Network Data Loss Prevention
Detect and control sensitive content in network communications.
Endpoint Protector 4 network DLP monitors and controls data flow at the network level to eliminate the threats determined by data loss, data theft or leakage. It is a module within the Endpoint Protector 4 product, available through a simple activation based on valid licenses. Our network DLP solution completes the enterprise DLP offering, next to endpoint DLP and eDiscovery. The centralized management for all 3 modules simplifies the implementation and saves time, additional hardware acquisition and other valuable resources. Available policies include content inspection and blocking in SSL traffic, e-mail protocols, HTTP/HTTPS, social media and file transfer protocols.
Several rules can be setup and can be customized according to the sensitive information traveling your network: bank account specific patterns, personally identifiable information, keywords, regular expressions, and others. Once detected, Endpoint Protector 4 alerts the administrator and blocks the transfer of confidential data.
Setting up policies does not have to be a hassle. Endpoint Protector 4 includes HIPAA, PCI DSS, and file type pre-configured policies, so it is a matter of just selecting and applying the right policy for your network.
Include your trusted web addresses like intranet portals in whitelists and support business continuity.
The option to define policies per user, computer, and groups and import your organizational structure through AD, makes it easy to apply different controls according to the specifics of each department’s and user’s work.
Prevent data leakages outside the company and keep data confidential between departments combining the diverse content-based (keywords, PHI patterns, PII formats, CCNs, and others) and file type policies (office files, graphic files, programming files, and many others).
Protect data beyond the compliance requirements. Scan employee communications without blocking the access completely to apps and web addresses, but only sensitive data sent back and forth throughout the network to prevent data breaches. Compliance is achieved, but more importantly, data is kept safe within the company network.