Cookie Policy
We use cookies to improve your experience on our website. If you continue without changing your cookie settings on your browser, we'll assume that you are happy to receive all cookies on the Zycko website. To learn more about how we use cookies, please see our cookie policy.
 
 
  • Overview

Content Aware Protection (Content Filtering)

Use of more cloud based services from Dropbox to web-based e-mail has in the last years, increased the number of accidental or intentional data leakage incidents. Endpoint Data Leakage Prevention (also called Data Loss Prevention or short DLP) has become one of the principal security challenges for companies all over the world. Careless employee behavior is actually being considered a greater security threat than hackers, highlighting the need for a close and detailed monitoring of all data transferred outside of companies networks.

To protect your sensitive company data you need to be aware of its content. If data leaves the endpoint (Windows PCs and Macs) to the cloud, USB Stick or in an e-mail, you need to be sure that its content is not against your policy. This is where Content-Aware Data Loss Prevention (DLP) helps you.

One simple example is telephony; you want your company to be as efficient, productive and cost-conscious as possible. You allow users or even encourage them to use Skype. Great to keep call costs low and people connected to work efficient. Downside, who knows what files they transfer outside the company network using Skype’s file transfer features? With Content Aware Protection you can take control at the endpoint what data content is allowed to be transferred using Skype.

- Skype is great in many ways but it is also a big risk factor to lose data
- Dropbox and Google Drive are great ways to improve productivity, but an
even greater way for data to be leaked, lost or stolen

Don’t let applications and data unsupervised!

   
What it does?

- Prevent intentional data theft
- Prevent accidental data loss and data leakage
- Stop irresponsible data use by employees
- Monitor all data transfers, either directly 
  performed or through a simple copy & paste
- Block screen captures
- Provide compliance
How we prevent?

- Inspect data transfers to applications like e-mail, cloud services, 
  web-browsers, file sharing applications, etc.
- Data transfers to removable devices is inspected 
- Detecting transfers of regulated data types such as Credit Card 
  Numbers (CCN) or Social Security Numbers (SSN)
- Detection of keywords in files based on custom dictionaries, etc.
- Filtering of File Types
- Inspect Clipboard and deactivate Print Screen capabilities
 

We offer advanced content aware protection for monitoring and blocking unauthorized data transfers:

1. Data in Motion analysis: Complete content scanning of all data in motion.
2. Monitor: Control screen captures, clipboard and all transfers to portable devices, and through
online applications like E-mail clients, webmail, web-browsers, instant messaging etc.
3. Block: Stop transfers of sensitive data.
4. Report: Find out when, how and who is attempting to take data outside the company network
5. Manage: Create and enforce strong content filtering policies across your company.

 

How it works?

Define and enable content DLP policy Define what content is sensitive Scan all data transfers (to devices, applications, online services) for sensitive data Action (blocked and/or reported) is taken if policy violation is detected

Benefits

Precise control over transfer of documents
Enforce corporate policy by ensuring documents containing confidential data are not shared outside the company. Everything without compromising productivity.
  Support for collaboration and communication
Take advantage of the collaborative tools using Skype, Facebook and other online applications while minimizing the risks posed by sharing files containing sensitive information.
Filter what data can or cannot leave the company
Start with general filters and progress granularly to advanced filters.
  Compliance to industry standards
Make sure your company complies with the current strict regulations and standards that apply to your industry.
Define your confidential data
Create custom rules to detect and block transfer of data you consider sensitive.
  Business continuity
Minimize risks of data losses that can affect business due to image prejudice, fines and lawsuits.
 

 

Back to Top
For more information:
Contact our specialist teams
 
 
For a database of user manual, datasheet, or software update, please access the Resource Centre