Page cover

Data Loss Prevention

Data Loss Prevention

Data Loss Prevention is an advanced tool that enables IT administrators to monitor data access, control information flow, block leaks, and prevent data theft. By defining DLP triggers (e.g., file deletion, sending a file with specific text by email, working outside designated hours, or visiting prohibited websites), the system initiates appropriate actions (e.g., blocking operations, monitoring, taking a screenshot, recording the screen) and optionally notifies administrators or end users.

Comprehensive data loss prevention

Device control

Monitoring and blocking USB device access based on unique device identifiers, product identifiers, and serial numbers. Ability to identify encrypted devices.

Data at rest protection

Identifying, monitoring, and securing confidential data through automatic or manual inventory.

Data in use protection

Monitoring, controlling, and blocking access to data, including detailed control of document usage.

Data in transit protection

Monitoring, controlling, and blocking file transfers, with detailed content analysis before sending.

Application control

Monitoring employee application and process usage, with the ability to block execution of programs on a blacklist. Determining details such as who, when, and where a selected process was started.

Monitoring printed documents. Information about individuals who printed documents containing specified content.

Email control

Monitoring the content of email attachments. Ability to block sending messages containing particularly sensitive data.

Web filtering

Blocking access to selected websites and controlling downloading of content and files from those sites. Functionality utilizing website classification based on artificial intelligence.

Key data protection functionalities

  1. Triggers and actions

    • Definition of DLP triggers that initiate specific actions.

    • Actions may include blocking operations, taking screenshots, recordings, or sending notifications.

  2. Notifications

    • Optional messages delivered to administrators or end users.

    • Delivered via email messages, system alerts, or pop-up windows on the user's computer.

  3. Creating data protection policies

    • Ability to define policies containing multiple DLP rules.

    • Policies can be assigned to user groups or devices, enabling precise data management.

Example use case for data protection

  • Secure use of removable media – Monitoring and restricting access to confidential data stored on storage devices.

  • Protection against unauthorized file deletion – Protecting data stored on servers from accidental or intentional deletion.

  • Control of data transfer – Limiting the ability to send certain files outside the organization.

Getting started with data protection

In the following sections of the documentation we will discuss in detail:

  1. Creating and managing DLP triggers.

  2. Configuration of actions and notifications.

  3. Assigning data protection policies to user groups and devices.

  4. Monitoring and analysis of data protection logs.

Summary

Data Loss Prevention is not only a tool that secures the organization but also a key component of risk management. With consistent configuration options, administrators can easily define advanced protection policies tailored to the organization's unique requirements, minimizing the risk of data leakage.

Last updated

Was this helpful?