Grayteq DLP Data. Loss. Prevention.



Similar documents
RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

A Buyer's Guide to Data Loss Protection Solutions

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Data Protection McAfee s Endpoint and Network Data Loss Prevention

ForeScout MDM Enterprise

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

anomaly, thus reported to our central servers.

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

The ForeScout Difference

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

CA Technologies Data Protection

V1.4. Spambrella Continuity SaaS. August 2

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Windows Phone 8.1 in the Enterprise

IBM Data Security Services for endpoint data protection endpoint encryption solution

Protecting Your Data On The Network, Cloud And Virtual Servers

The Impact of HIPAA and HITECH

Remote Services. Managing Open Systems with Remote Services

Mobile Device Management

Protecting Regulated Information in Cloud Storage with DLP

Enterprise Security Solutions

HP E-PCM Plus Network Management Software Series

Symantec Mobile Management 7.1

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

The Essential Security Checklist. for Enterprise Endpoint Backup

10 Building Blocks for Securing File Data

Information & Asset Protection with SIEM and DLP

Kaspersky Security for Mobile Administrator's Guide

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Systems Manager Cloud Based Mobile Device Management

Secure any data, anywhere. The Vera security architecture

Protecting personally identifiable information: What data is at risk and what you can do about it

Altiris IT Management Suite 7.1 from Symantec

Ensuring the security of your mobile business intelligence

Symantec DLP Overview. Jonathan Jesse ITS Partners

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

The Cloud App Visibility Blindspot

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper: Secure Printing and Mobile Devices

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

Managing PHI in the Cloud Best Practices

Endpoint protection for physical and virtual desktops

Protecting Data-at-Rest with SecureZIP for DLP

McAfee Data Protection Solutions

Security Overview Enterprise-Class Secure Mobile File Sharing

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

2X SecureRemoteDesktop. Version 1.1

SecureAge SecureDs Data Breach Prevention Solution

McAfee Server Security

Proven LANDesk Solutions

Symantec Mobile Management 7.1

Managed Antivirus Quick Start Guide

Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion

Data Storage That Looks at Business the Way You Do. Up. cloud

INSTANT MESSAGING SECURITY

Seqrite Mobile Device Management

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

Strengthen security with intelligent identity and access management

Veritas Enterprise Vault for Microsoft Exchange Server

RightsWATCH. Data-centric Security.

Data Loss Prevention Program

Feature List for Kaspersky Security for Mobile

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

How To Protect Your Mobile Devices From Security Threats

White Paper. Simplify SSL Certificate Management Across the Enterprise

SysAidTM Product Description

Top Four Considerations for Securing Microsoft SharePoint

Table of Contents Cicero, Inc. All rights protected and reserved.

Client side. DESlock + Data Encryption

Kaseya IT Automation Framework

Information Technology Solutions

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Simplify SSL Certificate Management Across the Enterprise

Readiness Assessments: Vital to Secure Mobility

How To Buy Nitro Security

Encryption Buyers Guide

IBM Endpoint Manager for Mobile Devices

Preemptive security solutions for healthcare

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Cisco Advanced Malware Protection

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Symantec Backup Exec 2010

Transcription:

Grayteq DLP Data. Loss. Prevention.

Grayteq Data Loss Prevention Data loss and leakage protection is essential for today s dramatically-changing work environments. As organizations become less centralized, with more distributed sites and remote employees, the need for data leakage protection is greater than ever. Grayteq DLP delivers unified solution to discover, monitor, and protect confidential data wherever it is stored or used. Discover Discover sensitive information wherever it is stored, create an inventory of confidential data, and automatically manage data cleanup. Monitor Understand how sensitive information is being used - whether the user is on or off the corporate network - and gain corporate-wide visibility. Manage Define unified policy across the organization, remediate and report on incidents, within a centralized platform. Alert Notify Security personnel about all security breaching attempts, allowing them the option of on-the-spot incident management. Prevent Automatically enforce security policies and proactively secure sensitive information, protecting them from being leaked. Audit Check your security management efficiency and create reports, in various aspects. Inspect and report interactions or security breaching attempts with Auto-Reports. 2

