Data Leak Prevention

Similar documents
Data Leak Prevention

PCI-DSS COMPLIANCE REPORT. Sample engineering company with 200 employees

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

Seqrite Endpoint Security

SAFETICA INSTALLATION MANUAL

For Businesses with more than 25 seats.

SAFETICA QUICK GUIDE

McAfee Total Protection for Data Loss Prevention

Don t Be the Next Data Loss Story

Cisco Smart CallConnector Server

Netwrix Auditor for SQL Server

Cisco Smart CallConnector Advanced Client

Security Enhancements

ESET Secure Business. Simple and Straightforward

DLP GUIDE

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

McAfee Virtual Network Security Platform 8.4 Revision A

for businesses with more than 25 seats

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Symantec DLP: Detection Innovation and Expanded Coverage

Netwrix Auditor for Active Directory

for businesses with more than 25 seats

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

Register for your 30 day FREE TRIAL today.

SearchInform DLP. Data Loss Prevention and Insider Threat Security

SaaS Flyer for Trend Micro

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Built without compromise for users who want it all

DLP GUIDE

Future-ready security for small and mid-size enterprises

Agenda. Introduction & Drivers of Networks DLP. Requirements, Challenges of Network DLP. Addressing Network DLP with Fidelis XPS

IBM Internet Security Systems Proventia Management SiteProtector

Mail Access Restriction

Key Features. DATA SHEET

ESET Remote Administrator 6. Version 6.0 Product Details

SECURE CLOUD BACKUP AND RECOVERY

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

Advanced Security Measures for Clients and Servers

THE PROCESS FOR ESTABLISHING DATA CLASSIFICATION. Session #155

The best for everyday PC users

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Kunal Mahajan Microsoft Corporation

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

SEPARATING WORK AND PERSONAL

SERV-U FTP SERVER FOR FAST & SECURE FILE TRANSFER

Cisco Unified CallConnector for Microsoft Windows

Quick Start Guide. Microsoft Windows Vista / XP / 2000 / 2003 / 2008

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Enterprise Mobility Management

Configuration Guide for Exchange Reporter Plus

Ekran System v Program Overview

McAfee Data Loss Prevention Endpoint

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

IBM Europe, Middle East, and Africa Services Announcement ZS , dated October 6, 2009

Transport Gateway Installation / Registration / Configuration

Kerio Outlook Connector (Offline Edition)

Changing face of endpoint security

Netwrix Auditor for Active Directory

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Managing Microsoft 365 Identity and Access

Ekran System v Program Overview

Endpoint Protection with DigitalPersona Pro

Data Leakage Prevention. - Protection of Outbound Communication -

SECURITY & PRIVACY DOCUMENTATION

Microsoft IT deploys Work Folders as an enterprise client data management solution

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Vision deliver a fast, easy to deploy and operate, economical solution that can provide high availability solution for exchange server

BEST PRACTICES FOR PERSONAL Security

WHAT S NEW WITH OBSERVEIT: INSIDER THREAT MANAGEMENT VERSION 6.5

ForeScout ControlFabric TM Architecture

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

SECURE DATA EXCHANGE

The Collaboration Cornerstone

Annexure E Technical Bid Format

Quick Configuration Guide For Exchange Reporter Plus

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

SERV-U FTP SERVER FOR FAST & SECURE FILE TRANSFER

Cisco Systems, Inc IronPort

Security in the Privileged Remote Access Appliance

Cisco Smart CallConnector Operator

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

The Device Has Left the Building

NETWRIX INACTIVE USER TRACKER

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Archival. Product Note

Secure Messaging Buyer s Guide

Choosing a Full Disk Encryption solution. A simple first step in preparing your business for GDPR

Don t just manage your documents. Mobilize them!

