Data Leak Prevention

Similar documents
Data Leak Prevention

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

Keeping your VPN protected

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

Endpoint Protection. ESET Endpoint Antivirus with award winning ESET NOD32 technology delivers superior detection power for your business.

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

McAfee Total Protection for Data Loss Prevention

SAFETICA QUICK GUIDE

PCI-DSS COMPLIANCE REPORT. Sample engineering company with 200 employees

SAFETICA INSTALLATION MANUAL

for businesses with more than 25 seats

Seqrite Endpoint Security

Cisco Smart CallConnector Server

for businesses with more than 25 seats

ESET Secure Business. Simple and Straightforward

Netwrix Auditor for SQL Server

Cisco Smart CallConnector Advanced Client

Built without compromise for users who want it all

For Businesses with more than 25 seats.

Keeping your VPN protected. proven. trusted.

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Don t Be the Next Data Loss Story

Security Enhancements

DLP GUIDE

The best for everyday PC users

SOLUTION OVERVIEW. Manage your network security for up to 250 seats from a single cloud-based console

SMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

BYOD: BRING YOUR OWN DEVICE.

Single Secure Credential to Access Facilities and IT Resources

Netwrix Auditor for Active Directory

IBM Internet Security Systems Proventia Management SiteProtector

ForeScout ControlFabric TM Architecture

SECURE CLOUD BACKUP AND RECOVERY

SearchInform DLP. Data Loss Prevention and Insider Threat Security

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Secure Messaging Buyer s Guide

McAfee Virtual Network Security Platform 8.4 Revision A

The Device Has Left the Building

Changing face of endpoint security


Data Leakage Prevention. - Protection of Outbound Communication -

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Make security part of your client systems refresh

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

DLP GUIDE

To the Designer Where We Need Your Help

BEST PRACTICES FOR PERSONAL Security

Ekran System v Program Overview

Future-ready security for small and mid-size enterprises

Mail Access Restriction

THE PROCESS FOR ESTABLISHING DATA CLASSIFICATION. Session #155

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

GDPR Controls and Netwrix Auditor Mapping

Go mobile. Stay in control.

Managing Microsoft 365 Identity and Access

Ekran System v Program Overview

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

Acronis Hybrid Cloud Architecture Unified Centralized Data Protection Web-based User Interface Deployed On-premises or in the Cloud.

What is a mobile protection product?

SEPARATING WORK AND PERSONAL

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

SECURITY THAT FOLLOWS YOUR FILES ANYWHERE

Microsoft IT deploys Work Folders as an enterprise client data management solution

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Enterprise Mobility Management

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Cisco Unified CallConnector for Microsoft Windows

Security in the Privileged Remote Access Appliance

QUICK START GUIDE. Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / Home Server 2011

Data Protection Policy

Agenda. Introduction & Drivers of Networks DLP. Requirements, Challenges of Network DLP. Addressing Network DLP with Fidelis XPS

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Microsoft MB2-711 Exam

Transport Gateway Installation / Registration / Configuration

MaaS360 Secure Productivity Suite

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Securing the SMB Cloud Generation

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

SOLUTION MANAGEMENT GROUP

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Netwrix Auditor for Active Directory

The business case for end-toend data protection

Symantec DLP: Detection Innovation and Expanded Coverage

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Microsoft Office 365 TM & Zix Encryption

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

The Collaboration Cornerstone

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

SECURE DATA EXCHANGE

What is HIPPA/PCI? Understanding HIPAA. Understanding PCI DSS

Endpoint Protection with DigitalPersona Pro

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

ESET NOD32 Antivirus 4. Product Briefing

Lenovo Europe, Middle East, and Africa Hardware Announcement ZG , dated January 27, 2009

Register for your 30 day FREE TRIAL today.

