Content Aware Protection to prevent sensitive data leakage through all possible exit points

Description

Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network.

Transcript

"Welcome to the short Endpoint Protector video demo.

Today we will show you the latest feature that is introduced to Endpoint Protector 4, called Content-Aware Protection. This feature allows the Administrator to Block sensible information leaving the company network. Sensible information can be defined in different ways. By setting us a policy, the Endpoint Protector Administrator can define what is sensible information. Policies can be different for different Departments,Users or Group of users. Setting us a policy in Endpoint Protector is quite simple. Now we demonstrate to you how to set up a policy and explain along the way what this policy will enforce.

First, we give out our policy a name, then we decide if we want to Report incidents only where sensible information is being copied or if we also want to Block sensible information to be copied. Next, we can control the way sensible information is monitored. One if is data is copied on removable and control device types, and secondly, if data is tried to be copied out of your network using different applications, like web browsers or email clients, including Outlook and Instant Messaging applications for example like Yahoo Messenger. Now we can also define the actual content that we don`t want to leave the network. For example, we don`t want to copy office files, if for example, a financial institution needs to protect credit card information from leaving the office this can be done as well for all common credit card types, as well as personal information that maybe contains customer information, including customer email addresses or bank account numbers or phone numbers or Social Security Numbers.

This data can be also defined by localization, for example, American Social Security Number format or phone format for the United Kingdom. Additionally, a policy can also contain, custom content which is basically a dictionary search of different terms that have been predefined by the Administrator that are sensible terms. The dictionary filters can be defined using the import of Word files, Excel files, text files, etc, containing all the company sensible keywords. This is pretty much it to set up the policy. We click on Save. Policy is now saved. My Demo Policy is now available in the overview of available policies. The priority of a policy can be moved around and adjust it accordingly. As a next step to complete applying a policy, I will just select a name of the computers which it will be applied to the Computers, Group of computers, Department or Users itself to which it`s applied and after that, I say Save and the policy will be enforced from that point on.

Your data has now been protected even further and if somebody will attend to copy data that contains either sensible keywords, credit card numbers and if policy that we just created is enforced for certain Computers or Users or Groups, the user will be alerted that he`s not allowed to copy that content, the incident will be reported and the data is being stopped from being copied.

I hope you enjoyed this quick introduction to the new Content-Aware Protection feature in Endpoint Protector and if you have any questions please contact your CoSoSys contact person and I look forward to showing to you more exciting new features that are coming in the next few versions of Endpoint Protector to secure more of your information where it`s important."

Other data security videos

How eDiscovery Works?

eDiscovery scans and identifies the confidential information in organizations’ endpoints and allows Administrators to take remediation actions like encrypting or deleting data at rest. It…

How Enforced Encryption Works?

Enforced Encryption allows IT Administrators to extend their Device Control policy and make sure all confidential data transferred to USB storage devices is automatically encrypted.…

How Content Aware Protection Works?

Content-aware data loss prevention is a data loss-prevention measure that involves awareness of the context or content that is being protected. This module enables the…

How Device Control Works?

See how you can lockdown, control and monitor USB and peripheral ports to stop data theft and data loss. Our Device Control protects against data…

GDPR Essentials

This video offers a brief overview of what GDPR (General Data Protection Regulation) is and how it translates into actual measures for companies. Find out…

How Endpoint Protector DLP can secure your data on Linux endpoints

See how you can setup Data Loss Prevention policies on Linux endpoints, what exit points Endpoint Protector covers, and what type of sensitive data it…

How to use USB Enforced Encryption from Endpoint Protector DLP suite

The cross-platform USB Flash Enforced Encryption is the module within Endpoint Protector Data Loss Prevention that boosts the security of data copied on USB storage…

Setup a Content Aware Protection (CAP) Policy in Endpoint Protector

Learn how to setup a Content Aware Protection Policy in Endpoint Protector. Prevent confidential information from leaving the endpoint through USB and peripheral ports, printers,…

How to set up rights in Endpoint Protector

In this tutorial, we walk you through and show you how to set up rights in Endpoint Protector. Get a quick insight into Device Rights,…

How to use the Offline Temporary Password (OTP) feature in Endpoint Protector

Learn how to authorize the use of blocked devices (USB Flash Drives, CD/DVD, external HDDs, etc.) with the Offline Temporary Password (OTP) feature when computers…

Mobile Device Management (MDM) for iOS and Android with Endpoint Protector

Secure your mobile iOS and Android devices with Endpoint Protector Mobile Device Management (MDM) and keep a close eye on where devices are going with…

Content Aware Protection to prevent sensitive data leakage through all possible exit points

Content Aware Protection is a module in Endpoint Protector that offers detailed control over sensitive data leaving the company's network.

Endpoint Protector Virtual Appliance for Device Control and DLP

Our virtual appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices.

Endpoint Protector Hardware Appliance for Device Control

Our appliance will protect your network endpoints against intentional data theft, data leakage and accidental data loss through portable devices.

Endpoint Protector for Device Control explained in plain English

With Endpoint Protector you have full control, manageability and transparency of what is happening with USB and peripheral ports on your Windows, Macs, and Linux computers.

Device Control, USB Lockdown, and Control for Mac OS X

Controlling the use of USB, FireWire, Thunderbolt, SD Card Reader, Bluetooth, etc on your Mac is vital to protect your data.

Endpoint Protector Basic - Data Protection for Small Offices or Home Use

Manage and control the use of portable devices with Endpoint Protector Basic, the perfect stand-alone solution for Windows and Mac.

EasyLock - Cross-platform encryption for Windows, Mac OS X, and Linux

Strong military-grade encryption algorithms and an intuitive drag and drop interface, helping anyone turn any portable storage device into a data safe.

My Endpoint Protector explained in plain English - DLP | MDM

Manage portable storage devices, control what data is leaving your network through emails, messengers and other cloud applications and even manage the mobile device fleet.…