CODE GREEN NETWORKS TECHNICAL OVERVIEW Organizations in Every Industry Have Sensitive Data That Intentional Exposure of Confidential Data

CODE GREEN NETWORKS TECHNICAL OVERVIEW Organizations in Every Industry Have Sensitive Data That Intentional Exposure of Confidential Data

WHITE PAPER CODE GREEN NETWORKS TECHNICAL OVERVIEW Organizations in every industry have sensitive data that intentional exposure of confidential data. must be kept secure (e.g. customer records, financial data, personal health information, and intellectual Today’s organizations have many potential channels for property). Beyond simply securing data, many companies data loss to occur including: webmail, email, FTP transfers, must demonstrate compliance with government and removable USB devices, and cloud storage. Many of these industry regulations regarding information privacy. channels are not currently monitored or controlled, leaving Most organizations don’t know where their sensitive the organization with no visibility into the extent of their data resides—laptops, unmanaged SharePoint servers exposure or any means of proactively preventing data loss. or network file shares—which can lead to inadvertent or CODE GREEN NETWORKS SOLUTIONS SET Code Green Networks (CGN) is a complete Data Loss data loss Prevention (DLP) solution that allows companies to − Webmail and FTP visibility and control, including effectively discover, monitor, control, and secure sensitive SSL-enabled sessions data, whether on the network, in use on desktops or − Policy based monitoring and blocking of Web laptops, at rest on end user devices and network servers, or 2.0 applications, including wikis, blogs, and other stored in the cloud. applications − Email encryption for secure communication and • Comprehensive DLP Solution — Unified solution for regulatory compliance Network DLP, Endpoint DLP, Discovery DLP, and Cloud DLP • Key Features • Accurate Content Detection — Fingerprint based − Monitors and inspects all TCP protocols — SMTP, inspection delivers highly accurate identification of HTTP/S, FTP/S, IM, P2P, and other TCP sensitive content − A built—in mail transfer agent (MTA) with • Integrated Email Encryption — Onboard encryption quarantine, block, reroute, or encrypt actions seamlessly integrates with leading email encryption − Standards—based ICAP integration with Web services and FTP proxy servers allows inspection and • Cloud content control for leading Cloud storage control over web and FTP content even over SSL— providers—Box, Citrix ShareFile, Egnyte encrypted sessions • Easy To Use — Delivers full-featured protection with − On—board email encryption integrates with Cisco, reduced administration overhead ZixCorp, and Voltage encryption services • Fastest “Time to Protection” — deploys in days rather than weeks or months • Why Network DLP • Low Cost of Ownership — Non-subscription pricing − Secure communications with partners and offers low cost of ownership customers • Scalable Architecture — Supports single site, multi-site, − Comply with regulations regarding PII and PHI and distributed enterprises data − Prevent intellectual property leaks NETWORK DLP − Enforce company policies regarding handling of CGN DLP monitors and controls network communications external communications to prevent sensitive data from leaving your organization’s network. It’s network DLP without the complexity. CLOUD DLP CGN Cloud DLP allows organizations to adopt cloud Utilizing a network tap, Code Green Networks appliances storage without giving up visibility and control required monitor all network traffic and enforce policies to ensure by today’s regulatory environment. All files uploaded to protection. Policy based actions include: allow, block, an enterprise’s cloud can be scanned for confidential or encrypt, reroute, quarantine. CGN appliances monitor sensitive information and remediation can be automatically and control all communications channels — including applied. email (SMTP), Web (HTTP/HTTPS), File Transfer Protocol (FTP), Secure Sockets Layer (SSL), and applications such as Code Green Networks brings extensive technology, webmail, blogs, and wikis. experience and proven solutions for controlling regulated information in industries such as—healthcare, financial • Key Benefits services, retail, and government. To comply with today’s − Prevents data loss via the network regardless of government and industry regulations (e.g. HIPAA/HITECH, protocol PCI-DSS, Sarbanes-Oxley, and GLBA) it is necessary not − Content based email monitoring and message just to encrypt, but, to track where the regulated data handling to manage the most common source of resides, and, when and with whom that data is being www.digitalguardian.com WHITE PAPER / 1 accessed or shared. − Detailed audit logging and reports − Scalable agent based discovery scanning Key Benefits − Scan all files uploaded to cloud storage for • Why Discovery DLP confidential or regulated