Transcription:

Data Leak Prevention

Key advantages Full suite DLP solution Short time-to-benefit High level of tamperresistance All speciality functions covered against leakage Agnostic approach Clearly defined data policies Exact time tracking Automatic evaluation and alerts Covering all major data leak channels, Safetica provides endpoint DLP with network DLP capabilities. Flexible approach to blocking data leak channels gives Safetica the fastest deployment time in its product class. Insures consistent protection, even while covering users with administrative rights. Safetica protects data from printscreening, clipboard stealing, virtual printing, file transformations, archiving and encrypting functions. Safetica data protection is not limited by individual protocols or applications. Managers simply select locations from which confidential data should not leave. Safetica takes care of the security. Opened does not mean actively used. Safetica activity reports show the actual time users were active at visited websites or in applications. Safetica picks the most important logged details and sends a summary report to designated recipients. Complete details are available as needed. Safetica security software offers a full DLP (Data Leak Prevention) solution which covers a wide range of security threats that originate from a common source the human factor. Safetica defends against planned or accidental data leaks, malicious insider actions, productivity issues, BYOD dangers and more. Safetica s security philosophy is based on three pillars: completeness, flexibility and ease of use. Safetica s corporate level DLP gives management complete activity reports and enforces company security policies. How it works The endpoint workstation is where the action happens. Users work with business critical data, access the internet, read emails, send documents to the printer and plug in their portable media. Safetica deploys an agent (Safetica Endpoint Client) to desired endpoints and maintains regular connection with them through the server (Safetica Management Service). This server builds a database of workstation activity and distributes new data protection policies and regulations to each workstation. Safetica offers a full set of security tools in a single software package which would otherwise require several security solutions from different vendors. PC WITH ENDPOINT CLIENT DATA PROTECTION POLICY & UPDATED BLOCKING RULES SERVER WITH DATABASE REPORTED ACTIVITY

Key features Complete data leak prevention Safetica covers all data leaks channels while being easy to install and operate. See Endpoint Events Coverage for proof of Safetica's comprehensive coverage. Trends & productivity profiling Activity reporting Email DLP Application control with time rules Web filtering Print control Device Control Encryption management Informative & testing mode On the fly data classification Warns company management in the event of sudden changes in employee activity and shows productivity changes by department over time. Both changes are indications of possible security risks. Uncovers security breaches on multiple fronts by checking all user activities for signs of potential danger, even before the actual transfer of data. Ensures protected data stays out of the wrong mailbox. Records where sensitive files have been sent and stores this information for future reports. Enables selected package of work-related applications and blocks others for a more secure environment. Applications can be made available only for a specified time frame. Easily enforces company AUP (Acceptable Use Policy) with carefully preselected categories and keyword filtering. Limits what can be printed and by whom with quotas for individual users and departments. Prevents employees from connecting unauthorized devices at work. Common ports can be enabled for particular devices or blocked for all of them. Safetica offers Full Disc Encryption or encrypts whole partitions and creates local or network virtual drives for secure file storage. In addition to password and key access methods, Safetica offers secured Travel Disks and an encrypt when copying out feature for data leaving the Safe Area. Helps companies progressively integrate data protection by enabling tests for all what-if situations without halting business processes. Protects new information immediately after a classified file is created or received. Unified management console SSL/HTTPS inspection Minimal total cost of ownership (TCO) Flexible use Safetica Management Console enables one-stop security management and reporting, integrates all company data protection, reporting and blocking policies. Checks and protects secured communication lines including websites using HTTPS protocol, IM applications with secured connections and secured email transmissions. Frees users from the need to buy extra security appliances. The endpoint agents deployed in Safetica also provide Data Leak Prevention features for company networks. Safetica covers any application, Instant Messaging protocol or webmail service thanks to its unique universal approach.

