
Data Loss Prevention
Data Loss Prevention
Data Loss Prevention is an advanced tool that enables IT administrators to monitor data access, control information flow, block leaks, and prevent data theft. By defining DLP triggers (e.g., file deletion, sending a file with specific text by email, working outside designated hours, or visiting prohibited websites), the system initiates appropriate actions (e.g., blocking operations, monitoring, taking a screenshot, recording the screen) and optionally notifies administrators or end users.
Comprehensive data loss prevention
Device control
Monitoring and blocking USB device access based on unique device identifiers, product identifiers, and serial numbers. Ability to identify encrypted devices.
Data at rest protection
Identifying, monitoring, and securing confidential data through automatic or manual inventory.
Data in use protection
Monitoring, controlling, and blocking access to data, including detailed control of document usage.
Data in transit protection
Monitoring, controlling, and blocking file transfers, with detailed content analysis before sending.
Application control
Monitoring employee application and process usage, with the ability to block execution of programs on a blacklist. Determining details such as who, when, and where a selected process was started.
Print control
Monitoring printed documents. Information about individuals who printed documents containing specified content.
Email control
Monitoring the content of email attachments. Ability to block sending messages containing particularly sensitive data.
Web filtering
Blocking access to selected websites and controlling downloading of content and files from those sites. Functionality utilizing website classification based on artificial intelligence.
Key data protection functionalities
Triggers and actions
Definition of DLP triggers that initiate specific actions.
Actions may include blocking operations, taking screenshots, recordings, or sending notifications.
Notifications
Optional messages delivered to administrators or end users.
Delivered via email messages, system alerts, or pop-up windows on the user's computer.
Creating data protection policies
Ability to define policies containing multiple DLP rules.
Policies can be assigned to user groups or devices, enabling precise data management.
Example use case for data protection
Secure use of removable media – Monitoring and restricting access to confidential data stored on storage devices.
Protection against unauthorized file deletion – Protecting data stored on servers from accidental or intentional deletion.
Control of data transfer – Limiting the ability to send certain files outside the organization.
Getting started with data protection
In the following sections of the documentation we will discuss in detail:
Creating and managing DLP triggers.
Configuration of actions and notifications.
Assigning data protection policies to user groups and devices.
Monitoring and analysis of data protection logs.
Summary
Data Loss Prevention is not only a tool that secures the organization but also a key component of risk management. With consistent configuration options, administrators can easily define advanced protection policies tailored to the organization's unique requirements, minimizing the risk of data leakage.
Last updated
Was this helpful?