data − Scan laptops for personally identifiable information − Continuously audit files that have been uploaded like credit cards, customer databases − Integrated technology to mitigate the loss of − Find data exposed on insecure network shares or visibility and control when data is moved to the servers Cloud − Provide confidential data inventory report − Perform remediation based on potential risk − Proactively manage sensitive information exposure in case of laptop loss • Key Features − Complete Cloud content control for leading Cloud ENDPOINT DLP storage providers—Accellion, Box, Citrix ShareFile, CGN Endpoint DLP delivers powerful data loss protection and Egnyte for data as it is used on endpoint devices, providing visibility − Content aware monitoring and inspection policies, and control over sensitive information being copied to with detailed activity logging and reporting removable media or sent over wireless connections. − Device level control, with audit, report, alert, move, Endpoint DLP provides both device level control and and remove remediation actions content aware inspection, allowing flexible policy—based − Encrypt sensitive data as it is copied the cloud enforcement. − End user notification and remediation of policy violations Detailed activity logging provides audit history information necessary to demonstrate compliance. Offline policy • Why Cloud DLP enforcement ensures protection for laptops and other − Enables organizations to meet data privacy devices even when disconnected from the network. regulations while storing data in CGN − Scans files to allow encryption, removal or other • Key Benefits remediation of sensitive data before the file can be − Extend Data Loss Prevention to laptops and shared in the cloud desktops − Enterprise level Data Loss Prevention (DLP) − Provides visibility into file and device activity on solution to control sensitive content in the cloud endpoints − Seamless integration with leading Cloud storage − Controls sensitive information being copied to providers to further enhancing their security removable media or sent over wireless connections − Restrict device use to authorized users and devices DISCOVERY DLP − Protect laptops and other devices even when CGN Discovery DLP locates and identifies sensitive data disconnected from the network residing at endpoints and servers across the network, − Comply with regulations by enforcing encryption providing visibility and audit reporting of potentially of sensitive data unsecured information. Automatic, configurable scanning − Educate users on confidential data handling of local and network shares using discovery specific policies inspection policies ensure sensitive content is discovered wherever it is located. Detailed audit logging and reports • Key Features provide administrators with the information needed to − DLP policies for removable media and wireless demonstrate compliance, protect confidential information, devices and reduce data loss risk. − Detailed activity logging and reporting of all device and file activity • Key Benefits − Content aware monitoring and inspection policies − Locates and identifies sensitive content residing − Device level control, with read only, block, encrypt, endpoints and servers and log actions − Provides visibility and audit reporting of unsecured − Separate online and offline policies sensitive content − Encrypt sensitive data as it is copied to removable − Demonstrate compliance devices. − Reduce data loss risk − End user notification and remediation of policy violations • Key Features − Configurable scanning based on endpoint, Active • Why Endpoint DLP Directory user/group, folders, and file types − Prevent confidential data from leaking via USB − Content aware inspection policies devices www.digitalguardian.com WHITE PAPER / 2 − Create reports of removable device usage • Key Benefits − Create reports of confidential data copied to − Unified protection regardless of Data Loss point. removable devices − Architecture supports low traffic branch office to − Alert and educate users when data handling high volume headquarters sites and scales to any policies are violated size organization − Support audit investigations − Simple deployment, installation and management − Demonstrate regulatory compliance reduces administration overhead BRINGING IT ALL TOGETHER • Key Features Code Green Networks brings all its components together − Centralized administration of content registration, through a centralized management system that provides policies, incidents, logs, and reporting enterprises a simple and flexible single point of access to − Centralized based administration of CI Appliances all its content inspection appliances regardless of where and CI Agents. they reside. This key enterprise component simplifies − Universal content inspection policies apply across the configuration and maintenance

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us