0% found this document useful (0 votes)
127 views2 pages

Digital Guardian Network Data Loss Prevention: Protect Sensitive Data On The Move To Support Regulatory Compliance

Uploaded by

vinay k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views2 pages

Digital Guardian Network Data Loss Prevention: Protect Sensitive Data On The Move To Support Regulatory Compliance

Uploaded by

vinay k
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DATASHEET

Digital Guardian
Network Data Loss Prevention

Protect Sensitive Data on the Move to Support


Regulatory Compliance
Digital Guardian Network Data Loss Prevention helps
support compliance and reduce risks of data loss by
monitoring and controlling the flow of sensitive data
via the network, email or web. It is typically deployed
in a matter of hours and does not require a dedicated
resource once it is deployed.

Our network DLP appliances inspect all network traffic,


then enforce policies to ensure protection. Policy
actions include: allow, prompt, block, encrypt, reroute,
and quarantine.

Deepest and Broadest Visibility

Network DLP Cloud Data Data Discovery


Protection

Highest Accuracy Simplified Architecture Fast & Flexible Deployment


Digital Guardian’s Database Record The appliance consists of specialized You can deploy our network
Matching (DBRM) delivers the sensors that monitor the full TCP appliances on premises yourself,
accuracy needed to reduce false stack, providing policy protection or let us manage it for you. With
positives and false negatives. DBRM and enforcement for both inbound our industry first Managed Security
recognizes, registers and protects a and outbound connections. Scalable Program for DLP, you can offload
wide range of both structured (e.g. architecture provides flexible the configuration, management and
fields in databases or columns in deployment options; single network analysis to Digital Guardian experts.
spreadsheets) and unstructured data appliances can perform multiple We identify high-risk events and
types (e.g. document formats such functions from network monitoring provide detailed reporting to better
as Microsoft Office, source code and and enforcement to discovery of gauge effectiveness of your program
PDFs). data stored in various repositories. and/or help demonstrate compliance.
Capabilities may be decoupled and
deployed across multiple locations
reporting into a single management
platform
DG NETWORK DLP DATASHEET www.digitalguardian.com

Key Benefits
Proven, Insight-Driven Framework Demonstrate Regulatory Compliance Quickly and
Our unique ability to protect data from both insider and Easily
outsider threats is a result of three distinct capabilities: Digital Guardian can be deployed, configured and
• Deepest Visibility: DG sees and correlates system, protect data in just a few hours. Pre-configured policies
user and data events in real time for PII, PHI, and PCI, along with the flexibility to create
• Real-Time Analytics: DG filters out the noise customized policies, ensure you protect what matters
allowing InfoSec to focus on real threats most to your organization and support compliance
• Flexible Controls: DG acts at machine speed with needs. Reports provide a detailed picture of data
controls that adapt to your business movement for audits.

Comprehensive Traffic Monitoring Flexible, Tailored Responses


Digital Guardian Network DLP monitors and controls With Digital Guardian you can easily create automated
all communications channels – including email (SMTP), responses tailored for your environment and business.
web (HTTP/HTTPS), File Transfer Protocol (FTP), Secure Policy based actions include: allow, log, prompt,
Sockets Layer (SSL), and applications such as webmail. move, block, encrypt, reroute, and quarantine. User
Digital Guardian appliances can be deployed as either notification at the time of potentially risky behavior
physical or virtual machines. reinforces desired data handling procedures.

ABOUT Digital Guardian’s threat aware data protection By harnessing our deep data visibility, real-time
DIGITAL platform safeguards your sensitive data from analytics and flexible controls, you can stop
GUARDIAN the risks posed by insider and outsider threats. malicious data theft and inadvertent data loss.

Copyright © 2017 Digital Guardian, Inc. All rights reserved. Digital Guardian and Security’s Change Agent are trademarks of Digital Guardian, Inc. in the U.S. and other
countries. All other trademarks are the property of their respective owners. SHARE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy