard to guess what sort of software or third-party services your employees are using. They might differ depending on which part of the world you do business in or the technical expertise of your work force. Companies might therefore be hard pressed to define which exit points they should monitor. Luckily, Endpoint Protector makes things easy for admins: a comprehensive list to choose from is offered.
It includes dozens of web browsers (Chrome, Mozilla, Internet Explorer etc.), e-mail services (Outlook, Thunderbird, Mail for macOS etc.), instant messaging applications (Skype, WhatsApp for Desktop, Viber etc.), cloud or file sharing services (Google Drive, iCloud, OneDrive, Dropbox etc.) and social media and other categories (FileZilla, cuteFTP, iTunes etc.) for administrators to select from. By simply scanning the list, they can easily find the most commonly used tools and services within their organization and apply CAP policies to them.
5. Detailed Reports
The CAP module also generates detailed reports concerning policy violations. They contain not only the time and date of the violation along with the computer on which it took place and the user responsible for it, but also which exit point was being used and why the transfer was considered a violation (detection of sensitive information, blocked file type etc.).
These reports can be especially useful for companies for auditing and compliance purposes. They can help organizations prove that they have functional data protection policies in place that ensure that individuals’ sensitive information is being kept secure.