For VendorsBlog
Login
Clearswift Endpoint Data Loss Prevention

Add to comparison

Clearswift Endpoint Data Loss Prevention

1
Pitch
Clearswift’s Endpoint Data Loss Prevention (DLP) solution is designed to address the loss of critical information at the endpoint.

Features of product

Проблемы Problem Solving
  • Malware infection via Internet, email, storage devices
  • Risk of attacks by hackers
  • Risk of data loss or damage
  • Risk of lost access to data and IT systems
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors
Описание

About Product

The solution offers three key components that can be deployed together or individually. The first is the ability to gain visibility and control of what removable devices e.g. a personal device or USB stick can connect to a company network. The second is the ability to regulate what company data (or files) can be copied to removable media, and encrypt it if necessary to ensure the data can't be access should the device be lost or stolen. The third is ‘data at rest’ scanning capability which locates where critical information is stored across a network – on devices, on-premise file servers or cloud-based storage - and move it (if required) to a more secure location. Reduce the challenges of today’s IT environment and improve working practices to protect critical information with Clearswift Endpoint DLP.

Designed to scale to enterprise deployments, the Clearswift Endpoint DLP solution provides:

  • Granular policy control – allows controls on per user / OU levels
  • Device management – controls by bus and device type
  • Cloud access control – controls access to standard Cloud sharing services such as OneDrive, Dropbox, Box, etc.
  • Data in Use – ensures that data written to external devices has been content checked and appropriate file types can only be used
  • Data at Rest scanning – periodic scanning of the local hard disk and mounted shares can be swept for file types and file content
  • Syslog support – centralized logging of event data can be exported to SIEM systems
Характеристики

Characteristics

Network protection N/A
Endpoint protection
Cloud support
Enterprise email control N/A
Webmail control N/A
Instant messengers control N/A
Internet traffic control
Encrypted traffic control N/A
External/removable devices control
Policy templates

Features of users

Роли заинтересованных сотрудников Stakeholders Roles
  • Chief Information Officer
  • Chief IT Security Officer
  • IT Security and Risk Management
Признаки применимости Company requirements
  • GDPR Compliance
  • Internet access is available for employees
Продающие истории Use Cases

Fighting the War at Home: How Your Employees are Your Greatest Asset in the Battle Against Data Loss

Продающия история

To tackle both the malicious and accidental data loss threat, organizations need to have preventative technology in place. However, the real key to mitigating the damage of cybercrime is to educate the workforce on the various dangers they pose to their firm, be it accidentally sharing sensitive data with unauthorized personnel, or opening an innocuous document which starts a Ransomware attack. By training employees to recognize potential data breaches and security issues, firms can be ready and prepared for any possible attack, and able to take immediate steps to minimize the impact. Read here

Work flow chart

Схема