Clearswift Endpoint Data Loss Prevention
1.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

Values

Reduce Costs

Ensure Security and Business Continuity

Clearswift Endpoint Data Loss Prevention

Clearswift’s Endpoint Data Loss Prevention (DLP) solution is designed to address the loss of critical information at the endpoint.

Description

The solution offers three key components that can be deployed together or individually. The first is the ability to gain visibility and control of what removable devices e.g. a personal device or USB stick can connect to a company network. The second is the ability to regulate what company data (or files) can be copied to removable media, and encrypt it if necessary to ensure the data can't be access should the device be lost or stolen. The third is ‘data at rest’ scanning capability which locates where critical information is stored across a network – on devices, on-premise file servers or cloud-based storage - and move it (if required) to a more secure location. Reduce the challenges of today’s IT environment and improve working practices to protect critical information with Clearswift Endpoint DLP.

Designed to scale to enterprise deployments, the Clearswift Endpoint DLP solution provides:

  • Granular policy control – allows controls on per user / OU levels
  • Device management – controls by bus and device type
  • Cloud access control – controls access to standard Cloud sharing services such as OneDrive, Dropbox, Box, etc.
  • Data in Use – ensures that data written to external devices has been content checked and appropriate file types can only be used
  • Data at Rest scanning – periodic scanning of the local hard disk and mounted shares can be swept for file types and file content
  • Syslog support – centralized logging of event data can be exported to SIEM systems

Scheme of work

 Scheme of work

User features

Roles of Interested Employees

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

Internet access is available for employees

GDPR Compliance