DeviceLock DLP takes digital fingerprints from samples of confidential documents, stores them in the fingerprint database of DeviceLock Enterprise Server, and then compares them with the digital fingerprints of the documents being scanned. If the percentage of "fingerprints match" exceeds the required threshold according to the setting, the scanned documents are considered confidential, and the actions specified in the content-aware rule are applied to them. Rules based on the "Document Fingerprints" content groups can be applied to both devices and network protocols, allowing you to use digital fingerprints for access permission management, selective shadowing, and asynchronous content discovery tasks.
When creating rules, are classified by importance or secrecy levels (e.g., "Restricted", "Confidential", "Top Secret"). DeviceLock provides a number of built-in classifications and allows you to add additional custom classifications.
Processing of information samples and taking their israel mobile database is performed by tasks on the DeviceLock Enterprise Server. Each such task belongs to a certain classification and assigns it to the fingerprints it creates. Each time a task is launched, it can check files in a certain folder. For each file, it first creates its fingerprints and compares them with the fingerprints from the database. The verification of the transmitted information is performed locally by the DeviceLock agent, and the agent requests the server to evaluate the fingerprints of the information being checked.
The function of using digital fingerprints for content analysis of information transmitted over the network, printed or saved on external drives will be included in DeviceLock DLP version 8.3, and the first Beta version is already available for free review on the website.
The DeviceLock DLP Suite software package offers a full-featured set of contextual and content-dependent mechanisms for effective control of data-in-use, data-in-motion and data-at-rest data to effectively solve the problem of data leakage protection. The key feature of the product is the principle of operation in real time, providing protection directly on user computers. The DeviceLock executive agent, operating at the kernel level of the operating system, supports the widest range of contextual methods in the DLP industry for preventing data leaks from protected user computers through their local interfaces and ports, peripheral, virtual and input/output devices redirected to terminal sessions, the system clipboard, screenshots, as well as network communication channels.
The stored digital fingerprints
-
- Posts: 407
- Joined: Sun Dec 22, 2024 7:17 am