For enterprises and institutions, computer web pages, communication software, e-mail and other transmission channels are all hidden dangers of unknown channels in the event of data leakage. As an enterprise data leakage prevention system, DLP takes enterprise desktop terminals as the main management object to carry out security control and protection of various possible leakage channels.
Data leakage prevention system control:
1.Web Transmission Control
Flexibly control web browsing permissions, and only allow business-related web pages to be browsed during working hours, improving internal work efficiency.
Restrictions on the content sent by web pages are supported.
Sensitive information such as HTTP and HTTPS web pages, files uploaded to web pages, and forum posts can be detected and identified.
When illegal access is discovered, you can take a series of measures to block access, report to the administrator, alarm, record the screen, lock the screen, and take screenshots.
You can audit web browsing time, web search records, web file uploads, and other records.
2.Email control
Detect and identify sensitive information such as sender, body, subject, attachment name, attachment content, etc., and support compressed packet penetration identification.
When sending emails in violation of regulations, you can take a series of measures to deal with the terminal, including blocking email sending, reporting to administrators, alarms, screen recording, screen locking, and screen screenshots.
Support Exchange and SSL encrypted transmission protocols for Outlook clients;
Supports auditing of email sending and receiving records.
3.Mobile storage control
Only authorized USB devices can be used normally, and read and write permissions are restricted.
Detects and identifies whether the content of USB copy, save, or cut files contains sensitive information.
When a file is copied in violation of regulations, a series of measures can be taken against the terminal, including blocking the file copy, reporting to the administrator, alarming, recording the screen, locking the screen, and taking screenshots.
USB device identification logs can be audited.
4.Print control
Only the whitelist process and whitelist suffix can be printed, and the rest can be restricted.
Detect whether the contents of the printed file contain sensitive information.
In case of illegal printing, a series of measures can be implemented on the terminal, including blocking printing, reporting to the administrator, alarming, screen recording, screen locking, and screen capture.
Supports auditing and printing file logs.
Based on demand analysis, the DLP data leakage prevention system emphasizes the trinity of security, management and maintenance, and helps enterprise users achieve a more secure, reliable and stable network operation environment by realizing the effective management of a large number of desktop terminal systems. Realize the standardized management from "inside" to "outside", solve the problem of desktop security management, improve the work efficiency of the information operation and maintenance department, and standardize the operation behavior of employees.