Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
Malware infection via Internet, email, storage devices
Risk of attacks by hackers
Risk of data loss or damage
Risk of lost access to data and IT systems
Values
Reduce Costs
Ensure Security and Business Continuity
Clearswift Endpoint Data Loss Prevention
Clearswift’s Endpoint Data Loss Prevention (DLP) solution is designed to address the loss of critical information at the endpoint.
Description
The solution offers three key components that can be deployed together or individually. The first is the ability to gain visibility and control of what removable devices e.g. a personal device or USB stick can connect to a company network. The second is the ability to regulate what company data (or files) can be copied to removable media, and encrypt it if necessary to ensure the data can't be access should the device be lost or stolen. The third is ‘data at rest’ scanning capability which locates where critical information is stored across a network – on devices, on-premise file servers or cloud-based storage - and move it (if required) to a more secure location. Reduce the challenges of today’s IT environment and improve working practices to protect critical information with Clearswift Endpoint DLP.
Designed to scale to enterprise deployments, the Clearswift Endpoint DLP solution provides:
- Granular policy control – allows controls on per user / OU levels
- Device management – controls by bus and device type
- Cloud access control – controls access to standard Cloud sharing services such as OneDrive, Dropbox, Box, etc.
- Data in Use – ensures that data written to external devices has been content checked and appropriate file types can only be used
- Data at Rest scanning – periodic scanning of the local hard disk and mounted shares can be swept for file types and file content
- Syslog support – centralized logging of event data can be exported to SIEM systems
Scheme of work
Competitive products
User features
Roles of Interested Employees
Chief Information Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
Internet access is available for employees
GDPR Compliance