Transcription:

Data Leak Prevention

Safetica ESET Technology Alliance Data Leak Prevention by Safetica Safetica security software offers a full DLP (Data Leak Prevention) solution which covers a wide range of security threats that originate from a common source the human factor. Safetica defends against planned or accidental data leaks, malicious insider actions, productivity issues, BYOD dangers and more. KEY ADVANTAGES Full suite DLP solution Short time-to-benefit High level of tamper-resistance All speciality functions covered against leakage Agnostic approach covering all major data leak channels. Safetica provides endpoint DLP with network DLP capabilities. Flexible approach to blocking data leak channels gives Safetica the fastest deployment time in its product class. insures consistent protection, even while covering users with administrative rights. Safetica protects data from printscreening, clipboard stealing, virtual printing, file transformations, archiving and encrypting functions. Safetica data protection is not limited by individual protocols or applications. Safetica s security philosophy is based on three pillars: completeness, flexibility and ease of use. Safetica provides a full-fledged corporate level Data Leak Prevention solution, giving management complete activity reports and enforcing company security policies on user activities. Safetica offers a full set of security tools in a single software package which would otherwise require several security solutions from different vendors. Clearly defined data policies Exact time tracking Automatic evaluation and alerts HOW IT WORKS with Safe Areas. Managers just select locations from where confidential data cannot leave, Safetica takes care of the security. Opened does not mean actively used. Safetica activity reports show the actual time users were active at visited websites or in applications. Safetica picks the most important logged details and sends a summary report to designated recipients. Complete details are available as needed. The endpoint workstation is where the action happens. Users work with business critical data, access the internet, read emails, send documents to the printer and plug in their portable media. Safetica deploys an agent (Safetica Endpoint Client) to desired endpoints and maintains regular connection with them through the server (Safetica Management Service). This server builds a database of workstation activity and distributes new data protection policies and regulations to each workstation. PC WITH SAFETICA ENDPOINT CLIENT DATA PROTECTION POLICY & UPDATED BLOCKING RULES SERVER WITH DATABASE www.eset.com.np REPORTED ACTIVITY

ESET Technology Alliance Data Leak Prevention by Safetica KEY FEATURES Complete Data Leak Prevention Trends & Productivity Profiling Activity Reporting E-mail DLP Application Control with Time Rules Web Filtering Print Control Safetica covers all data leaks channels while being easy to install and operate. See Endpoint Events Coverage for proof of Safetica's comprehensive coverage. Warns company management in the event of sudden changes in employee activity and shows productivity changes by department over time. Both changes are indications of possible security risks. Uncovers security breaches on many fronts by checking all user activities for signs of potential danger, even before the actual transfer of data. Ensures protected data stays out of the wrong mailbox. Records where sensitive files have been sent and stores this information for future reports. Enables selected package of work related applications and blocks others for a more secure environment. Applications can be made available only for a specified time frame. Easily enforces company AUP (Acceptable Use Policy) with carefully preselected categories and keyword filtering. Limits what can be printed and by whom with quotas for individual users and departments. Device Control Encryption Management Informative & Testing Mode On the Fly Data Classification Prevents employees from connecting unauthorized devices at work. Common ports can be enabled for particular devices or blocked for all of them. Safetica offers Full Disc Encryption or encrypts whole partitions and creates local or network virtual drives for secure file storage. In addition to password and key access methods, Safetica offers secured Travel Disks and an encrypt when copying out feature for data leaving the Safe Area. Helps companies progressively integrate data protection by enabling tests for all what-if situations without halting business processes. Protects new information immediately after a classified file is created or received. Unified Management Console SSL/HTTPS Inspection Minimal Total Cost of Ownership (TCO) Flexible Use Safetica Management Console enables one-stop security management and reporting, integrates all company data protection, reporting and blocking policies. Checks and protect secured communication lines including websites using HTTPS protocol, IM applications with secured connections and secured email transmission. Frees users from the need to buy extra security appliances. The endpoint agents deployed in Safetica also provide Data Leak Prevention features for company networks. Safetica covers any application, Instant Messaging protocol or webmail service thanks to its unique universal approach.

