RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Zecurion Mobile DLP

Product
The name of the base system (platform): Zecurion DLP
Developers: Zecurion (before SecurIT)
Date of the premiere of the system: November, 2014
Technology: Mobile Device Management (MDM),  cybersecurity - Information loss preventions

The Zecurion company released in the fall of 2014 a DLP system with function of the content analysis for the Android platform. A system analyzes files and prevents leakages of confidential data via mobile devices.

Zecurion Mobile DLP provides control of corporate information on mobile devices of employees — prevents leaks at stages of storage, transfer and information processing. Zecurion Mobile DLP finds copies of confidential documents on devices of users and blocks their transfer through unreliable open networks. All traffic goes through the protected corporate network. In case of theft or loss the device is blocked by the security officer.

For detection of confidential documents for Android devices the hybrid analysis of MHA NG (Mobile hybrid analysis next generation) is used. Upgraded version of MHA uses six different technologies of recognition of confidential data, including morphological analysis of MorphoLogic, search in dictionaries, in templates and regular expressions. It is in the future going to add support of technologies of digital fingerprints of DocuPrints and an intelligent system of SmartID. Already now MHA NG correctly recognizes more than 100 different types of files and also the ciphered documents.

"Wide circulation of mobile devices in corporate environment and promoting of the concept of BYOD is imposed on the company by additional information risks. For this reason we concentrated the efforts on development of essentially new solution capable to provide secure access to corporate resources — Rayevsky Alexey, the CEO of Zecurion says. — The first-ever Zecurion Mobile DLP system with the content analysis for Android devices comprises all necessary functionality for data protection. For example, a system saves the shadow copies SMS and MMS and also controls operation of applications using black and white lists".