Cart

  • Cart Empty!

Every effort has been made to ensure the accuracy of all information contained herein. e-nitiative shall not be liable for any changes resulting in wrong product description, tax code and/or price. The shown information (specifications, prices, taxes) should be considered as an indication and can be changed at any moment and without any prior notice.

ADVANCE COMPUTER CENTRE LTD
59 GEORGE LANE
E18 1JJ LONDON
UK
Telephone : 02085188353
VAT : 506794623

curve_type_3_left_tcurve_type_3_right_t
Data Loss Prevention Discover (de) Mo Per Use Msp 1-99999

Data Loss Prevention Discover (de) Mo Per Use Msp 1-99999

£1.16
£1.39
Part Number: MSP-DDSSDE-MOAF
Language: IN
Real time Stock Check

Product Details

Introduction

Sensitive information that resides on laptops, shared file servers, and in cloud storage may be putting your organization at risk. Huge volumes of information-terabytes and even petabytes-must be protected. This is especially difficult because sensitive information isn't always properly labeled. Additionally, in most organizations, there is no way to know or verify whether sensitive data may be at risk or to know where it has proliferated-even with access controls in place. Making matters more complicated, sensitive data typically consists of unstructured data types, such as intellectual property (IP) assets, that are harder to define than structured data like credit card or Social Security numbers. Trellix Data Loss Prevention Discover (Trellix DLP - Discover) helps you locate and classify your sensitive data, find out how it is being used, and protect it against theft or leakage.

Key Features

  • Identification of data leakage risks
    • Scan information stored on premise or in the cloud (Box).
    • Identify where sensitive data is stored and who the content owner is.
    • Search and view all scanned data from an intuitive interface.
  • Policies and customized reports
    • Use prebuilt compliance, corporate governance, and intellectual property policies.
    • Register sensitive information to adjacent information security systems.
  • Classification, analysis, and remediation of data leaks
    • Filter and control sensitive information with multivector classification.
    • Index all content, and then query and mine it to understand your sensitive data.
    • Register and generate signatures to protect documents and the information contained within—  even if plagiarized or transposed.
    • Send an alert notification if content violates protection policies.