Key Features Real-Time Monitoring How your data is treated Are you aware of what information your colleagues access, what apps they use, or what interactions they have to your valuable corporate data? Grayteq DLP delivers comprehensive real-time monitoring about users; workstations, servers and other devices, logging and displaying interactions to information across the corporate network, inspecting and highlighting all potential security breaches. Reporting Center Gain visibility in clicks Reporting Center is designed to help you to extract the very exact answer to any question about your DLP system you are looking for. It allows you to generate highly detailed reports on any actions, timeframes, users, workstations, servers and many more. Find reporting aspects or focus you are interested in and setup with a couple of clicks. Event Policy Define do s and don t s Any user-activities, interactions or their combo may threaten your valuable data in given circumstances, or even the most harmful actions can meet the upholding policies, causing no damages. Event Policy blocks unwanted activities and smoothens allowed operations. Manageable user activities and file interactions are Create, Read, Modify, Copy, Move, Copy and Paste, Drag-n-Drop, Delete, Print or Send. Application Policy Create your own lists Games, unauthorized browsers, instant messengers, social media tools and other unwelcome applications may impact your business with their drain on employee productivity. Whitelist your authorized applications to ensure smooth operation, while deny unwanted or known harmful applications by Blacklists. Setup Graylist actions for applications with no security clearance or that from unknown sources. Document Quarantine Keep data inside the fences Setting up access policies to valuable corporate information or even keeping domain administrators away from highly classified management files is not selfevident. Quarantine is special document protection, enabling you to create isolated storage spaces, wherein Windows provided access and interactions to the information can be overruled. Intrusion Prevention Protect your infrastructure Grayteq Host Intrusion Prevention (HIP) safeguards your business against intrusion threats that may otherwise be unintentionally introduced or allowed by desktops and laptops. HIP delivers software-based separation for shares to control access and interactions. Access to shared information can be defined upon information and user classifications.

Endpoint Protection Safety at the End Secure Floppy or ZIP Drives, CD/DVD/Blue Ray writers, Infrared, Bluetooth, IEEE1394 Firewire, Wireless (WiFi) adapters, COM and LPT ports, Microsoft and Novell shares USB and PCMCIA devices in an easy-to-manage solution. Grayteq DLP seamlessly integrates the essential tools you need into a single, high performance agent with a single management console, Security Orchestrator. On/Off-Network Location-based security On/Off-Network Policy makes security policy management easy to apply within the corporate perimeter and beyond. With Grayteq DLP s On/Off-Network Policy, you can orchestrate various security policies flexibly for different locations, situations and circumstances. Access Rights Keep your users managed Access Right Management provides additional right management features over the Windows-provided ones, enhancing security compliance with corporate, stateor federal government regulations. Security administrators can overrule even the highest Windows-provided access rights and manage the corporate security on an advanced level. Action Driven Alerts Be notified in time Alerts helps infrastructure management, notifying about missing hosts or other malfunctioning elements. Interaction Alerts notifies security administrators about any alert-triggering interaction irrespectively to their security classification. No matter if an action meets security policies or even attempts to breach. When it is about being notified, it s Alert-time. File Lifecycle What happens to your files Do you know, who interacts with your sensitive corporate data? When, wherefromand to? Which applications are in use for these actions? Whether your information was copied or moved to other locations? Has it been deleted, or just simply been renamed? File Lifecycle Tracking answers these questions by delivering full lifecycle tracking analytics on a file. Storage Lifecycle Review your storage actions Storage Lifecycle Tracking brings together everything that occurred on a storage device in a bird s-eye view. Find out which storage was connected to which host, no matter if they are notebooks, PCs or servers. Have deeper insight about which users used the specific storage and what data were copied onto, or removed from! 4

Safe Transmission Encyption on the road Encrypted Data Transmission applies strong encryption on transferred data within the boundaries and beyond. Encryption is enforced for both in- and outbound communications. EDT encryption protects your corporate data while on the road, ensures access for authorized recipients only, and applies transparent decryption and secure storing on recipient workstations and notebooks. Data Vault Encryption Protection for data at rest Data Vault enables on-the-fly strong encryption on all business-critical information protecting against being accessed or used by unauthorized. The Vault prevents corporate information from accidental data loss, meets government directives and regulations, offers full audit trail and provides scalable, single console management for easy deployment and administration. Cloud Encryption Share in the Cloud If you share and store your sensitive files in the cloud, You have to make sure these are securely encrypted before being uploaded to the cloud. Cloud Share Encryption s real time encryption for your files will safeguard the privacy of your data; especially important when you are storing sensitive corporate data or personal information that should be kept from falling into the wrong hands. Full-Disk Encryption Keep it all Safe Whether it s a home computer with your private financial data, your company s computer with sensitive corporate information, or a thumb drive with government secrets, it is vital to ensure that there is no unauthorized access to that data should the device be lost or stolen. Keep your vital data safe and protected with Grayteq s strong Full-Disk Encryption File Share Encryption Share it Shared file servers offer solution to channel such sharing into controlled and manageable path. These servers have emerged as central collaborative tools in today s workplaces and many companies now offer various file sharing solutions, enabling users to access shared information anywhere. Without proper protection and encryption, this shared data present an easy target. Removable Media Encryption On-The-Go Data is most at risk of being lost when taken outside of the physical boundaries of your organization. USB thumb drives, Removable HDDs with terabytes of storing capacity, Firewire and other portable devices offer low cost, easy to use storage, whereby data can easily be copied or downloaded with no regard to the security implications.

