0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
487 Ansichten4 Seiten
The document outlines 21 criteria that any data loss prevention (DLP) solution should fulfill, including preventing information leakage via email, social media, external drives, screen capturing and more. It also notes the browser and architecture compatibility of the DLP agent.
The document outlines 21 criteria that any data loss prevention (DLP) solution should fulfill, including preventing information leakage via email, social media, external drives, screen capturing and more. It also notes the browser and architecture compatibility of the DLP agent.
The document outlines 21 criteria that any data loss prevention (DLP) solution should fulfill, including preventing information leakage via email, social media, external drives, screen capturing and more. It also notes the browser and architecture compatibility of the DLP agent.
1. Prevents information leakage via G-mail & G Drive.
2. Prevents information leakage via Facebook.
3. Prevents information leakage via Any URL. 4. Keeps copies of all types of files uploaded e.g. Word file should be uploaded on DLP Se 5. Protects the DLP agent from getting its process killed by the user. 6. Prevents information leakage via USB, CD/DVD. 7. Blocks password protected archives .zip| .rar | .tar| .Gz from getting uploaded. 8. Blocks password protected PDF | MS WORD | Excel | PPT etc. from getting uploaded. 9. Blocks encrypted data files such as TXT PDF | MS WORD | Excel | PPT from getting upl 10. Completely blocks screen shot capturing. 11. Prevents information leakage via Network sharing . 12. Prevents information leakage via RDP. 13. Prevents information leakage via SSH . 14. Prevents information leakage from user laptop if a user is connected over VPN tunnel. 15. Prevents information leakage via WinSCP. 16. Prevents leakage via Virtual Machine hosted as guest on host machine (Agent is install 17. Prevents information leakage via scanned images. 18. java and PHP scripts. 19. Multi language document detection. 20. Block files via extension less / unknown extension files. 21. Block files via P2P. Following are the criteria that should be fulfilled by any DLP solution
1. Prevents information leakage via G-mail & G Drive.
2. Prevents information leakage via Facebook. 3. Prevents information leakage via Any URL. 4. Keeps copies of all types of files uploaded e.g. Word file should be uploaded on DLP Server. 5. Protects the DLP agent from getting its process killed by the user. 6. Prevents information leakage via USB, CD/DVD. 7. Blocks password protected archives .zip| .rar | .tar| .Gz from getting uploaded. 8. Blocks password protected PDF | MS WORD | Excel | PPT etc. from getting uploaded. 9. Blocks encrypted data files such as TXT PDF | MS WORD | Excel | PPT from getting uploaded. 10. Completely blocks screen shot capturing. 11. Prevents information leakage via Network sharing . 12. Prevents information leakage via RDP. 13. Prevents information leakage via SSH . 14. Prevents information leakage from user laptop if a user is connected over VPN tunnel. 15. Prevents information leakage via WinSCP. 16. Prevents leakage via Virtual Machine hosted as guest on host machine (Agent is installed on host machine 17. Prevents information leakage via scanned images. 18. java and PHP scripts. 19. Multi language document detection. 20. Block files via extension less / unknown extension files. 21. Block files via P2P. Mozilla Chrome
32bit 64bit Internet explorer 64bit 32bit Opera Latest Version