Sie sind auf Seite 1von 4

1.     Prevents information leakage via G-mail & G Drive.

2.     Prevents information leakage via Facebook.


3.     Prevents information leakage via Any URL.
4.     Keeps copies of all types of files uploaded e.g. Word file should be uploaded on DLP Se
5.     Protects the DLP agent from getting its process killed by the user.
6.     Prevents information leakage via USB, CD/DVD.
7.     Blocks password protected archives .zip| .rar | .tar| .Gz from getting uploaded.
8.     Blocks password protected PDF | MS WORD | Excel | PPT etc. from getting uploaded.
9.     Blocks encrypted data files such as TXT PDF | MS WORD | Excel | PPT from getting upl
10.     Completely blocks screen shot capturing.
11.     Prevents information leakage via Network sharing .
12.     Prevents information leakage via RDP.
13.     Prevents information leakage via SSH .
14.     Prevents information leakage from user laptop if a user is connected over VPN tunnel.
15.     Prevents information leakage via WinSCP.
16.     Prevents leakage via Virtual Machine hosted as guest on host machine (Agent is install
17.     Prevents information leakage via scanned images.
18.     java and PHP scripts.
19.     Multi language document detection.
20.     Block files via extension less / unknown extension files.
21.     Block files via P2P.
Following are the criteria that should be fulfilled by any DLP solution

1.     Prevents information leakage via G-mail & G Drive.


2.     Prevents information leakage via Facebook.
3.     Prevents information leakage via Any URL.
4.     Keeps copies of all types of files uploaded e.g. Word file should be uploaded on DLP Server.
5.     Protects the DLP agent from getting its process killed by the user.
6.     Prevents information leakage via USB, CD/DVD.
7.     Blocks password protected archives .zip| .rar | .tar| .Gz from getting uploaded.
8.     Blocks password protected PDF | MS WORD | Excel | PPT etc. from getting uploaded.
9.     Blocks encrypted data files such as TXT PDF | MS WORD | Excel | PPT from getting uploaded.
10.     Completely blocks screen shot capturing.
11.     Prevents information leakage via Network sharing .
12.     Prevents information leakage via RDP.
13.     Prevents information leakage via SSH .
14.     Prevents information leakage from user laptop if a user is connected over VPN tunnel.
15.     Prevents information leakage via WinSCP.
16.     Prevents leakage via Virtual Machine hosted as guest on host machine (Agent is installed on host machine
17.     Prevents information leakage via scanned images.
18.     java and PHP scripts.
19.     Multi language document detection.
20.     Block files via extension less / unknown extension files.
21.     Block files via P2P.
Mozilla Chrome

32bit 64bit Internet explorer 64bit 32bit Opera Latest Version

Done Done Done Done Done N.Done


Done Done Done Done Done N.Done
Done Done Done Done Done N.Done
Done Done Done Done Done N.Done

Done Done Done Done Done

n host machine

Das könnte Ihnen auch gefallen