IM Protection Free and Safe Chat Grayteq DLP keeps instant messaging free by safeguarding uninterfered instant messaging experience, while protects corporate information from being leaked. IM Protection is designed to make difference between standard chat messages and corporate information and while protects chatters privacy, keeps business information within the company. Snapshot Visual Evidence Snapshot helps security breach discovery by creating screenshots about interactions and enclose to logs unseparably, enabling visual confirmation for incidents. Snapshot creates full screenshots of all connected displays in the moment of security breaching attempt. Grayteq DLP creates evincing snapshots about security breaches, while denies user to create screenshots about protected information. Incident management Continuity first Mitigation and remediation of an incident may significantly define the incident s impact on the corporate, the infrastructure or the daily work. Incident Management is designed to enable on-the-spot reaction to any incident, minimizing the impact within defined service levels. Email Notification Get attached Grayteq DLP s built-in email notification system enables you to develop corporate-wise unified alerts on protected information when being attached to email or IM messaging by notifying you about the attempt in real-time. Simplified layout for touch devices The newest Grayteq DLP Security orchestrator accompanies all features into a whole new, Windows Metro style layout that enables you to manage your data loss prevention system from your Windows touch devices. 6

Additional features File System and Hardware Independence Monitoring capabilities, protections, security policies and controls are fully independent of the file system and the underlying hardware infrastructure with the lowest memory consumption available in the market. Application & Availability Independence No third party application can avoid, or overrule Grayteq DLP enforced security policies, execute forced decryption on encrypted information or disengage real-time monitoring capabilities. Communication protocols and devices are controlled irrespectively to their availability or presence, with full remote device management capabilities. Single Console Management Grayteq DLP s Security Orchestrator provides fully integrated and centralized data loss prevention management, including user activity log gathering and analysis. Security Orchestrator enables you policy setup, testing, distribution and remote client administration with on-the-spot incident management, all from a single location. Core Protection Grayteq DLP delivers un-bypass able monitoring, policy application and protection over valuable corporate information and any interactions to it. Compatibility All 32- and 64-bit Microsoft Windows Desktop and Server operating systems up to Windows 8.1 and Server 2012 R2 are supported. Active Directory Support Besides of applying additional access right settings to overrule Windows Active Directory provided rights, Grayteq DLP enables you to enhance security policies and compliance capabilities. Database Support Grayteq DLP s distinctive database technology can be redeemed by third-party SQL database and SYSLOG management systems. Supported SQL systems: MS SQL Server 2000, 2003, 2008, 2008 R2, Oracle 10G, PostgreSQL; Supported SYSLOG systems: HP OpenView, IBM Tivoli, Cisco MARS, Novell Nsure Audit. Novell Netware Sharing Security Protection features, policy application and enforcement, and support for Novell Netware sharing is identical to Microsoft Windows sharing, ensuring the same monitoring, logging and protection features on both platforms. Learn more Learn more about Grayteq DLP on http://www.grayteq. com/en-us/dlp/dlp-keyfeatures.aspx Get started Grayteq DLP expert team will work with you to understand your unique data security requirements in the cloud, help you define priorities, classify your information, and share insight into our industry best practices. Contact us on http://www.grayteq.com/ en-us/regular/contact-us. aspx Email to support@grayteq.com Live chat http://www.grayteq.com/ redirect.aspx?urlid=674

About Grayteq DLP By its feature-rich architecture, advanced complexity and easy-to-use graphical interface, Grayteq DLP is one of the most advanced data loss prevention system available on the market. Data Vault, Application Policy, Encrypted Data Transmission, On/Off-Network Policy, Test Mode and all the other features enables customers to enhance protection over their valuable corporate data without being forced to change everyday workflow. Grayteq DLP is the new dimension in Data Loss Prevention. About us Sealar, Inc. is the vendor and service provider of Grayteq Data Loss Prevention Solutions, ensuring businesses and consumers safety and beyond. The company helps customers protect their infrastructure, information and interactions by delivering Grayteq softwares and services that address risks to information security, availability, compliance and performance. Sealar, Inc. is headquartered in London, United Kingdom and have a branch office in Budapest, Hungary More information is available at www.grayteq.com For specific country distributors, reseller offices and contact numbers, please visit our Website! Your local Grayteq Partner: Grayteq Headquarters 31 Ashbridge street, London NW8 8DF, UK Branch office 95 Bartok Way, H-1113 Budapest, Hungary Contact Email us to info@grayteq.com or for support, to support@ grayteq.com Grayteq, the Grayteq logo, and Grayteq DLP are either registered trademarks or trademarks of Sealar Incorporated in the United States and/or other countries. Other names may be trademarks of their respective owners. All information provided is subject to change without notice. Errors and omissions excepted. Copyright 2014 Grayteq and Sealar, Inc. All rights reserved.