ESET Technology Alliance aims to better protect businesses with a range of complementary IT security solutions. We provide superior options for staying protected in an ever-changing security landscape by combining our proven and trusted technology with other best-ofbreed products. Endpoint events coverage Reporting and activity blocking All file operations Long-term trends, short-term activity fluctuations Websites (all browsers supported including HTTPS traffic) active and inactive time Emails & webmails (virtually all providers) Searched keywords (majority of engines supported, Windows Search supported) Instant messaging (application independent all protocols) Application usage with both active and inactive time Virtual, local & network printers Screen activity (intelligent capturing) Keylogging Data leak prevention All harddrives, USB, FireWire, SD/MMC/CF cards, SCSI drives Network file transfer (unsecured, secured) Emails (SMTP, POP, IMAP, Microsoft Outlook/ MAPI protocols) SSL/HTTPS (all browsers & applications with standard certificate management) Copy/paste, clipboard, drag & drop Virtual, local & network printers Bluetooth, IR/COM/parallel ports CD/DVD/BluRay readers & recorders Controls application file access

Use cases Securing key business information Management of removable devices Reach regulatory compliance Data encryption Productivity control Architecture PCS AND LAPTOPS WITH ENDPOINT CLIENT Actions are recorded and policy rules enforced via a small agent application (optionally hidden from the user). Once safe areas for all protected data have been established, Safetica silently checks every interaction with these files and, in case of a forbidden operation, blocks it or performs other selected actions. These company-defined actions can include informing security manager of each event, encrypting data, and offering other safe location for data. Data is protected on laptops and flashdrives even outside of the company walls. Safetica gives management final control over who plugs what into company computers, removing another channel for data leaks and dramatically decreasing the number of required service interventions. With Safetica Endpoint Client present on company computers and policy management activated in the Safetica Management Console, you are able to comply with regulations governing the movement and usage of sensitive data. Safetica offers Full Disc Encryption, can oversee a secure encrypted file storage system, manage connected keys and prevent data from being stored in unsecure locations. Even without directly using the Safetica Management Console GUI, managers can receive regular summary reports on selected endpoint users or groups. MANAGEMENT SERVICE AND SQL DATABASE SMS DB Data is automatically transferred from network computers to the server with laptop data synchronized upon connecting to the network. Client settings are synced in reverse order. MANAGEMENT CONSOLE WITH SETTINGS AND OUTPUTS 1 2 3 4 All data can be viewed or visualized from the management application. All settings can be adjusted here as well. MANAGEMENT SERVICE SERVERS IN OTHER BRANCHES Safetica supports multiple branches from a single management console. System requirements Safetica client 2.4 GHz dual-core processor 2 GB of RAM memory 10 GB of free disk space Installation on client MS Windows 7 and higher, 32-bit and 64-bit Safetica server 2 GHz dual-core processor (we recommend quad-core) 4 GB of RAM memory 20 GB of free disk space Installation on application server or a dedicated server (virtualization is possible) Active Directory Support MS Windows Server 2008 R2 and higher, 32-bit and 64-bit Requires connection to server with MS SQL 2008 R2 and higher When sharing with MS SQL we recommend at least a quad-core processor, 8 GB RAM and 100 GB of free disk space MS SQL (database for server) Requirements as per MS SQL edition Shared or dedicated server, we recommend at least 100 GB or free disk space MS SQL 2008 R2 and higher, eventually MS SQL 2012 Express and higher (free version) MS SQL 2012 Express is an optional part of installation 1999-2017 ESET, LLC, d/b/a ESET North America. All rights reserved. ESET, the ESET Logo, ESET android figure, ESET SMART SECURITY, ESET CYBER SECURITY, ESET.COM, ESET.EU, NOD32, SysInspector, ThreatSense, ThreatSense.Net, LiveGrid and LiveGrid logo are trademarks, service marks and/or registered trademarks of ESET, LLC, d/b/a ESET North America and/or ESET, spol. s r. o., in the United States and certain other jurisdictions. All other trademarks and service marks that appear in these pages are the property of their respective owners and are used solely to refer to those companies goods and services.