All Data Loss Prevention related articles
Today marks the release of the latest update of our award-winning cross-platform Data Loss Prevention (DLP) solution, Endpoint Protector 184.108.40.206, that brings with it much-anticipated new features along with a number of improvements to existing functionalities.
The Endpoint Protector development team has been hard at work to bring a significant boost to our already advanced DLP product. Many of our newest features started as suggestions from partners and customer which we later decided to implement.
Here are the highlights of Endpoint Protector 5.2:Contextual Scanning
Contextual Detection is now available as a general feature for both the Content Aware Protection and the eDiscovery modules. It offers an advanced way of inspecting confidential data based on both content and context.
Admins can define complex detection patterns based on proximity to other related or unrelated…Read more
We always enjoy hearing from our customers and partners and their experience with the Endpoint Protector product family. It’s not only a matter of professional satisfaction: we build our products with our clients’ needs always before us, often adding new features from feedback sessions or developing them together with customers.
This year, we decided to dedicate an entry on our blog to the top ten features that are most often mentioned by our customers and that rank the highest on their list of things they love about Endpoint Protector. Without further ado, here they are:1. Easy to install and manage
With one of the biggest concerns about the adoption of Data Loss Prevention (DLP) solutions being how long a potential implementation will take and how difficult the product will be to manage once it’s in place, it is no surprise that our customers are relieved and often enthusiastic…Read more
While the rise of data protection regulations such as the GDPR in Europe and HIPAA, FISMA and NIST in the US has lead to an increased awareness of the need for Data Loss Prevention tools to ensure compliance, many companies still hesitate to employ them because they fall victims to some of the common myths that plague DLP software since its infancy.
Here are the most prevalent three charges brought against DLP tools and why they are unfounded:1. Productivity killer
A myth that has persistently haunted DLP is its negative impact on productivity. It is blamed for making usually easy tasks time-consuming, thus hindering employees’ efficiency and increasing their frustrations. As all myths, this bit of misinformation started from a grain of truth: it’s a remnant of former inadequacies of first generation DLP tools which, as any new technology just being developed, was still difficult…Read more
In the age of globalization and ultra-connectivity, companies are increasingly multinational: they have regional or local offices in more than one country and do business in many more. This invariably involves a lot of meetings and presentations for important clients and the visiting of niche fairs and conferences abroad. As a consequence, the work force has become more and more mobile and, due to the rise of portable devices, they can bring the office with them wherever they go.
While this level of flexibility has a positive impact on companies’ bottom lines, it can spell disaster for data security. The reason is fairly simple: security measures for data protection are often restricted to company networks and once data heads outside them, it can become vulnerable to theft and loss.
What can organizations do then to ensure that their data remains secure even when it heads outside the…Read more
Data has become ubiquitous: from business processes and applications to smart phones, tablets and printers, the places data is stored and processed have moved beyond the confines of traditional network infrastructure and, implicitly, outside its protection mechanisms.
As a consequence, data breaches have become increasingly common, leading to a global movement towards the adoption of stricter regulations for the protection of users’ personal data. Notably, the EU’s General Data Protection Regulation (GDPR) is seen as a trailblazing legislation that enforces individuals’ rights and makes companies accountable for the security of the data they process.
But while compliance is important to avoid fines, the threat of data breaches should be a wake-up call to all companies, no matter which country they operate from or where their customers are located. As seen daily in…Read more
In what has now become a yearly tradition, the Endpoint Protector team will be heading out to San Francisco next month for the RSA Conference 2018. One of the best places in the world to talk security, full of inspiring speakers and valuable content, the RSA Conference has become a must-attend event for all cybersecurity professionals.
Since 1995, the RSA Conference has adopted a theme for every event and this year’s is no different. 2017 was a worry filled year for the cybersecurity industry as high-profile hacks and mass ransomware attacks flooded the mainstream, sparking debates and anxiety about data security.
Highlighting the growing attention towards the cybersecurity sector as massive cyberthreats become commonplace news, the RSA conference’s theme focuses on the urgency of addressing this wave of incidents and opening up a cross-disciplinary dialogue to come up with…Read more
A recent study released by the American Journal of Managed Care (AJMC) revealed that one third of healthcare data breaches in the US occur in hospitals. The researchers analysed breaches reported to the Office of Civil Rights (OCR). Under federal legislation, if a healthcare privacy breach affects 500 or more patients, institutions are obligated to inform the OCR about it. The details of the breach are then made publicly available on the OCR’s data breach portal.
The study looked at what type of breaches occur most often in hospitals, the kind of data that they target and how vulnerable healthcare institutions are to them. Covering breaches that occurred between October 2009 and July 2016, they discovered that 215 hospitals were hit by breaches affecting over 6.5 million individuals.
The most common type of data breach, which occurred 112 times, was physical theft which compromised…Read more
Released in May 2017, Endpoint Protector 5 came with a modern intuitive user interface, significant backend enhancements as well as new features and a completely redesigned and improved eDiscovery module. The upgrade underlined our commitment to continuing to provide great Data Loss Prevention solutions that address today’s data security needs and concerns.
Since then, our development team has been working hard around the clock to boost existing features and add new ones based on user feedback and industry demands. Today, we are happy to introduce our very first update for the 5th version of our flagship product, Endpoint Protector 220.127.116.11. Let’s take a closer look at some of its highlights.Time and Network based Device Control policies
From this point on, admins will have the option to enable time and network based access rights from Device Control. What this essentially …Read more
In today’s fast-moving world, highly skilled professionals are constantly looking for more attractive opportunities that will move their careers forward and, as a consequence, companies struggle to retain employees in the long term. Staying in one job for one’s entire life is no longer the primary objective and changing jobs every three to five years is encouraged by every career counselor. According to consulting firm Hay Group, the average employee turnover rate in North America, across all industries, is expected to reach 23% by this year.
What does this mean in the context of data security? In a survey conducted by Biscom, 1 in 4 respondents said they take data with them when they leave a company, 85% of them feeling it is not wrong to take with them materials they themselves helped create. Many of those surveyed admitted that appropriating company data was possible due to companies’…Read more
The beginning of the New Year is a time when many companies consider the most pressing issues they have to solve in the upcoming year. With 2017 turning out to be one of the most taxing years for data security in memory, 2018 will be the year when companies will have to fight back by building up better defenses against breaches and leaks. Whether out of their own concern or obligated by new legislations, businesses’ New Year resolutions should feature data protection at their core.
Here are our top picks for what companies should be focusing on when it comes to data loss prevention in the New Year:1. Become GDPR compliant
This point should come as no surprise to any business dealing with customers located in Europe. The EU’s General Data Protection Regulation (GDPR) will come into full force on 25 May 2018 and companies that will not align its policies to the new legislation’s strict regulations…Read more