Data Visibility and Control

Data Visibility and Control

PRODUCT DATA SHEET ® Data Visibility and Control GAIN VISIBILITY OF YOUR ORGANIZATION’S SENSITIVE DATA ON DAY ONE If you don’t have visibility into your organization’s sensitive data, you PII, PCI, PHI data is and how it’s being used – without requiring pre- can’t protect it. Digital Guardian for Data Visibility and Control defined policies. It also delivers device control and encryption – all at enables you to understand exactly where your organization’s affordable price. Digital Guardian sees the file and sees that it came from a file share containing sensitive data Out–of–the–box data visibility User attempts and device control at the to download a file to PCI endpoint USB device PCI Digital Guardian sees Digital Guardian the tag, understands the Digital Guardian automatically applies a context, and protects by encrypts the file classification requiring a decryption key PCI PCI tag to the file to open the file prior to copying it to the USB IDENTIFY AND MONITOR PII, PHI ENFORCE DEVICE ENCRYPTION POLICIES AND PCI DATA - IMMEDIATELY • Require users to encrypt data written to removable devices or • Install the DG agents and they will instantly start classifying and media using FIPS 140-2 level 2 validated encryption. Encryption tagging your PII, PHI and PCI data through automatic content is self-contained on the device, allowing only those with an inspection. The tags remain no matter how the files are modified or encryption key to access that information. where the data goes, giving the agent persistent visibility. • Control who can access devices or media and control whether or not those devices/media can be accessed outside GET REAL-TIME VISIBILITY OF ALL DATA MOVEMENT AND your organization. DATA TRANSMISSION • Get near real-time reports on the movement and use of all sensitive STOP DATA THEFT BY ENFORCING DEVICE USE POLICIES data based on the data classification, the user or process, • Identify all removable devices or media connected to and the action. your endpoints. • Set alerts for policy violations. • Identify by type, manufacturer, model number, and MAC address. PROTECT ENDPOINTS FROM THREATS DISCOVERED AT THE • Control and manage removable devices through endpoint ports, NETWORK LAYER including USB, FireWire, eSATA, and webcams. • Integrate threat feeds from network sandbox technology to block • Set user prompt or block , or encrypt when a user is trying to copy malicious executables and stop malware propagation data to a USB device. at the endpoint. For more information, visit www.digitalguardian.com ® WHY DIGITAL GUARDIAN FOR DATA VISIBILITY AND CONTROL DEEPEST VISIBILITY Digital Guardian operates at the kernel of the OS, providing complete visibility to all hardware, software, data storage and data movement. We deliver actionable results, out-of-the-box, without predefined policies, providing insight into data and application movement along with trends and 1 baselines to prioritize response and remediation. AUTOMATED CLASSIFICATION – WITHOUT PREDEFINED POLICIES Most data protection solutions require you to spend weeks or months identifying and classifying your sensitive data before protection starts. 2 Digital Guardian begins as soon as you install it, proactively tagging and classifying PII, PCI and PHI data. FLEXIBLE DEPLOYMENT Only Digital Guardian offers complete data protection through an on premise solution, cloud-based managed service, or a hybrid of both. Our cloud-based managed services are the answer if you have more IP than IT. As an extension of your team, we’ll expertly develop, deploy, and 3 manage all of your policies enterprise-wide as if they were our own. DIGITAL GUARDIAN PRODUCT PLATFORM Digital Guardian is the only data-centric security platform designed to stop data theft. Advanced Threat Protection Advanced threat detection, incident response and prevention that ensures security travels with the data. DGMC Digital Guardian Management Console Data Loss Prevention Your web-based command center. Everything you need to stop sensitive data Deploy agents, create and manage from getting out of your organization. policies, alerts and reports. Data Visibility & Control Out-of-the-box data visibility and device control. DG Agent The only endpoint agent compatible with Windows, Mac & Linux. Digital Guardian is the only data-centric security platform designed valuable assets with an on premise deployment or an outsourced ABOUT to stop data theft. The Digital Guardian platform performs across managed security program (MSP). Our unique data awareness and traditional endpoints, mobile devices and cloud applications to make transformative endpoint visibility, combined with behavioral threat DIGITAL it easier to see and stop all threats to sensitive data. For more than detection and response, let you protect data without slowing the GUARDIAN 10 years we’ve enabled data-rich organizations to protect their most pace of your business. Copyright © 2015 Digital Guardian, Inc. All rights reserved. Digital Guardian and Security’s Change Agent are trademarks of Digital Guardian, Inc. in the U.S. and other countries. All other trademarks are the property of their respective owners..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    2 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us