Page 1 of 1

System capabilities

Posted: Thu Feb 13, 2025 6:30 am
by relemedf5w023
The second part of the solution to the problem involves periodic and prompt checks of workstations and network storage accessible to responsible users by scanning file systems in order to detect confidential information, followed by performing actions specified by the security service with the detected documents (from prompt notification of the information security service to deleting files or placing them in quarantine).

All the above-described technologies and methods for counteracting leaks in the model under consideration are guaranteed to be implemented using the DeviceLock DLP Suite DLP complex.

The DeviceLock DLP complex implements various scenarios for combating leaks of restricted data through network communications and local channels — from a total ban on the use of individual channels and devices to a usa whatsapp data monitoring mode, when only monitoring of transmitted data is carried out with subsequent detection of incidents. Between these extremes lie any combinations of blocking and logging, including selective permission or blocking of file transfers through channels controlled by the information security service for individual users and groups in combination with content filtering "on the fly" — analysis of the contents of transmitted documents and data, including a certain type, size and content. The arsenal of capabilities of the complex also includes shadow copying of only files and data that are of interest to the information security service, alarm notifications for significant events, automatic scanning of workstations and network storage, and much more.