ESET Technology Alliance ESET Technology Alliance Data Leak Prevention by Safetica ESET Technology Alliance aims to better protect businesses with a range of complementary IT security solutions. We provide customers with a better option when staying protected in the ever-changing security environment by combining our proven and trusted technology with other best-of-breed products. ENDPOINT EVENTS COVERAGE Reporting and activity blocking All file operations Long-term trends, short-term activity fluctuations Websites (all browsers supported including HTTPS traffic) active and inactive time E-mails & webmails (virtually all providers) Searched keywords (majority of engines supported, Windows Search supported) Instant messaging (application independent all protocols) Application usage with both active and inactive time Virtual, local & network printers Screen activity (intelligent capturing) Keylogging Data Leak Prevention All harddrives, USB, FireWire, SD/MMC/CF cards, SCSI drives Network file transfer (unsecured, secured) E-mails (SMTP, POP, IMAP, Microsoft Outlook/ MAPI protocols) SSL/HTTPS (all browsers & applications with standard certificate management) Copy/paste, clipboard, drag & drop Virtual, local & network printers Bluetooth, IR/COM/parallel ports CD/DVD/BluRay readers & recorders Controls application file access

USE CASES Securing key business information Management of removable devices Reach Regulatory Compliance Data Encryption Productivity Control ARCHITECTURE PCS AND LAPTOPS WITH SAFETICA ENDPOINT CLIENT Actions are recorded and policy rules enforced via a small agent application (optionally hidden from the user). ESET Technology Alliance Data Leak Prevention by Safetica Once safe areas for all protected data have been established, Safetica silently checks every interaction with these files and, in case of a forbidden operation, blocks it or performs other selected actions. These company defined actions can include informing security manager of each event, encrypting data, and offering other safe location for data. Data is protected on laptops and flashdrives even outside of the company walls. Safetica gives management final control over who plugs what into company computers, removing another channel for data leaks and dramatically decreasing the number of required service interventions. With Safetica Endpoint Client present on company computers and policy management activated in the Safetica Management Console, you are able to comply with regulations governing the movement and usage of sensitive data. Safetica offers Full Disc Encryption, can oversee a secure encrypted file storage system, manage connected keys and prevent data from being stored in unsecure locations. Even without directly using the Safetica Management Console GUI, managers can receive regular summary reports on selected endpoint users or groups. SAFETICA MANAGEMENT SERVICE AND SQL DATABASE SMS DB Data is automatically transferred from network computers to the server with laptop data synchronized upon connecting to the network. Client settings are synced in reverse order. SAFETICA MANAGEMENT CONSOLE WITH SETTINGS AND OUTPUTS 1 2 3 4 All data can be viewed or visualised from the management application. All settings can be adjusted here as well. SAFETICA MANAGEMENT SERVICE SERVERS IN OTHER BRANCHES Safetica supports multiple branches from a single management console. System Requirements Safetica Endpoint Client (agent software) 2,4 GHz dual-core processor 32-bit (x86) or 64-bit (x64) 2 GB of RAM memory 2 GB of free disk space Installation on client MS Windows XP SP3, Vista, 7, 32-bit and 64-bit MSI installation package Safetica Management Service (server component) 2 GHz dual-core processor 32-bit (x86) or 64-bit (x64) 2 GB of RAM memory 10 GB of free disk space Installation on application server or a dedicated server (virtualisation ispossible) More servers for better load balancing availability Support for Active Directory, but not mandatory MS Windows Server 2003 SP2, 2008, 2008 R2, 32-bit and 64-bit Requires connection to server with MS SQL 2008 or higher MS SQL (server component for Standard installation) 1 GHz processor 32-bit (x86) or 64-bit (x64) 4 GB or more of RAM memory (critical performance component) 200 GB of free disk space (optimal 500 GB or more, depending on monitoring settings and number of clients, details at http://calc. safetica.com) Shared or dedicated server MS Windows Server 2003 SP2, 2008, 2008 R2, 32-bit and 64-bit

Copyright 1992 2016 ESET, spol. s r. o. ESET, logo ESET, NOD32, ThreatSense, ThreatSense.Net and/or other mentioned products of ESET, spol. s r. o., are registered trademarks of ESET, spol. s r. o. Other here mentioned companies or products might be registered trademarks of its proprietors. Produced according to quality standards of ISO 9001:2008.